Loading ...

Play interactive tourEdit tour

Windows Analysis Report pugKLanrj3

Overview

General Information

Sample Name:pugKLanrj3 (renamed file extension from none to dll)
Analysis ID:553115
MD5:db9535477013554eb17c837e6bd92324
SHA1:ba4fa056de631759ffa5600dd1142a1280d2f051
SHA256:df234584db0c8aa194c6873b78c8ae0018f0c5f445c5c8a2e90c5e3131310ad0
Tags:32dllexetrojan
Infos:

Most interesting Screenshot:

Detection

Emotet
Score:96
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Multi AV Scanner detection for submitted file
Yara detected Emotet
System process connects to network (likely due to code injection or exploit)
Machine Learning detection for sample
Sigma detected: Suspicious Call by Ordinal
C2 URLs / IPs found in malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query locales information (e.g. system language)
Deletes files inside the Windows folder
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Creates files inside the system directory
Internet Provider seen in connection with other malware
Detected potential crypto function
Contains functionality to query CPU information (cpuid)
Found potential string decryption / allocating functions
Sample execution stops while process was sleeping (likely an evasion)
Found evasive API chain (may stop execution after checking a module file name)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to dynamically determine API calls
Contains functionality which may be used to detect a debugger (GetProcessHeap)
IP address seen in connection with other malware
Creates a DirectInput object (often for capturing keystrokes)
Sample file is different than original file name gathered from version info
PE file contains an invalid checksum
PE file contains strange resources
Tries to load missing DLLs
Contains functionality to read the PEB
Drops PE files to the windows directory (C:\Windows)
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Detected TCP or UDP traffic on non-standard ports
Checks if the current process is being debugged
Connects to several IPs in different countries
Potential key logger detected (key state polling based)
Registers a DLL
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Found large amount of non-executed APIs
Creates a process in suspended mode (likely to inject code)

Classification

Process Tree

  • System is w10x64
  • loaddll32.exe (PID: 4352 cmdline: loaddll32.exe "C:\Users\user\Desktop\pugKLanrj3.dll" MD5: 7DEB5DB86C0AC789123DEC286286B938)
    • cmd.exe (PID: 3560 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\pugKLanrj3.dll",#1 MD5: F3BDBE3BB6F734E357235F4D5898582D)
      • rundll32.exe (PID: 5572 cmdline: rundll32.exe "C:\Users\user\Desktop\pugKLanrj3.dll",#1 MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
        • rundll32.exe (PID: 1312 cmdline: C:\Windows\SysWOW64\rundll32.exe "C:\Users\user\Desktop\pugKLanrj3.dll",DllRegisterServer MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
    • regsvr32.exe (PID: 3156 cmdline: regsvr32.exe /s C:\Users\user\Desktop\pugKLanrj3.dll MD5: 426E7499F6A7346F0410DEAD0805586B)
      • rundll32.exe (PID: 6408 cmdline: C:\Windows\SysWOW64\rundll32.exe "C:\Users\user\Desktop\pugKLanrj3.dll",DllRegisterServer MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
    • rundll32.exe (PID: 5504 cmdline: rundll32.exe C:\Users\user\Desktop\pugKLanrj3.dll,DllRegisterServer MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
      • rundll32.exe (PID: 6112 cmdline: C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Ubjbeaftth\ufcmfnoys.ulp",EgkecrKVKe MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
        • rundll32.exe (PID: 5388 cmdline: C:\Windows\SysWOW64\rundll32.exe "C:\Windows\System32\Ubjbeaftth\ufcmfnoys.ulp",DllRegisterServer MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
  • svchost.exe (PID: 6312 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 5672 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 5104 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 6268 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • cleanup

Malware Configuration

Threatname: Emotet

{"C2 list": ["45.138.98.34:80", "69.16.218.101:8080", "51.210.242.234:8080", "185.148.168.220:8080", "142.4.219.173:8080", "54.38.242.185:443", "191.252.103.16:80", "104.131.62.48:8080", "62.171.178.147:8080", "217.182.143.207:443", "168.197.250.14:80", "37.44.244.177:8080", "66.42.57.149:443", "210.57.209.142:8080", "159.69.237.188:443", "116.124.128.206:8080", "128.199.192.135:8080", "195.154.146.35:443", "185.148.168.15:8080", "195.77.239.39:8080", "207.148.81.119:8080", "85.214.67.203:8080", "190.90.233.66:443", "78.46.73.125:443", "78.47.204.80:443", "37.59.209.141:8080", "54.37.228.122:443"], "Public Key": ["RUNLMSAAAADYNZPXY4tQxd/N4Wn5sTYAm5tUOxY2ol1ELrI4MNhHNi640vSLasjYTHpFRBoG+o84vtr7AJachCzOHjaAJFCW", "RUNTMSAAAAD0LxqDNhonUYwk8sqo7IWuUllRdUiUBnACc6romsQoe1YJD7wIe4AheqYofpZFucPDXCZ0z9i+ooUffqeoLZU0"]}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000007.00000002.308556502.0000000004971000.00000020.00000001.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
    00000004.00000002.312426426.0000000004790000.00000040.00000001.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
      00000003.00000002.303864837.0000000002E50000.00000040.00000001.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
        00000007.00000002.308717246.0000000004ED1000.00000020.00000001.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
          00000009.00000002.312591906.0000000002E30000.00000040.00000001.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
            Click to see the 45 entries

            Unpacked PEs

            SourceRuleDescriptionAuthorStrings
            7.2.rundll32.exe.4fb0000.5.raw.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
              10.2.rundll32.exe.6c0000.2.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
                4.2.rundll32.exe.4660000.5.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
                  10.2.rundll32.exe.4fa0000.21.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
                    10.2.rundll32.exe.4a90000.12.raw.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
                      Click to see the 70 entries

                      Sigma Overview

                      System Summary:

                      barindex
                      Sigma detected: Suspicious Call by OrdinalShow sources
                      Source: Process startedAuthor: Florian Roth: Data: Command: rundll32.exe "C:\Users\user\Desktop\pugKLanrj3.dll",#1, CommandLine: rundll32.exe "C:\Users\user\Desktop\pugKLanrj3.dll",#1, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\rundll32.exe, NewProcessName: C:\Windows\SysWOW64\rundll32.exe, OriginalFileName: C:\Windows\SysWOW64\rundll32.exe, ParentCommandLine: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\pugKLanrj3.dll",#1, ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 3560, ProcessCommandLine: rundll32.exe "C:\Users\user\Desktop\pugKLanrj3.dll",#1, ProcessId: 5572

                      Jbx Signature Overview

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection:

                      barindex
                      Found malware configurationShow sources
                      Source: 10.2.rundll32.exe.4a90000.12.raw.unpackMalware Configuration Extractor: Emotet {"C2 list": ["45.138.98.34:80", "69.16.218.101:8080", "51.210.242.234:8080", "185.148.168.220:8080", "142.4.219.173:8080", "54.38.242.185:443", "191.252.103.16:80", "104.131.62.48:8080", "62.171.178.147:8080", "217.182.143.207:443", "168.197.250.14:80", "37.44.244.177:8080", "66.42.57.149:443", "210.57.209.142:8080", "159.69.237.188:443", "116.124.128.206:8080", "128.199.192.135:8080", "195.154.146.35:443", "185.148.168.15:8080", "195.77.239.39:8080", "207.148.81.119:8080", "85.214.67.203:8080", "190.90.233.66:443", "78.46.73.125:443", "78.47.204.80:443", "37.59.209.141:8080", "54.37.228.122:443"], "Public Key": ["RUNLMSAAAADYNZPXY4tQxd/N4Wn5sTYAm5tUOxY2ol1ELrI4MNhHNi640vSLasjYTHpFRBoG+o84vtr7AJachCzOHjaAJFCW", "RUNTMSAAAAD0LxqDNhonUYwk8sqo7IWuUllRdUiUBnACc6romsQoe1YJD7wIe4AheqYofpZFucPDXCZ0z9i+ooUffqeoLZU0"]}
                      Multi AV Scanner detection for submitted fileShow sources
                      Source: pugKLanrj3.dllVirustotal: Detection: 26%Perma Link
                      Source: pugKLanrj3.dllReversingLabs: Detection: 32%
                      Machine Learning detection for sampleShow sources
                      Source: pugKLanrj3.dllJoe Sandbox ML: detected
                      Source: pugKLanrj3.dllStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE, DLL

                      Networking:

                      barindex
                      Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)Show sources
                      Source: TrafficSnort IDS: 2404332 ET CNC Feodo Tracker Reported CnC Server TCP group 17 192.168.2.3:49748 -> 45.138.98.34:80
                      Source: TrafficSnort IDS: 2404338 ET CNC Feodo Tracker Reported CnC Server TCP group 20 192.168.2.3:49749 -> 69.16.218.101:8080
                      System process connects to network (likely due to code injection or exploit)Show sources
                      Source: C:\Windows\SysWOW64\rundll32.exeNetwork Connect: 69.16.218.101 144
                      Source: C:\Windows\SysWOW64\rundll32.exeNetwork Connect: 45.138.98.34 80
                      C2 URLs / IPs found in malware configurationShow sources
                      Source: Malware configuration extractorIPs: 45.138.98.34:80
                      Source: Malware configuration extractorIPs: 69.16.218.101:8080
                      Source: Malware configuration extractorIPs: 51.210.242.234:8080
                      Source: Malware configuration extractorIPs: 185.148.168.220:8080
                      Source: Malware configuration extractorIPs: 142.4.219.173:8080
                      Source: Malware configuration extractorIPs: 54.38.242.185:443
                      Source: Malware configuration extractorIPs: 191.252.103.16:80
                      Source: Malware configuration extractorIPs: 104.131.62.48:8080
                      Source: Malware configuration extractorIPs: 62.171.178.147:8080
                      Source: Malware configuration extractorIPs: 217.182.143.207:443
                      Source: Malware configuration extractorIPs: 168.197.250.14:80
                      Source: Malware configuration extractorIPs: 37.44.244.177:8080
                      Source: Malware configuration extractorIPs: 66.42.57.149:443
                      Source: Malware configuration extractorIPs: 210.57.209.142:8080
                      Source: Malware configuration extractorIPs: 159.69.237.188:443
                      Source: Malware configuration extractorIPs: 116.124.128.206:8080
                      Source: Malware configuration extractorIPs: 128.199.192.135:8080
                      Source: Malware configuration extractorIPs: 195.154.146.35:443
                      Source: Malware configuration extractorIPs: 185.148.168.15:8080
                      Source: Malware configuration extractorIPs: 195.77.239.39:8080
                      Source: Malware configuration extractorIPs: 207.148.81.119:8080
                      Source: Malware configuration extractorIPs: 85.214.67.203:8080
                      Source: Malware configuration extractorIPs: 190.90.233.66:443
                      Source: Malware configuration extractorIPs: 78.46.73.125:443
                      Source: Malware configuration extractorIPs: 78.47.204.80:443
                      Source: Malware configuration extractorIPs: 37.59.209.141:8080
                      Source: Malware configuration extractorIPs: 54.37.228.122:443
                      Source: Joe Sandbox ViewASN Name: AS-CHOOPAUS AS-CHOOPAUS
                      Source: Joe Sandbox ViewASN Name: DIGITALOCEAN-ASNUS DIGITALOCEAN-ASNUS
                      Source: Joe Sandbox ViewIP Address: 207.148.81.119 207.148.81.119
                      Source: Joe Sandbox ViewIP Address: 104.131.62.48 104.131.62.48
                      Source: global trafficTCP traffic: 192.168.2.3:49749 -> 69.16.218.101:8080
                      Source: unknownNetwork traffic detected: IP country count 12
                      Source: unknownTCP traffic detected without corresponding DNS query: 45.138.98.34
                      Source: unknownTCP traffic detected without corresponding DNS query: 45.138.98.34
                      Source: unknownTCP traffic detected without corresponding DNS query: 45.138.98.34
                      Source: unknownTCP traffic detected without corresponding DNS query: 69.16.218.101
                      Source: unknownTCP traffic detected without corresponding DNS query: 69.16.218.101
                      Source: unknownTCP traffic detected without corresponding DNS query: 69.16.218.101
                      Source: unknownTCP traffic detected without corresponding DNS query: 69.16.218.101
                      Source: unknownTCP traffic detected without corresponding DNS query: 69.16.218.101
                      Source: unknownTCP traffic detected without corresponding DNS query: 69.16.218.101
                      Source: unknownTCP traffic detected without corresponding DNS query: 69.16.218.101
                      Source: unknownTCP traffic detected without corresponding DNS query: 69.16.218.101
                      Source: unknownTCP traffic detected without corresponding DNS query: 69.16.218.101
                      Source: unknownTCP traffic detected without corresponding DNS query: 69.16.218.101
                      Source: unknownTCP traffic detected without corresponding DNS query: 69.16.218.101
                      Source: svchost.exe, 00000011.00000003.419352679.0000024AA7D88000.00000004.00000001.sdmpString found in binary or memory: Try it free for 30 days, no strings attached\r\n\r\nLike us on Facebook: http://www.facebook.com/spotify \r\nFollow us on Twitter: http://twitter.com/spotify","ProductTitle":"Spotify - Music and Podcasts","SearchTitles":[{"SearchTitleString":"Spotify","SearchTitleType":"SearchHint"},{"SearchTitleString":"Music","SearchTitleType":"SearchHint"},{"SearchTitleString":"music apps","SearchTitleType":"SearchHint"},{"SearchTitleString":"free music","SearchTitleType":"SearchHint"},{"SearchTitleString":"podcasts","SearchTitleType":"SearchHint"},{"SearchTitleString":"streaming","SearchTitleType":"SearchHint"},{"SearchTitleString":"soundcloud","SearchTitleType":"SearchHint"}],"Language":"en-us","Markets":["US","DZ","AR","AU","AT","BH","BD","BE","BR","BG","CA","CL","CN","CO","CR","HR","CY","CZ","DK","EG","EE","FI","FR","DE","GR","GT","HK","HU","IS","IN","ID","IQ","IE","IL","IT","JP","JO","KZ","KE","KW","LV","LB","LI","LT","LU","MY","MT","MR","MX","MA","NL","NZ","NG","NO","OM","PK","PE","PH","PL","PT","QA","RO","RU","SA","RS","SG","SK","SI","ZA","KR","ES","SE","CH","TW","TH","TT","TN","TR","UA","AE","GB","VN","YE","LY","LK","UY","VE","AF","AX","AL","AS","AO","AI","AQ","AG","AM","AW","BO","BQ","BA","BW","BV","IO","BN","BF","BI","KH","CM","CV","KY","CF","TD","TL","DJ","DM","DO","EC","SV","GQ","ER","ET","FK","FO","FJ","GF","PF","TF","GA","GM","GE","GH","GI","GL","GD","GP","GU","GG","GN","GW","GY","HT","HM","HN","AZ","BS","BB","BY","BZ","BJ","BM","BT","KM","CG","CD","CK","CX","CC","CI","CW","JM","SJ","JE","KI","KG","LA","LS","LR","MO","MK","MG","MW","IM","MH","MQ","MU","YT","FM","MD","MN","MS","MZ","MM","NA","NR","NP","MV","ML","NC","NI","NE","NU","NF","PW","PS","PA","PG","PY","RE","RW","BL","MF","WS","ST","SN","MP","PN","SX","SB","SO","SC","SL","GS","SH","KN","LC","PM","VC","TJ","TZ","TG","TK","TO","TM","TC","TV","UM","UG","VI","VG","WF","EH","ZM","ZW","UZ","VU","SR","SZ","AD","MC","SM","ME","VA","NEUTRAL"]}],"MarketProperties":[{"RelatedProducts":[],"Markets":["US"]}],"ProductASchema":"Product;3","ProductBSchema":"ProductUnifiedApp;3","ProductId":"9NCBCSZSJRSB","Properties":{"PackageFamilyName":"SpotifyAB.SpotifyMusic_zpdnekdrzrea0","PackageIdentityName":"SpotifyAB.SpotifyMusic","PublisherCertificateName":"CN=453637B3-4E12-4CDF-B0D3-2A3C863BF6EF","XboxCrossGenSetId":null,"XboxConsoleGenOptimized":null,"XboxConsoleGenCompatible":null},"AlternateIds":[{"IdType":"LegacyWindowsStoreProductId","Value":"ceac5d3f-8a4f-40e1-9a67-76d9108c7cb5"},{"IdType":"LegacyWindowsPhoneProductId","Value":"caac1b9d-621b-4f96-b143-e10e1397740a"},{"IdType":"XboxTitleId","Value":"1681279293"}],"IngestionSource":"DCE","IsMicrosoftProduct":false,"PreferredSkuId":"0010","ProductType":"Application","ValidationData":{"PassedValidation":false,"RevisionId":"2022-01-07T11:33:20.1626869Z||.||d5cdcec3-04df-404e-ba07-3240047c89f9||1152921505694348672||Null||fullrelease","ValidationResultUri":""},"MerchandizingTags":[],"PartD":"","ProductFamily":"Apps","ProductKind":"Application","DisplaySkuAvailab
                      Source: svchost.exe, 00000011.00000003.419352679.0000024AA7D88000.00000004.00000001.sdmpString found in binary or memory: Try it free for 30 days, no strings attached\r\n\r\nLike us on Facebook: http://www.facebook.com/spotify \r\nFollow us on Twitter: http://twitter.com/spotify","ProductTitle":"Spotify - Music and Podcasts","SearchTitles":[{"SearchTitleString":"Spotify","SearchTitleType":"SearchHint"},{"SearchTitleString":"Music","SearchTitleType":"SearchHint"},{"SearchTitleString":"music apps","SearchTitleType":"SearchHint"},{"SearchTitleString":"free music","SearchTitleType":"SearchHint"},{"SearchTitleString":"podcasts","SearchTitleType":"SearchHint"},{"SearchTitleString":"streaming","SearchTitleType":"SearchHint"},{"SearchTitleString":"soundcloud","SearchTitleType":"SearchHint"}],"Language":"en-us","Markets":["US","DZ","AR","AU","AT","BH","BD","BE","BR","BG","CA","CL","CN","CO","CR","HR","CY","CZ","DK","EG","EE","FI","FR","DE","GR","GT","HK","HU","IS","IN","ID","IQ","IE","IL","IT","JP","JO","KZ","KE","KW","LV","LB","LI","LT","LU","MY","MT","MR","MX","MA","NL","NZ","NG","NO","OM","PK","PE","PH","PL","PT","QA","RO","RU","SA","RS","SG","SK","SI","ZA","KR","ES","SE","CH","TW","TH","TT","TN","TR","UA","AE","GB","VN","YE","LY","LK","UY","VE","AF","AX","AL","AS","AO","AI","AQ","AG","AM","AW","BO","BQ","BA","BW","BV","IO","BN","BF","BI","KH","CM","CV","KY","CF","TD","TL","DJ","DM","DO","EC","SV","GQ","ER","ET","FK","FO","FJ","GF","PF","TF","GA","GM","GE","GH","GI","GL","GD","GP","GU","GG","GN","GW","GY","HT","HM","HN","AZ","BS","BB","BY","BZ","BJ","BM","BT","KM","CG","CD","CK","CX","CC","CI","CW","JM","SJ","JE","KI","KG","LA","LS","LR","MO","MK","MG","MW","IM","MH","MQ","MU","YT","FM","MD","MN","MS","MZ","MM","NA","NR","NP","MV","ML","NC","NI","NE","NU","NF","PW","PS","PA","PG","PY","RE","RW","BL","MF","WS","ST","SN","MP","PN","SX","SB","SO","SC","SL","GS","SH","KN","LC","PM","VC","TJ","TZ","TG","TK","TO","TM","TC","TV","UM","UG","VI","VG","WF","EH","ZM","ZW","UZ","VU","SR","SZ","AD","MC","SM","ME","VA","NEUTRAL"]}],"MarketProperties":[{"RelatedProducts":[],"Markets":["US"]}],"ProductASchema":"Product;3","ProductBSchema":"ProductUnifiedApp;3","ProductId":"9NCBCSZSJRSB","Properties":{"PackageFamilyName":"SpotifyAB.SpotifyMusic_zpdnekdrzrea0","PackageIdentityName":"SpotifyAB.SpotifyMusic","PublisherCertificateName":"CN=453637B3-4E12-4CDF-B0D3-2A3C863BF6EF","XboxCrossGenSetId":null,"XboxConsoleGenOptimized":null,"XboxConsoleGenCompatible":null},"AlternateIds":[{"IdType":"LegacyWindowsStoreProductId","Value":"ceac5d3f-8a4f-40e1-9a67-76d9108c7cb5"},{"IdType":"LegacyWindowsPhoneProductId","Value":"caac1b9d-621b-4f96-b143-e10e1397740a"},{"IdType":"XboxTitleId","Value":"1681279293"}],"IngestionSource":"DCE","IsMicrosoftProduct":false,"PreferredSkuId":"0010","ProductType":"Application","ValidationData":{"PassedValidation":false,"RevisionId":"2022-01-07T11:33:20.1626869Z||.||d5cdcec3-04df-404e-ba07-3240047c89f9||1152921505694348672||Null||fullrelease","ValidationResultUri":""},"MerchandizingTags":[],"PartD":"","ProductFamily":"Apps","ProductKind":"Application","DisplaySkuAvailab
                      Source: svchost.exe, 00000011.00000003.419425357.0000024AA7D8E000.00000004.00000001.sdmp, svchost.exe, 00000011.00000003.419352679.0000024AA7D88000.00000004.00000001.sdmp, svchost.exe, 00000011.00000003.419404673.0000024AA7D8E000.00000004.00000001.sdmpString found in binary or memory: Try it free for 30 days, no strings attached\r\n\r\nLike us on Facebook: http://www.facebook.com/spotify \r\nFollow us on Twitter: http://twitter.com/spotify","SkuTitle":"Spotify - Music and Podcasts","Language":"en-us","Markets":["US","DZ","AR","AU","AT","BH","BD","BE","BR","BG","CA","CL","CN","CO","CR","HR","CY","CZ","DK","EG","EE","FI","FR","DE","GR","GT","HK","HU","IS","IN","ID","IQ","IE","IL","IT","JP","JO","KZ","KE","KW","LV","LB","LI","LT","LU","MY","MT","MR","MX","MA","NL","NZ","NG","NO","OM","PK","PE","PH","PL","PT","QA","RO","RU","SA","RS","SG","SK","SI","ZA","KR","ES","SE","CH","TW","TH","TT","TN","TR","UA","AE","GB","VN","YE","LY","LK","UY","VE","AF","AX","AL","AS","AO","AI","AQ","AG","AM","AW","BO","BQ","BA","BW","BV","IO","BN","BF","BI","KH","CM","CV","KY","CF","TD","TL","DJ","DM","DO","EC","SV","GQ","ER","ET","FK","FO","FJ","GF","PF","TF","GA","GM","GE","GH","GI","GL","GD","GP","GU","GG","GN","GW","GY","HT","HM","HN","AZ","BS","BB","BY equals www.facebook.com (Facebook)
                      Source: svchost.exe, 00000011.00000003.419425357.0000024AA7D8E000.00000004.00000001.sdmp, svchost.exe, 00000011.00000003.419352679.0000024AA7D88000.00000004.00000001.sdmp, svchost.exe, 00000011.00000003.419404673.0000024AA7D8E000.00000004.00000001.sdmpString found in binary or memory: Try it free for 30 days, no strings attached\r\n\r\nLike us on Facebook: http://www.facebook.com/spotify \r\nFollow us on Twitter: http://twitter.com/spotify","SkuTitle":"Spotify - Music and Podcasts","Language":"en-us","Markets":["US","DZ","AR","AU","AT","BH","BD","BE","BR","BG","CA","CL","CN","CO","CR","HR","CY","CZ","DK","EG","EE","FI","FR","DE","GR","GT","HK","HU","IS","IN","ID","IQ","IE","IL","IT","JP","JO","KZ","KE","KW","LV","LB","LI","LT","LU","MY","MT","MR","MX","MA","NL","NZ","NG","NO","OM","PK","PE","PH","PL","PT","QA","RO","RU","SA","RS","SG","SK","SI","ZA","KR","ES","SE","CH","TW","TH","TT","TN","TR","UA","AE","GB","VN","YE","LY","LK","UY","VE","AF","AX","AL","AS","AO","AI","AQ","AG","AM","AW","BO","BQ","BA","BW","BV","IO","BN","BF","BI","KH","CM","CV","KY","CF","TD","TL","DJ","DM","DO","EC","SV","GQ","ER","ET","FK","FO","FJ","GF","PF","TF","GA","GM","GE","GH","GI","GL","GD","GP","GU","GG","GN","GW","GY","HT","HM","HN","AZ","BS","BB","BY equals www.twitter.com (Twitter)
                      Source: svchost.exe, 00000011.00000002.435821452.0000024AA7D00000.00000004.00000001.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
                      Source: svchost.exe, 00000011.00000002.435659671.0000024AA74EF000.00000004.00000001.sdmpString found in binary or memory: http://crl.ver)
                      Source: 77EC63BDA74BD0D0E0426DC8F80085060.10.drString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
                      Source: rundll32.exe, 0000000A.00000003.343075591.0000000004D31000.00000004.00000001.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab?e16bf69187751
                      Source: svchost.exe, 00000011.00000003.408016367.0000024AA7D92000.00000004.00000001.sdmp, svchost.exe, 00000011.00000003.408127045.0000024AA7DB3000.00000004.00000001.sdmp, svchost.exe, 00000011.00000003.408267129.0000024AA8202000.00000004.00000001.sdmpString found in binary or memory: http://help.disneyplus.com.
                      Source: svchost.exe, 00000011.00000003.408016367.0000024AA7D92000.00000004.00000001.sdmp, svchost.exe, 00000011.00000003.408127045.0000024AA7DB3000.00000004.00000001.sdmp, svchost.exe, 00000011.00000003.408267129.0000024AA8202000.00000004.00000001.sdmpString found in binary or memory: https://disneyplus.com/legal.
                      Source: svchost.exe, 00000011.00000003.408016367.0000024AA7D92000.00000004.00000001.sdmp, svchost.exe, 00000011.00000003.408127045.0000024AA7DB3000.00000004.00000001.sdmp, svchost.exe, 00000011.00000003.408267129.0000024AA8202000.00000004.00000001.sdmpString found in binary or memory: https://www.disneyplus.com/legal/privacy-policy
                      Source: svchost.exe, 00000011.00000003.408016367.0000024AA7D92000.00000004.00000001.sdmp, svchost.exe, 00000011.00000003.408127045.0000024AA7DB3000.00000004.00000001.sdmp, svchost.exe, 00000011.00000003.408267129.0000024AA8202000.00000004.00000001.sdmpString found in binary or memory: https://www.disneyplus.com/legal/your-california-privacy-rights
                      Source: svchost.exe, 00000011.00000003.411715639.0000024AA7DB3000.00000004.00000001.sdmp, svchost.exe, 00000011.00000003.411696063.0000024AA7D92000.00000004.00000001.sdmp, svchost.exe, 00000011.00000003.411749032.0000024AA8202000.00000004.00000001.sdmp, svchost.exe, 00000011.00000003.413775795.0000024AA7D8E000.00000004.00000001.sdmp, svchost.exe, 00000011.00000003.411646731.0000024AA7DCA000.00000004.00000001.sdmp, svchost.exe, 00000011.00000003.411611343.0000024AA7DCA000.00000004.00000001.sdmpString found in binary or memory: https://www.tiktok.com/legal/report/feedback
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_100012D0 recvfrom,
                      Source: loaddll32.exe, 00000000.00000002.307427556.0000000000A4B000.00000004.00000020.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_1000FF59 GetKeyState,GetKeyState,GetKeyState,GetKeyState,SendMessageA,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_1000FF59 GetKeyState,GetKeyState,GetKeyState,GetKeyState,SendMessageA,

                      E-Banking Fraud:

                      barindex
                      Yara detected EmotetShow sources
                      Source: Yara matchFile source: 7.2.rundll32.exe.4fb0000.5.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.rundll32.exe.6c0000.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.4660000.5.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.rundll32.exe.4fa0000.21.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.rundll32.exe.4a90000.12.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.rundll32.exe.4950000.8.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.rundll32.exe.3090000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.rundll32.exe.4a90000.12.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.rundll32.exe.550000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 7.2.rundll32.exe.47a0000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.rundll32.exe.2e50000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.rundll32.exe.4710000.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.4630000.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.rundll32.exe.2e50000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.rundll32.exe.4fd0000.22.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.rundll32.exe.49b0000.10.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 7.2.rundll32.exe.4ed0000.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.regsvr32.exe.d20000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 9.2.rundll32.exe.2e30000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 7.2.rundll32.exe.4d20000.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.rundll32.exe.4820000.7.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 7.2.rundll32.exe.4fe0000.6.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.4540000.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.rundll32.exe.4ac0000.13.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.rundll32.exe.4e70000.18.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 9.2.rundll32.exe.2e30000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.rundll32.exe.520000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.4960000.10.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.4990000.11.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 9.2.rundll32.exe.2e60000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.47f0000.8.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.rundll32.exe.4710000.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.4570000.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.rundll32.exe.4c70000.16.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.rundll32.exe.5000000.23.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.rundll32.exe.4b90000.14.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.rundll32.exe.720000.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.rundll32.exe.4980000.9.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.rundll32.exe.4ea0000.19.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.rundll32.exe.4e70000.18.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.rundll32.exe.49e0000.11.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 7.2.rundll32.exe.4ea0000.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.regsvr32.exe.ed0000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.4790000.6.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.4790000.6.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.4540000.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.rundll32.exe.4950000.8.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 7.2.rundll32.exe.4ea0000.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 7.2.rundll32.exe.5010000.7.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.rundll32.exe.6c0000.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 7.2.rundll32.exe.4fb0000.5.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 7.2.rundll32.exe.47a0000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.47c0000.7.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.rundll32.exe.4f70000.20.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.rundll32.exe.4f70000.20.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.rundll32.exe.47f0000.6.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.rundll32.exe.4fd0000.22.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.6c0000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.rundll32.exe.4740000.5.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.690000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.rundll32.exe.4bc0000.15.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.rundll32.exe.4b90000.14.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 7.2.rundll32.exe.4970000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.4960000.10.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.rundll32.exe.520000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 7.2.rundll32.exe.4d20000.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.4820000.9.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.rundll32.exe.4ca0000.17.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.690000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.rundll32.exe.47f0000.6.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.regsvr32.exe.d20000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.rundll32.exe.4c70000.16.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.rundll32.exe.49b0000.10.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.4630000.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.47f0000.8.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000007.00000002.308556502.0000000004971000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.312426426.0000000004790000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.303864837.0000000002E50000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000007.00000002.308717246.0000000004ED1000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000009.00000002.312591906.0000000002E30000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.310675126.00000000006C1000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000007.00000002.308496197.00000000047A0000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.818600479.0000000004CA1000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.816263427.0000000000551000.00000020.00000010.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.312707880.0000000004991000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.818149949.0000000004821000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.312062487.0000000004571000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.303938818.0000000003091000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.312157578.0000000004630000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000007.00000002.308585132.0000000004D20000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.303434167.0000000000D20000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.310610436.0000000000690000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.818434536.0000000004B90000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.818253319.00000000049B0000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000007.00000002.308691982.0000000004EA0000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.312211500.0000000004661000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.818342645.0000000004A90000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.816816895.00000000006C0000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.818930567.0000000004F70000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000007.00000002.308783720.0000000004FE1000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.312650834.0000000004960000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.818769110.0000000004E70000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.818077767.0000000004741000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.818990382.0000000004FA1000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.818118455.00000000047F0000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.311999484.0000000004540000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000009.00000002.312633523.0000000002E61000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.818553417.0000000004C70000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.312609575.0000000004821000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.818862903.0000000004EA1000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.818277549.00000000049E1000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.819036173.0000000004FD0000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.818224414.0000000004981000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.818194001.0000000004950000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.819084555.0000000005001000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.312500126.00000000047C1000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.303487631.0000000000ED1000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.816889903.0000000000721000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.816215619.0000000000520000.00000040.00000010.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000007.00000002.308811399.0000000005011000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000007.00000002.308759081.0000000004FB0000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.818044267.0000000004710000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.818377834.0000000004AC1000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.818471974.0000000004BC1000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.312556159.00000000047F0000.00000040.00000001.sdmp, type: MEMORY

                      System Summary:

                      barindex
                      Source: pugKLanrj3.dllStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE, DLL
                      Source: C:\Windows\SysWOW64\rundll32.exeFile deleted: C:\Windows\SysWOW64\Ubjbeaftth\ufcmfnoys.ulp:Zone.IdentifierJump to behavior
                      Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Windows\SysWOW64\Ubjbeaftth\Jump to behavior
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_10020011
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_100181CA
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_1001929D
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_1002542D
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_100274AE
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_10026575
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_1001869D
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_10016860
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_1002596F
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_10022A5C
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_10018A71
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_1001AAB7
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_1001CB16
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_10018E7D
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_10025EB1
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_10020011
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_1002542D
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_100274AE
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_10026575
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_1001178A
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_10016860
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_1002596F
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_10022A5C
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_1001AAB7
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_1001CB16
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_10025EB1
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_030AEFDD
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_030A85FF
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_030B2B09
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_030A5333
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_0309F369
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_03096B7A
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_0309238C
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_0309FB8E
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_03094BFC
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_030A7A0F
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_030A9A01
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_030A4244
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_030AB257
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_030B3263
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_030A4A66
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_030B0A64
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_0309BAA9
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_030AA2A5
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_030A0ABA
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_030ACAD5
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_0309D14C
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_030A2142
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_030AE955
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_030A017B
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_030A6187
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_03092194
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_030AD1BC
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_030AE1F8
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_030B2009
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_030A8806
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_0309B820
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_030AF840
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_03097078
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_0309A871
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_030980C0
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_030AD8DB
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_0309F0E9
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_030B00EF
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_0309670B
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_0309EF0C
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_03091F38
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_030AFF58
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_030A5779
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_030A4F74
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_030A9774
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_030A0F86
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_030B07AA
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_030A8FAE
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_030977A3
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_030957B8
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_030B17BD
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_0309BFBE
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_0309E7DE
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_030A67E6
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_03098636
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_0309E640
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_030A2E5D
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_03097E79
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_030A567B
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_0309DE74
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_030A3EAA
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_030B36AA
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_0309C6B8
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_030A0EBC
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_030B46BD
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_030B3EE9
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_030ABEFD
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_030AAD08
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_030A5515
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_030A8D3D
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_030A654A
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_030A7D5B
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_030B2D53
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_030A3D85
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_0309C5D8
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_030AC5D5
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_030955FF
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_030A9DF5
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_006D4A66
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_006CDE74
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_006DB257
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_006C8636
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_006D7A0F
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_006E2009
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_006D654A
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_006D2142
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_006DFF58
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_006DE955
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_006DAD08
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_006C670B
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_006D85FF
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_006DEFDD
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_006CC5D8
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_006E17BD
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_006E0A64
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_006E3263
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_006C7078
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_006C7E79
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_006D567B
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_006DA474
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_006DDC71
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_006CA871
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_006CA445
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_006D4244
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_006CE640
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_006DF840
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_006C7442
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_006D2E5D
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_006CB820
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_006C3431
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_006D8806
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_006D9A01
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_006E00EF
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_006CF0E9
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_006E3EE9
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_006DE4E5
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_006DBEFD
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_006C80C0
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_006DCCD9
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_006DD8DB
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_006DCAD5
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_006E36AA
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_006CBAA9
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_006D3EAA
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_006DA2A5
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_006C1CA1
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_006D0EBC
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_006E46BD
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_006CC6B8
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_006D0ABA
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_006CF369
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_006D5779
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_006C6B7A
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_006D017B
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_006D437A
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_006D4F74
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_006D9774
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_006CD14C
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_006D7D5B
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_006E2D53
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_006D8D3D
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_006C1F38
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_006D5333
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_006CEF0C
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_006E2B09
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_006D5515
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_006D67E6
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_006C4BFC
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_006C55FF
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_006D27F9
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_006DE1F8
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_006D9DF5
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_006D07F4
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_006CE7DE
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_006DFBDE
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_006DC5D5
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_006D8FAE
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_006E07AA
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_006C77A3
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_006DD1BC
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_006CBFBE
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_006C57B8
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_006C238C
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_006CFB8E
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_006D3D85
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_006D6187
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_006D0F86
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_006C2194
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_04992009
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_04987A0F
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_04978636
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_0497A445
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_0497DE74
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_04984A66
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_0498EFDD
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_0497C5D8
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_0498AD08
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_0497670B
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_0498FF58
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_0498654A
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_04982142
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_04980ABA
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_049946BD
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_04980EBC
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_0497C6B8
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_04983EAA
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_049936AA
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_04971CA1
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_0498A2A5
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_0497BAA9
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_0498CCD9
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_0498D8DB
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_0498CAD5
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_049780C0
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_0498BEFD
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_04993EE9
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_049900EF
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_0498E4E5
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_0497F0E9
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_04989A01
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_04988806
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_04973431
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_0497B820
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_04982E5D
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_0498B257
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_04977442
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_0497E640
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_0498F840
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_04984244
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_0498567B
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_0497A871
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_0498DC71
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_0498A474
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_04977E79
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_04977078
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_04993263
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_04990A64
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_04972194
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_0497FB8E
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_0497238C
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_04983D85
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_04980F86
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_04986187
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_0498D1BC
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_049917BD
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_0497BFBE
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_049757B8
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_049907AA
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_049777A3
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_04988FAE
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_0498FBDE
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_0497E7DE
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_0498C5D5
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_0498E1F8
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_049827F9
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_049885FF
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_049755FF
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_04974BFC
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_049807F4
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_04989DF5
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_049867E6
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_04985515
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_04992B09
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_0497EF0C
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_04988D3D
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_04985333
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_04971F38
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_04987D5B
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_04992D53
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_0498E955
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_0497D14C
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_04985779
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_0498437A
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_0498017B
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_04984F74
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_04989774
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_04976B7A
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_0497F369
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 9_2_02E785FF
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 9_2_02E7EFDD
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 9_2_02E83EE9
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 9_2_02E7E4E5
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 9_2_02E800EF
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 9_2_02E6F0E9
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 9_2_02E7BEFD
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 9_2_02E680C0
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 9_2_02E7CAD5
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 9_2_02E7D8DB
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 9_2_02E7CCD9
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 9_2_02E7A2A5
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 9_2_02E836AA
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 9_2_02E61CA1
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 9_2_02E73EAA
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 9_2_02E6BAA9
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 9_2_02E846BD
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 9_2_02E70EBC
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 9_2_02E70ABA
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 9_2_02E6C6B8
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 9_2_02E74A66
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 9_2_02E83263
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 9_2_02E80A64
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 9_2_02E6DE74
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 9_2_02E7A474
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 9_2_02E7DC71
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 9_2_02E6A871
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 9_2_02E7567B
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 9_2_02E67078
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 9_2_02E67E79
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 9_2_02E6A445
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 9_2_02E74244
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 9_2_02E67442
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 9_2_02E6E640
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 9_2_02E7F840
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 9_2_02E7B257
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 9_2_02E72E5D
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 9_2_02E6B820
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 9_2_02E68636
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 9_2_02E63431
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 9_2_02E82009
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 9_2_02E78806
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 9_2_02E79A01
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 9_2_02E77A0F
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 9_2_02E767E6
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 9_2_02E79DF5
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 9_2_02E655FF
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 9_2_02E64BFC
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 9_2_02E7E1F8
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 9_2_02E7C5D5
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 9_2_02E6E7DE
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 9_2_02E6C5D8
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 9_2_02E807AA
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 9_2_02E677A3
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 9_2_02E78FAE
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 9_2_02E817BD
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 9_2_02E6BFBE
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 9_2_02E7D1BC
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 9_2_02E657B8
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 9_2_02E76187
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 9_2_02E70F86
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 9_2_02E73D85
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 9_2_02E6FB8E
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 9_2_02E6238C
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 9_2_02E62194
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 9_2_02E6F369
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 9_2_02E74F74
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 9_2_02E79774
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 9_2_02E66B7A
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 9_2_02E7017B
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 9_2_02E75779
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 9_2_02E72142
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 9_2_02E6D14C
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 9_2_02E7654A
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 9_2_02E7E955
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 9_2_02E82D53
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 9_2_02E77D5B
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 9_2_02E7FF58
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 9_2_02E75333
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 9_2_02E78D3D
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 9_2_02E61F38
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 9_2_02E82B09
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 9_2_02E6EF0C
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 9_2_02E6670B
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 9_2_02E7AD08
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 9_2_02E75515
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: String function: 10017BC1 appears 67 times
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: String function: 1001984C appears 48 times
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: String function: 10017BC1 appears 68 times
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: String function: 1001984C appears 48 times
                      Source: pugKLanrj3.dllBinary or memory string: OriginalFilenameUDPTool.EXE: vs pugKLanrj3.dll
                      Source: pugKLanrj3.dllStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                      Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: sfc.dll
                      Source: pugKLanrj3.dllVirustotal: Detection: 26%
                      Source: pugKLanrj3.dllReversingLabs: Detection: 32%
                      Source: pugKLanrj3.dllStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                      Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                      Source: unknownProcess created: C:\Windows\System32\loaddll32.exe loaddll32.exe "C:\Users\user\Desktop\pugKLanrj3.dll"
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\pugKLanrj3.dll",#1
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\pugKLanrj3.dll
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\pugKLanrj3.dll",#1
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\pugKLanrj3.dll,DllRegisterServer
                      Source: C:\Windows\SysWOW64\regsvr32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\rundll32.exe "C:\Users\user\Desktop\pugKLanrj3.dll",DllRegisterServer
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\rundll32.exe "C:\Users\user\Desktop\pugKLanrj3.dll",DllRegisterServer
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Ubjbeaftth\ufcmfnoys.ulp",EgkecrKVKe
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\rundll32.exe "C:\Windows\System32\Ubjbeaftth\ufcmfnoys.ulp",DllRegisterServer
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\pugKLanrj3.dll",#1
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\pugKLanrj3.dll
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\pugKLanrj3.dll,DllRegisterServer
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\pugKLanrj3.dll",#1
                      Source: C:\Windows\SysWOW64\regsvr32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\rundll32.exe "C:\Users\user\Desktop\pugKLanrj3.dll",DllRegisterServer
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\rundll32.exe "C:\Users\user\Desktop\pugKLanrj3.dll",DllRegisterServer
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Ubjbeaftth\ufcmfnoys.ulp",EgkecrKVKe
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\rundll32.exe "C:\Windows\System32\Ubjbeaftth\ufcmfnoys.ulp",DllRegisterServer
                      Source: C:\Windows\SysWOW64\rundll32.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32
                      Source: classification engineClassification label: mal96.troj.evad.winDLL@21/2@0/28
                      Source: C:\Windows\SysWOW64\rundll32.exeFile read: C:\Users\desktop.iniJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\pugKLanrj3.dll",#1
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_100126F9 FindResourceA,LoadResource,LockResource,FreeResource,
                      Source: C:\Windows\SysWOW64\rundll32.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: pugKLanrj3.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                      Source: pugKLanrj3.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                      Source: pugKLanrj3.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                      Source: pugKLanrj3.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                      Source: pugKLanrj3.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_10019891 push ecx; ret
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_10017C60 push ecx; ret
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_10019891 push ecx; ret
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_10017C60 push ecx; ret
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_03091195 push cs; iretd
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_030A08E0 push esp; iretd
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_006C1195 push cs; iretd
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_04971195 push cs; iretd
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 9_2_02E708E0 push esp; iretd
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 9_2_02E61195 push cs; iretd
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_10023A79 LoadLibraryA,GetProcAddress,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,__invoke_watson,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,__decode_pointer,__decode_pointer,__invoke_watson,__decode_pointer,__decode_pointer,__decode_pointer,
                      Source: pugKLanrj3.dllStatic PE information: real checksum: 0x66354 should be: 0x68650
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\pugKLanrj3.dll
                      Source: C:\Windows\SysWOW64\rundll32.exePE file moved: C:\Windows\SysWOW64\Ubjbeaftth\ufcmfnoys.ulpJump to behavior

                      Hooking and other Techniques for Hiding and Protection:

                      barindex
                      Hides that the sample has been downloaded from the Internet (zone.identifier)Show sources
                      Source: C:\Windows\SysWOW64\rundll32.exeFile opened: C:\Windows\SysWOW64\Ubjbeaftth\ufcmfnoys.ulp:Zone.Identifier read attributes | delete
                      Source: C:\Windows\SysWOW64\rundll32.exeFile opened: C:\Windows\SysWOW64\Xsanfz\urubdibogzamw.hym:Zone.Identifier read attributes | delete
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_1000D804 IsIconic,GetWindowPlacement,GetWindowRect,
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_10008B90 IsIconic,SendMessageA,GetSystemMetrics,GetSystemMetrics,GetClientRect,DrawIcon,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_1000D804 IsIconic,GetWindowPlacement,GetWindowRect,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_10008B90 IsIconic,SendMessageA,GetSystemMetrics,GetSystemMetrics,GetClientRect,DrawIcon,
                      Source: C:\Windows\SysWOW64\rundll32.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\svchost.exe TID: 5380Thread sleep time: -90000s >= -30000s
                      Source: C:\Windows\System32\loaddll32.exeLast function: Thread delayed
                      Source: C:\Windows\SysWOW64\regsvr32.exeEvasive API call chain: GetModuleFileName,DecisionNodes,ExitProcess
                      Source: C:\Windows\SysWOW64\regsvr32.exeAPI coverage: 4.3 %
                      Source: C:\Windows\SysWOW64\rundll32.exeAPI coverage: 4.9 %
                      Source: C:\Windows\SysWOW64\regsvr32.exeAPI call chain: ExitProcess graph end node
                      Source: C:\Windows\SysWOW64\rundll32.exeAPI call chain: ExitProcess graph end node
                      Source: C:\Windows\SysWOW64\rundll32.exeFile Volume queried: C:\ FullSizeInformation
                      Source: svchost.exe, 00000011.00000002.435659671.0000024AA74EF000.00000004.00000001.sdmpBinary or memory string: Hyper-V RAW
                      Source: svchost.exe, 00000011.00000002.435533157.0000024AA7472000.00000004.00000001.sdmpBinary or memory string: Hyper-V RAW`
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_1001C49A _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_10023A79 LoadLibraryA,GetProcAddress,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,__invoke_watson,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,__decode_pointer,__decode_pointer,__invoke_watson,__decode_pointer,__decode_pointer,__decode_pointer,
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_100178B6 GetProcessHeap,GetProcessHeap,HeapAlloc,GetVersionExA,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,__heap_term,__RTC_Initialize,GetCommandLineA,___crtGetEnvironmentStringsA,__ioinit,__mtterm,__setargv,__setenvp,__cinit,__ioterm,__ioterm,__mtterm,__heap_term,___set_flsgetvalue,__calloc_crt,__decode_pointer,__initptd,GetCurrentThreadId,__freeptd,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_0309F7F7 mov eax, dword ptr fs:[00000030h]
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_006CF7F7 mov eax, dword ptr fs:[00000030h]
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_0497F7F7 mov eax, dword ptr fs:[00000030h]
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 9_2_02E6F7F7 mov eax, dword ptr fs:[00000030h]
                      Source: C:\Windows\System32\loaddll32.exeProcess queried: DebugPort
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_1001C49A _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_10021743 __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_100167D5 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_1001FC21 SetUnhandledExceptionFilter,__encode_pointer,
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_1001FC43 __decode_pointer,SetUnhandledExceptionFilter,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_1001C49A _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_10021743 __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_100167D5 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_1001FC21 SetUnhandledExceptionFilter,__encode_pointer,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_1001FC43 __decode_pointer,SetUnhandledExceptionFilter,

                      HIPS / PFW / Operating System Protection Evasion:

                      barindex
                      System process connects to network (likely due to code injection or exploit)Show sources
                      Source: C:\Windows\SysWOW64\rundll32.exeNetwork Connect: 69.16.218.101 144
                      Source: C:\Windows\SysWOW64\rundll32.exeNetwork Connect: 45.138.98.34 80
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\pugKLanrj3.dll",#1
                      Source: rundll32.exe, 0000000A.00000002.817760750.0000000002D70000.00000002.00020000.sdmpBinary or memory string: Program Manager
                      Source: rundll32.exe, 0000000A.00000002.817760750.0000000002D70000.00000002.00020000.sdmpBinary or memory string: Shell_TrayWnd
                      Source: rundll32.exe, 0000000A.00000002.817760750.0000000002D70000.00000002.00020000.sdmpBinary or memory string: Progman
                      Source: rundll32.exe, 0000000A.00000002.817760750.0000000002D70000.00000002.00020000.sdmpBinary or memory string: Progmanlock
                      Source: C:\Windows\SysWOW64\rundll32.exeQueries volume information: C:\ VolumeInformation
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: GetThreadLocale,GetLocaleInfoA,GetACP,
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: _strcpy_s,__snprintf_s,GetLocaleInfoA,LoadLibraryA,
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: GetLocaleInfoA,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetThreadLocale,GetLocaleInfoA,GetACP,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: _strcpy_s,__snprintf_s,GetLocaleInfoA,LoadLibraryA,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetLocaleInfoA,
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_10022853 cpuid
                      Source: C:\Windows\SysWOW64\rundll32.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_1001F914 GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter,
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_100178B6 GetProcessHeap,GetProcessHeap,HeapAlloc,GetVersionExA,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,__heap_term,__RTC_Initialize,GetCommandLineA,___crtGetEnvironmentStringsA,__ioinit,__mtterm,__setargv,__setenvp,__cinit,__ioterm,__ioterm,__mtterm,__heap_term,___set_flsgetvalue,__calloc_crt,__decode_pointer,__initptd,GetCurrentThreadId,__freeptd,

                      Stealing of Sensitive Information:

                      barindex
                      Yara detected EmotetShow sources
                      Source: Yara matchFile source: 7.2.rundll32.exe.4fb0000.5.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.rundll32.exe.6c0000.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.4660000.5.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.rundll32.exe.4fa0000.21.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.rundll32.exe.4a90000.12.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.rundll32.exe.4950000.8.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.rundll32.exe.3090000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.rundll32.exe.4a90000.12.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.rundll32.exe.550000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 7.2.rundll32.exe.47a0000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.rundll32.exe.2e50000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.rundll32.exe.4710000.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.4630000.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.rundll32.exe.2e50000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.rundll32.exe.4fd0000.22.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.rundll32.exe.49b0000.10.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 7.2.rundll32.exe.4ed0000.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.regsvr32.exe.d20000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 9.2.rundll32.exe.2e30000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 7.2.rundll32.exe.4d20000.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.rundll32.exe.4820000.7.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 7.2.rundll32.exe.4fe0000.6.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.4540000.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.rundll32.exe.4ac0000.13.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.rundll32.exe.4e70000.18.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 9.2.rundll32.exe.2e30000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.rundll32.exe.520000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.4960000.10.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.4990000.11.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 9.2.rundll32.exe.2e60000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.47f0000.8.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.rundll32.exe.4710000.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.4570000.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.rundll32.exe.4c70000.16.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.rundll32.exe.5000000.23.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.rundll32.exe.4b90000.14.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.rundll32.exe.720000.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.rundll32.exe.4980000.9.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.rundll32.exe.4ea0000.19.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.rundll32.exe.4e70000.18.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.rundll32.exe.49e0000.11.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 7.2.rundll32.exe.4ea0000.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.regsvr32.exe.ed0000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.4790000.6.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.4790000.6.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.4540000.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.rundll32.exe.4950000.8.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 7.2.rundll32.exe.4ea0000.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 7.2.rundll32.exe.5010000.7.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.rundll32.exe.6c0000.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 7.2.rundll32.exe.4fb0000.5.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 7.2.rundll32.exe.47a0000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.47c0000.7.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.rundll32.exe.4f70000.20.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.rundll32.exe.4f70000.20.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.rundll32.exe.47f0000.6.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.rundll32.exe.4fd0000.22.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.6c0000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.rundll32.exe.4740000.5.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.690000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.rundll32.exe.4bc0000.15.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.rundll32.exe.4b90000.14.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 7.2.rundll32.exe.4970000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.4960000.10.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.rundll32.exe.520000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 7.2.rundll32.exe.4d20000.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.4820000.9.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.rundll32.exe.4ca0000.17.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.690000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.rundll32.exe.47f0000.6.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.regsvr32.exe.d20000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.rundll32.exe.4c70000.16.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.rundll32.exe.49b0000.10.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.4630000.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.47f0000.8.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000007.00000002.308556502.0000000004971000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.312426426.0000000004790000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.303864837.0000000002E50000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000007.00000002.308717246.0000000004ED1000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000009.00000002.312591906.0000000002E30000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.310675126.00000000006C1000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000007.00000002.308496197.00000000047A0000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.818600479.0000000004CA1000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.816263427.0000000000551000.00000020.00000010.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.312707880.0000000004991000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.818149949.0000000004821000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.312062487.0000000004571000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.303938818.0000000003091000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.312157578.0000000004630000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000007.00000002.308585132.0000000004D20000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.303434167.0000000000D20000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.310610436.0000000000690000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.818434536.0000000004B90000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.818253319.00000000049B0000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000007.00000002.308691982.0000000004EA0000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.312211500.0000000004661000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.818342645.0000000004A90000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.816816895.00000000006C0000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.818930567.0000000004F70000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000007.00000002.308783720.0000000004FE1000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.312650834.0000000004960000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.818769110.0000000004E70000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.818077767.0000000004741000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.818990382.0000000004FA1000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.818118455.00000000047F0000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.311999484.0000000004540000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000009.00000002.312633523.0000000002E61000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.818553417.0000000004C70000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.312609575.0000000004821000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.818862903.0000000004EA1000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.818277549.00000000049E1000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.819036173.0000000004FD0000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.818224414.0000000004981000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.818194001.0000000004950000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.819084555.0000000005001000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.312500126.00000000047C1000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.303487631.0000000000ED1000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.816889903.0000000000721000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.816215619.0000000000520000.00000040.00000010.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000007.00000002.308811399.0000000005011000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000007.00000002.308759081.0000000004FB0000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.818044267.0000000004710000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.818377834.0000000004AC1000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.818471974.0000000004BC1000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.312556159.00000000047F0000.00000040.00000001.sdmp, type: MEMORY
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_100011C0 WSAStartup,_memset,htonl,htons,socket,bind,setsockopt,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_100011C0 WSAStartup,_memset,htonl,htons,socket,bind,setsockopt,

                      Mitre Att&ck Matrix

                      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                      Valid AccountsNative API2DLL Side-Loading1DLL Side-Loading1Deobfuscate/Decode Files or Information1Input Capture2System Time Discovery1Remote ServicesArchive Collected Data1Exfiltration Over Other Network MediumIngress Tool Transfer1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                      Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsProcess Injection112Obfuscated Files or Information2LSASS MemoryFile and Directory Discovery1Remote Desktop ProtocolInput Capture2Exfiltration Over BluetoothEncrypted Channel1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                      Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)DLL Side-Loading1Security Account ManagerSystem Information Discovery35SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationNon-Standard Port1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                      Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)File Deletion1NTDSQuery Registry1Distributed Component Object ModelInput CaptureScheduled TransferApplication Layer Protocol1SIM Card SwapCarrier Billing Fraud
                      Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptMasquerading2LSA SecretsSecurity Software Discovery31SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                      Replication Through Removable MediaLaunchdRc.commonRc.commonVirtualization/Sandbox Evasion2Cached Domain CredentialsVirtualization/Sandbox Evasion2VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                      External Remote ServicesScheduled TaskStartup ItemsStartup ItemsProcess Injection112DCSyncProcess Discovery1Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                      Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobHidden Files and Directories1Proc FilesystemApplication Window Discovery1Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
                      Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)Regsvr321/etc/passwd and /etc/shadowRemote System Discovery1Software Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
                      Supply Chain CompromiseAppleScriptAt (Windows)At (Windows)Rundll321Network SniffingProcess DiscoveryTaint Shared ContentLocal Data StagingExfiltration Over Unencrypted/Obfuscated Non-C2 ProtocolFile Transfer ProtocolsData Encrypted for Impact

                      Behavior Graph

                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet
                      behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 553115 Sample: pugKLanrj3 Startdate: 14/01/2022 Architecture: WINDOWS Score: 96 39 210.57.209.142 UNAIR-AS-IDUniversitasAirlanggaID Indonesia 2->39 41 85.214.67.203 STRATOSTRATOAGDE Germany 2->41 43 23 other IPs or domains 2->43 55 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->55 57 Found malware configuration 2->57 59 Multi AV Scanner detection for submitted file 2->59 61 4 other signatures 2->61 9 loaddll32.exe 1 2->9         started        11 svchost.exe 1 2->11         started        13 svchost.exe 1 2->13         started        15 2 other processes 2->15 signatures3 process4 process5 17 rundll32.exe 2 9->17         started        21 cmd.exe 1 9->21         started        23 regsvr32.exe 9->23         started        dnsIp6 37 192.168.2.1 unknown unknown 17->37 53 Hides that the sample has been downloaded from the Internet (zone.identifier) 17->53 25 rundll32.exe 17->25         started        27 rundll32.exe 21->27         started        29 rundll32.exe 23->29         started        signatures7 process8 process9 31 rundll32.exe 25->31         started        35 rundll32.exe 2 27->35         started        dnsIp10 45 45.138.98.34, 49748, 80 M247GB Germany 31->45 47 69.16.218.101, 49749, 8080 LIQUIDWEBUS United States 31->47 49 System process connects to network (likely due to code injection or exploit) 31->49 51 Hides that the sample has been downloaded from the Internet (zone.identifier) 35->51 signatures11

                      Screenshots

                      Thumbnails

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.

                      windows-stand

                      Antivirus, Machine Learning and Genetic Malware Detection

                      Initial Sample

                      SourceDetectionScannerLabelLink
                      pugKLanrj3.dll27%VirustotalBrowse
                      pugKLanrj3.dll33%ReversingLabsWin32.Trojan.Emotet
                      pugKLanrj3.dll100%Joe Sandbox ML

                      Dropped Files

                      No Antivirus matches

                      Unpacked PE Files

                      SourceDetectionScannerLabelLinkDownload
                      3.2.rundll32.exe.3090000.1.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      10.2.rundll32.exe.550000.1.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      10.2.rundll32.exe.4710000.4.unpack100%AviraHEUR/AGEN.1145233Download File
                      4.2.rundll32.exe.47f0000.8.unpack100%AviraHEUR/AGEN.1145233Download File
                      7.2.rundll32.exe.4ed0000.4.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      9.2.rundll32.exe.2e60000.1.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      10.2.rundll32.exe.4820000.7.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      10.2.rundll32.exe.520000.0.unpack100%AviraHEUR/AGEN.1145233Download File
                      4.2.rundll32.exe.4990000.11.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      10.2.rundll32.exe.4a90000.12.unpack100%AviraHEUR/AGEN.1145233Download File
                      3.2.rundll32.exe.2e50000.0.unpack100%AviraHEUR/AGEN.1145233Download File
                      10.2.rundll32.exe.6c0000.2.unpack100%AviraHEUR/AGEN.1145233Download File
                      4.2.rundll32.exe.4660000.5.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      10.2.rundll32.exe.4fa0000.21.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      4.2.rundll32.exe.4630000.4.unpack100%AviraHEUR/AGEN.1145233Download File
                      7.2.rundll32.exe.4fe0000.6.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      4.2.rundll32.exe.4540000.2.unpack100%AviraHEUR/AGEN.1145233Download File
                      4.2.rundll32.exe.4960000.10.unpack100%AviraHEUR/AGEN.1145233Download File
                      10.2.rundll32.exe.4ac0000.13.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      9.2.rundll32.exe.2e30000.0.unpack100%AviraHEUR/AGEN.1145233Download File
                      4.2.rundll32.exe.4570000.3.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      10.2.rundll32.exe.4c70000.16.unpack100%AviraHEUR/AGEN.1145233Download File
                      10.2.rundll32.exe.5000000.23.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      10.2.rundll32.exe.720000.3.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      10.2.rundll32.exe.4e70000.18.unpack100%AviraHEUR/AGEN.1145233Download File
                      10.2.rundll32.exe.4ea0000.19.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      10.2.rundll32.exe.4980000.9.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      10.2.rundll32.exe.49e0000.11.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      7.2.rundll32.exe.4ea0000.3.unpack100%AviraHEUR/AGEN.1145233Download File
                      2.2.regsvr32.exe.ed0000.1.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      4.2.rundll32.exe.4790000.6.unpack100%AviraHEUR/AGEN.1145233Download File
                      7.2.rundll32.exe.4fb0000.5.unpack100%AviraHEUR/AGEN.1145233Download File
                      10.2.rundll32.exe.4950000.8.unpack100%AviraHEUR/AGEN.1145233Download File
                      7.2.rundll32.exe.5010000.7.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      4.2.rundll32.exe.47c0000.7.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      7.2.rundll32.exe.47a0000.0.unpack100%AviraHEUR/AGEN.1145233Download File
                      10.2.rundll32.exe.4f70000.20.unpack100%AviraHEUR/AGEN.1145233Download File
                      10.2.rundll32.exe.4b90000.14.unpack100%AviraHEUR/AGEN.1145233Download File
                      10.2.rundll32.exe.4fd0000.22.unpack100%AviraHEUR/AGEN.1145233Download File
                      4.2.rundll32.exe.690000.0.unpack100%AviraHEUR/AGEN.1145233Download File
                      4.2.rundll32.exe.6c0000.1.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      7.2.rundll32.exe.4970000.1.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      10.2.rundll32.exe.4bc0000.15.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      10.2.rundll32.exe.4740000.5.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      7.2.rundll32.exe.4d20000.2.unpack100%AviraHEUR/AGEN.1145233Download File
                      2.2.regsvr32.exe.d20000.0.unpack100%AviraHEUR/AGEN.1145233Download File
                      4.2.rundll32.exe.4820000.9.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      10.2.rundll32.exe.4ca0000.17.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      10.2.rundll32.exe.47f0000.6.unpack100%AviraHEUR/AGEN.1145233Download File
                      10.2.rundll32.exe.49b0000.10.unpack100%AviraHEUR/AGEN.1145233Download File

                      Domains

                      SourceDetectionScannerLabelLink
                      windowsupdate.s.llnwi.net0%VirustotalBrowse

                      URLs

                      SourceDetectionScannerLabelLink
                      https://www.disneyplus.com/legal/your-california-privacy-rights0%URL Reputationsafe
                      http://crl.ver)0%Avira URL Cloudsafe
                      https://www.disneyplus.com/legal/privacy-policy0%URL Reputationsafe
                      https://www.tiktok.com/legal/report/feedback0%URL Reputationsafe
                      http://help.disneyplus.com.0%URL Reputationsafe
                      https://disneyplus.com/legal.0%URL Reputationsafe

                      Domains and IPs

                      Contacted Domains

                      NameIPActiveMaliciousAntivirus DetectionReputation
                      windowsupdate.s.llnwi.net
                      41.63.96.128
                      truefalseunknown

                      URLs from Memory and Binaries

                      NameSourceMaliciousAntivirus DetectionReputation
                      https://www.disneyplus.com/legal/your-california-privacy-rightssvchost.exe, 00000011.00000003.408016367.0000024AA7D92000.00000004.00000001.sdmp, svchost.exe, 00000011.00000003.408127045.0000024AA7DB3000.00000004.00000001.sdmp, svchost.exe, 00000011.00000003.408267129.0000024AA8202000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://crl.ver)svchost.exe, 00000011.00000002.435659671.0000024AA74EF000.00000004.00000001.sdmpfalse
                      • Avira URL Cloud: safe
                      low
                      https://www.disneyplus.com/legal/privacy-policysvchost.exe, 00000011.00000003.408016367.0000024AA7D92000.00000004.00000001.sdmp, svchost.exe, 00000011.00000003.408127045.0000024AA7DB3000.00000004.00000001.sdmp, svchost.exe, 00000011.00000003.408267129.0000024AA8202000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      https://www.tiktok.com/legal/report/feedbacksvchost.exe, 00000011.00000003.411715639.0000024AA7DB3000.00000004.00000001.sdmp, svchost.exe, 00000011.00000003.411696063.0000024AA7D92000.00000004.00000001.sdmp, svchost.exe, 00000011.00000003.411749032.0000024AA8202000.00000004.00000001.sdmp, svchost.exe, 00000011.00000003.413775795.0000024AA7D8E000.00000004.00000001.sdmp, svchost.exe, 00000011.00000003.411646731.0000024AA7DCA000.00000004.00000001.sdmp, svchost.exe, 00000011.00000003.411611343.0000024AA7DCA000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://help.disneyplus.com.svchost.exe, 00000011.00000003.408016367.0000024AA7D92000.00000004.00000001.sdmp, svchost.exe, 00000011.00000003.408127045.0000024AA7DB3000.00000004.00000001.sdmp, svchost.exe, 00000011.00000003.408267129.0000024AA8202000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      https://disneyplus.com/legal.svchost.exe, 00000011.00000003.408016367.0000024AA7D92000.00000004.00000001.sdmp, svchost.exe, 00000011.00000003.408127045.0000024AA7DB3000.00000004.00000001.sdmp, svchost.exe, 00000011.00000003.408267129.0000024AA8202000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      unknown

                      Contacted IPs

                      • No. of IPs < 25%
                      • 25% < No. of IPs < 50%
                      • 50% < No. of IPs < 75%
                      • 75% < No. of IPs

                      Public

                      IPDomainCountryFlagASNASN NameMalicious
                      207.148.81.119
                      unknownUnited States
                      20473AS-CHOOPAUStrue
                      104.131.62.48
                      unknownUnited States
                      14061DIGITALOCEAN-ASNUStrue
                      85.214.67.203
                      unknownGermany
                      6724STRATOSTRATOAGDEtrue
                      191.252.103.16
                      unknownBrazil
                      27715LocawebServicosdeInternetSABRtrue
                      168.197.250.14
                      unknownArgentina
                      264776OmarAnselmoRipollTDCNETARtrue
                      66.42.57.149
                      unknownUnited States
                      20473AS-CHOOPAUStrue
                      185.148.168.15
                      unknownGermany
                      44780EVERSCALE-ASDEtrue
                      51.210.242.234
                      unknownFrance
                      16276OVHFRtrue
                      217.182.143.207
                      unknownFrance
                      16276OVHFRtrue
                      69.16.218.101
                      unknownUnited States
                      32244LIQUIDWEBUStrue
                      159.69.237.188
                      unknownGermany
                      24940HETZNER-ASDEtrue
                      45.138.98.34
                      unknownGermany
                      9009M247GBtrue
                      116.124.128.206
                      unknownKorea Republic of
                      9318SKB-ASSKBroadbandCoLtdKRtrue
                      78.46.73.125
                      unknownGermany
                      24940HETZNER-ASDEtrue
                      37.59.209.141
                      unknownFrance
                      16276OVHFRtrue
                      210.57.209.142
                      unknownIndonesia
                      38142UNAIR-AS-IDUniversitasAirlanggaIDtrue
                      185.148.168.220
                      unknownGermany
                      44780EVERSCALE-ASDEtrue
                      54.37.228.122
                      unknownFrance
                      16276OVHFRtrue
                      190.90.233.66
                      unknownColombia
                      18678INTERNEXASAESPCOtrue
                      142.4.219.173
                      unknownCanada
                      16276OVHFRtrue
                      54.38.242.185
                      unknownFrance
                      16276OVHFRtrue
                      195.154.146.35
                      unknownFrance
                      12876OnlineSASFRtrue
                      195.77.239.39
                      unknownSpain
                      60493FICOSA-ASEStrue
                      78.47.204.80
                      unknownGermany
                      24940HETZNER-ASDEtrue
                      37.44.244.177
                      unknownGermany
                      47583AS-HOSTINGERLTtrue
                      62.171.178.147
                      unknownUnited Kingdom
                      51167CONTABODEtrue
                      128.199.192.135
                      unknownUnited Kingdom
                      14061DIGITALOCEAN-ASNUStrue

                      Private

                      IP
                      192.168.2.1

                      General Information

                      Joe Sandbox Version:34.0.0 Boulder Opal
                      Analysis ID:553115
                      Start date:14.01.2022
                      Start time:10:38:21
                      Joe Sandbox Product:CloudBasic
                      Overall analysis duration:0h 13m 56s
                      Hypervisor based Inspection enabled:false
                      Report type:light
                      Sample file name:pugKLanrj3 (renamed file extension from none to dll)
                      Cookbook file name:default.jbs
                      Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                      Number of analysed new started processes analysed:28
                      Number of new started drivers analysed:0
                      Number of existing processes analysed:0
                      Number of existing drivers analysed:0
                      Number of injected processes analysed:0
                      Technologies:
                      • HCA enabled
                      • EGA enabled
                      • HDC enabled
                      • AMSI enabled
                      Analysis Mode:default
                      Analysis stop reason:Timeout
                      Detection:MAL
                      Classification:mal96.troj.evad.winDLL@21/2@0/28
                      EGA Information:
                      • Successful, ratio: 100%
                      HDC Information:
                      • Successful, ratio: 43.3% (good quality ratio 41.2%)
                      • Quality average: 76.7%
                      • Quality standard deviation: 28.1%
                      HCA Information:
                      • Successful, ratio: 100%
                      • Number of executed functions: 0
                      • Number of non-executed functions: 0
                      Cookbook Comments:
                      • Adjust boot time
                      • Enable AMSI
                      • Override analysis time to 240s for rundll32
                      Warnings:
                      Show All
                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, WMIADAP.exe, backgroundTaskHost.exe, conhost.exe, wuapihost.exe
                      • Excluded IPs from analysis (whitelisted): 23.211.6.115, 173.222.108.210, 173.222.108.226, 40.91.112.76, 20.54.110.249
                      • Excluded domains from analysis (whitelisted): client.wns.windows.com, displaycatalog-rp-uswest.md.mp.microsoft.com.akadns.net, displaycatalog-rp-europe.md.mp.microsoft.com.akadns.net, wu-shim.trafficmanager.net, neu-displaycatalogrp.frontdoor.bigcatalog.commerce.microsoft.com, store-images.s-microsoft.com-c.edgekey.net, ctldl.windowsupdate.com, a767.dspw65.akamai.net, wus2-displaycatalogrp.frontdoor.bigcatalog.commerce.microsoft.com, arc.msn.com, download.windowsupdate.com.edgesuite.net, ris.api.iris.microsoft.com, e12564.dspb.akamaiedge.net, consumer-displaycatalogrp-aks2aks-europe.md.mp.microsoft.com.akadns.net, store-images.s-microsoft.com, consumer-displaycatalogrp-aks2aks-uswest.md.mp.microsoft.com.akadns.net, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, displaycatalog-rp.md.mp.microsoft.com.akadns.net
                      • Not all processes where analyzed, report is missing behavior information
                      • Report creation exceeded maximum time and may have missing disassembly code information.
                      • Report size exceeded maximum capacity and may have missing behavior information.
                      • Report size getting too big, too many NtOpenKeyEx calls found.
                      • Report size getting too big, too many NtProtectVirtualMemory calls found.
                      • Report size getting too big, too many NtQueryValueKey calls found.

                      Simulations

                      Behavior and APIs

                      TimeTypeDescription
                      10:40:12API Interceptor7x Sleep call for process: svchost.exe modified

                      Joe Sandbox View / Context

                      IPs

                      No context

                      Domains

                      No context

                      ASN

                      No context

                      JA3 Fingerprints

                      No context

                      Dropped Files

                      No context

                      Created / dropped Files

                      C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
                      Process:C:\Windows\SysWOW64\rundll32.exe
                      File Type:Microsoft Cabinet archive data, 61414 bytes, 1 file
                      Category:dropped
                      Size (bytes):61414
                      Entropy (8bit):7.995245868798237
                      Encrypted:true
                      SSDEEP:1536:EysgU6qmzixT64jYMZ8HbVPGfVDwm/xLZ9rP:wF6qmeo4eH1m9wmLvrP
                      MD5:ACAEDA60C79C6BCAC925EEB3653F45E0
                      SHA1:2AAAE490BCDACCC6172240FF1697753B37AC5578
                      SHA-256:6B0CECCF0103AFD89844761417C1D23ACC41F8AEBF3B7230765209B61EEE5658
                      SHA-512:FEAA6E7ED7DDA1583739B3E531AB5C562A222EE6ECD042690AE7DCFF966717C6E968469A7797265A11F6E899479AE0F3031E8CF5BEBE1492D5205E9C59690900
                      Malicious:false
                      Preview: MSCF............,...................I.......;w........RSNj .authroot.stl..>.(.5..CK..8T....c_.d...A.K...+.d.H..*i.RJJ.IQIR..$t)Kd.-[..T\{..ne......<.w......A..B........c...wi......D....c.0D,L........fy....Rg...=........i,3.3..Z....~^ve<...TF.*...f.zy.,...m.@.0.0...m.3..I(..+..v#...(.2....e...L..*y..V.......~U...."<ke.....l.X:Dt..R<7.5\A7L0=..T.V...IDr..8<....r&...I-.^..b.b.".Af....E.._..r.>.`;,.Hob..S.....7'..\.R$.".g..+..64..@nP.....k3...B.`.G..@D.....L.....`^...#OpW.....!....`.....rf:.}.R.@....gR.#7....l..H.#...d.Qh..3..fCX....==#..M.l..~&....[.J9.\..Ww.....Tx.%....]..a4E...q.+...#.*a..x..O..V.t..Y1!.T..`U...-...< _@...|(.....0..3.`.LU...E0.Gu.4KN....5...?.....I.p..'..........N<.d.O..dH@c1t...[w/...T....cYK.X>.0..Z.....O>..9.3.#9X.%.b...5.YK.E.V.....`./.3.._..nN]..=..M.o.F.._..z....._...gY..!Z..?l....vp.l.:.d.Z..W.....~...N.._.k...&.....$......i.F.d.....D!e.....Y..,.E..m.;.1... $.F..O.F.o_}.uG....,.%.>,.Zx.......o....c../.;....g&.....
                      C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
                      Process:C:\Windows\SysWOW64\rundll32.exe
                      File Type:data
                      Category:modified
                      Size (bytes):328
                      Entropy (8bit):3.1040605941295265
                      Encrypted:false
                      SSDEEP:6:kKD1k8SN+SkQlPlEGYRMY9z+4KlDA3RUeYlUmlUR/t:x9kPlE99SNxAhUeYlUSA/t
                      MD5:3165402E7A19F508711A928F33305265
                      SHA1:27301CC78DC6AFA0C5B2D96AAA8B6351CB1E7B1F
                      SHA-256:9DF712961C4297F889E07FA91321C8C5F93C230A8518D498955136645E952B01
                      SHA-512:58BFBBCF9A1A72383661F88E843F3B49D589FE4697C38123DB7F92717D6F83ED135AAE063F654666D35E756FFB9DE183009986DE574CC35CD9E9959BBC12FD54
                      Malicious:false
                      Preview: p...... .........@d.v...(....................................................... ........q.\].......&...............h.t.t.p.:././.c.t.l.d.l...w.i.n.d.o.w.s.u.p.d.a.t.e...c.o.m./.m.s.d.o.w.n.l.o.a.d./.u.p.d.a.t.e./.v.3./.s.t.a.t.i.c./.t.r.u.s.t.e.d.r./.e.n./.a.u.t.h.r.o.o.t.s.t.l...c.a.b...".0.7.1.e.1.5.c.5.d.c.4.d.7.1.:.0."...

                      Static File Info

                      General

                      File type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                      Entropy (8bit):7.087986434992125
                      TrID:
                      • Win32 Dynamic Link Library (generic) (1002004/3) 95.65%
                      • Win32 EXE PECompact compressed (generic) (41571/9) 3.97%
                      • Generic Win/DOS Executable (2004/3) 0.19%
                      • DOS Executable Generic (2002/1) 0.19%
                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                      File name:pugKLanrj3.dll
                      File size:417792
                      MD5:db9535477013554eb17c837e6bd92324
                      SHA1:ba4fa056de631759ffa5600dd1142a1280d2f051
                      SHA256:df234584db0c8aa194c6873b78c8ae0018f0c5f445c5c8a2e90c5e3131310ad0
                      SHA512:2fbcd09418989912d97ca8254db3af942902d9c7cb4039089e5fb55e7d3bddc565b7184df4e3bd8cf27ccf5b17f4ab6f5c2ee36470f461e6c73d2de7c1723076
                      SSDEEP:6144:o1ju3jPam65ucnNgDoDUhuGGwKveuv4VKYjHyCAJOhrmBlDxqms9ujAJKedmL/:yMjcuDaUIm9StJorohvsMjmKe
                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......Z'...F...F...F...I...F...I...F...F...D..9....F..9....F..9....F..9....F..9....F..9....F..Rich.F..................PE..L...k+.a...

                      File Icon

                      Icon Hash:71b018ccc6577131

                      Static PE Info

                      General

                      Entrypoint:0x10017b85
                      Entrypoint Section:.text
                      Digitally signed:false
                      Imagebase:0x10000000
                      Subsystem:windows gui
                      Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE, DLL
                      DLL Characteristics:
                      Time Stamp:0x61E02B6B [Thu Jan 13 13:38:51 2022 UTC]
                      TLS Callbacks:
                      CLR (.Net) Version:
                      OS Version Major:4
                      OS Version Minor:0
                      File Version Major:4
                      File Version Minor:0
                      Subsystem Version Major:4
                      Subsystem Version Minor:0
                      Import Hash:90add561a8bf6976696c056c199a41b8

                      Entrypoint Preview

                      Instruction
                      cmp dword ptr [esp+08h], 01h
                      jne 00007FBB809BE3A7h
                      call 00007FBB809C6128h
                      push dword ptr [esp+04h]
                      mov ecx, dword ptr [esp+10h]
                      mov edx, dword ptr [esp+0Ch]
                      call 00007FBB809BE292h
                      pop ecx
                      retn 000Ch
                      push 00000000h
                      push dword ptr [esp+14h]
                      push dword ptr [esp+14h]
                      push dword ptr [esp+14h]
                      push dword ptr [esp+14h]
                      call 00007FBB809C6190h
                      add esp, 14h
                      ret
                      push eax
                      push dword ptr fs:[00000000h]
                      lea eax, dword ptr [esp+0Ch]
                      sub esp, dword ptr [esp+0Ch]
                      push ebx
                      push esi
                      push edi
                      mov dword ptr [eax], ebp
                      mov ebp, eax
                      mov eax, dword ptr [10057A08h]
                      xor eax, ebp
                      push eax
                      push dword ptr [ebp-04h]
                      mov dword ptr [ebp-04h], FFFFFFFFh
                      lea eax, dword ptr [ebp-0Ch]
                      mov dword ptr fs:[00000000h], eax
                      ret
                      push eax
                      push dword ptr fs:[00000000h]
                      lea eax, dword ptr [esp+0Ch]
                      sub esp, dword ptr [esp+0Ch]
                      push ebx
                      push esi
                      push edi
                      mov dword ptr [eax], ebp
                      mov ebp, eax
                      mov eax, dword ptr [10057A08h]
                      xor eax, ebp
                      push eax
                      mov dword ptr [ebp-10h], esp
                      push dword ptr [ebp-04h]
                      mov dword ptr [ebp-04h], FFFFFFFFh
                      lea eax, dword ptr [ebp-0Ch]
                      mov dword ptr fs:[00000000h], eax
                      ret
                      push eax
                      push dword ptr fs:[00000000h]
                      lea eax, dword ptr [esp+0Ch]
                      sub esp, dword ptr [esp+0Ch]
                      push ebx
                      push esi
                      push edi
                      mov dword ptr [eax], ebp
                      mov ebp, eax
                      mov eax, dword ptr [10057A08h]
                      xor eax, ebp
                      push eax
                      mov dword ptr [ebp-10h], eax

                      Rich Headers

                      Programming Language:
                      • [RES] VS2005 build 50727
                      • [ C ] VS2005 build 50727
                      • [EXP] VS2005 build 50727
                      • [C++] VS2005 build 50727
                      • [ASM] VS2005 build 50727
                      • [LNK] VS2005 build 50727

                      Data Directories

                      NameVirtual AddressVirtual Size Is in Section
                      IMAGE_DIRECTORY_ENTRY_EXPORT0x313c00x50.rdata
                      IMAGE_DIRECTORY_ENTRY_IMPORT0x2fdcc0xb4.rdata
                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x5d0000x3664.rsrc
                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x610000x3df4.reloc
                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x2cd600x40.rdata
                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_IAT0x290000x440.rdata
                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x2fd440x40.rdata
                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                      Sections

                      NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                      .text0x10000x27f5e0x28000False0.514996337891data6.66251942868IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                      .rdata0x290000x84100x9000False0.308892144097data4.83079972455IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .data0x320000x2a9a00x27000False0.963572966747data7.93281036967IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                      .rsrc0x5d0000x36640x4000False0.274780273438data4.49622273105IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .reloc0x610000x82840x9000False0.33251953125data3.82081999119IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                      Resources

                      NameRVASizeTypeLanguageCountry
                      RT_CURSOR0x5db080x134dataChineseChina
                      RT_CURSOR0x5dc3c0xb4dataChineseChina
                      RT_CURSOR0x5dcf00x134AmigaOS bitmap fontChineseChina
                      RT_CURSOR0x5de240x134dataChineseChina
                      RT_CURSOR0x5df580x134dataChineseChina
                      RT_CURSOR0x5e08c0x134dataChineseChina
                      RT_CURSOR0x5e1c00x134dataChineseChina
                      RT_CURSOR0x5e2f40x134dataChineseChina
                      RT_CURSOR0x5e4280x134dataChineseChina
                      RT_CURSOR0x5e55c0x134dataChineseChina
                      RT_CURSOR0x5e6900x134dataChineseChina
                      RT_CURSOR0x5e7c40x134dataChineseChina
                      RT_CURSOR0x5e8f80x134AmigaOS bitmap fontChineseChina
                      RT_CURSOR0x5ea2c0x134dataChineseChina
                      RT_CURSOR0x5eb600x134dataChineseChina
                      RT_CURSOR0x5ec940x134dataChineseChina
                      RT_BITMAP0x5edc80xb8dataChineseChina
                      RT_BITMAP0x5ee800x144dataChineseChina
                      RT_ICON0x5efc40x2e8dBase IV DBT of @.DBF, block length 512, next free block index 40, next free block 67108992, next used block 3293332676ChineseChina
                      RT_ICON0x5f2ac0x128GLS_BINARY_LSB_FIRSTChineseChina
                      RT_DIALOG0x5f3d40x33cdataChineseChina
                      RT_DIALOG0x5f7100xe2dataChineseChina
                      RT_DIALOG0x5f7f40x34dataChineseChina
                      RT_STRING0x5f8280x54dataChineseChina
                      RT_STRING0x5f87c0x2cdataChineseChina
                      RT_STRING0x5f8a80x82dataChineseChina
                      RT_STRING0x5f92c0x1d0dataChineseChina
                      RT_STRING0x5fafc0x164dataChineseChina
                      RT_STRING0x5fc600x132dataChineseChina
                      RT_STRING0x5fd940x50dataChineseChina
                      RT_STRING0x5fde40x40dataChineseChina
                      RT_STRING0x5fe240x6adataChineseChina
                      RT_STRING0x5fe900x1d6dataChineseChina
                      RT_STRING0x600680x110dataChineseChina
                      RT_STRING0x601780x24dataChineseChina
                      RT_STRING0x6019c0x30dataChineseChina
                      RT_GROUP_CURSOR0x601cc0x22Lotus unknown worksheet or configuration, revision 0x2ChineseChina
                      RT_GROUP_CURSOR0x601f00x14Lotus unknown worksheet or configuration, revision 0x1ChineseChina
                      RT_GROUP_CURSOR0x602040x14Lotus unknown worksheet or configuration, revision 0x1ChineseChina
                      RT_GROUP_CURSOR0x602180x14Lotus unknown worksheet or configuration, revision 0x1ChineseChina
                      RT_GROUP_CURSOR0x6022c0x14Lotus unknown worksheet or configuration, revision 0x1ChineseChina
                      RT_GROUP_CURSOR0x602400x14Lotus unknown worksheet or configuration, revision 0x1ChineseChina
                      RT_GROUP_CURSOR0x602540x14Lotus unknown worksheet or configuration, revision 0x1ChineseChina
                      RT_GROUP_CURSOR0x602680x14Lotus unknown worksheet or configuration, revision 0x1ChineseChina
                      RT_GROUP_CURSOR0x6027c0x14Lotus unknown worksheet or configuration, revision 0x1ChineseChina
                      RT_GROUP_CURSOR0x602900x14Lotus unknown worksheet or configuration, revision 0x1ChineseChina
                      RT_GROUP_CURSOR0x602a40x14Lotus unknown worksheet or configuration, revision 0x1ChineseChina
                      RT_GROUP_CURSOR0x602b80x14Lotus unknown worksheet or configuration, revision 0x1ChineseChina
                      RT_GROUP_CURSOR0x602cc0x14Lotus unknown worksheet or configuration, revision 0x1ChineseChina
                      RT_GROUP_CURSOR0x602e00x14Lotus unknown worksheet or configuration, revision 0x1ChineseChina
                      RT_GROUP_CURSOR0x602f40x14Lotus unknown worksheet or configuration, revision 0x1ChineseChina
                      RT_GROUP_ICON0x603080x22dataChineseChina
                      RT_VERSION0x6032c0x2e0dataChineseChina
                      RT_MANIFEST0x6060c0x56ASCII text, with CRLF line terminatorsEnglishUnited States

                      Imports

                      DLLImport
                      KERNEL32.dllCreateFileA, GetCPInfo, GetOEMCP, RtlUnwind, HeapReAlloc, GetCommandLineA, RaiseException, ExitProcess, HeapSize, HeapDestroy, HeapCreate, TerminateProcess, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsDebuggerPresent, GetACP, LCMapStringW, GetStdHandle, SetHandleCount, GetFileType, GetStartupInfoA, FreeEnvironmentStringsA, GetEnvironmentStrings, FreeEnvironmentStringsW, GetEnvironmentStringsW, QueryPerformanceCounter, GetTickCount, GetSystemTimeAsFileTime, GetConsoleCP, GetConsoleMode, GetStringTypeA, GetStringTypeW, SetStdHandle, WriteConsoleA, GetConsoleOutputCP, WriteConsoleW, GetCurrentProcess, GetThreadLocale, FlushFileBuffers, SetFilePointer, WriteFile, ReadFile, GlobalFlags, WritePrivateProfileStringA, TlsFree, DeleteCriticalSection, LocalReAlloc, TlsSetValue, TlsAlloc, InitializeCriticalSection, GlobalHandle, GlobalReAlloc, EnterCriticalSection, TlsGetValue, LeaveCriticalSection, LocalAlloc, InterlockedIncrement, GlobalGetAtomNameA, GlobalFindAtomA, lstrcmpW, GetVersionExA, InterlockedDecrement, FreeResource, GetCurrentProcessId, GlobalAddAtomA, GetCurrentThread, GetCurrentThreadId, ConvertDefaultLocale, GetModuleFileNameA, EnumResourceLanguagesA, GetLocaleInfoA, lstrcmpA, GlobalDeleteAtom, GetModuleHandleA, GlobalFree, GlobalAlloc, GlobalLock, GlobalUnlock, FormatMessageA, LocalFree, FindResourceA, LoadResource, LockResource, SizeofResource, MulDiv, CreateThread, CloseHandle, HeapFree, GetNativeSystemInfo, GetProcessHeap, HeapAlloc, FreeLibrary, GetProcAddress, LoadLibraryA, IsBadReadPtr, VirtualProtect, SetLastError, VirtualAlloc, VirtualFree, VirtualQuery, Sleep, GetLastError, lstrlenA, WideCharToMultiByte, CompareStringA, MultiByteToWideChar, GetVersion, LCMapStringA, InterlockedExchange
                      USER32.dllLoadCursorA, GetSysColorBrush, EndPaint, BeginPaint, ReleaseDC, GetDC, ClientToScreen, GrayStringA, DrawTextExA, DrawTextA, TabbedTextOutA, SetWindowTextA, IsDialogMessageA, SetDlgItemTextA, GetDlgItemTextA, RegisterWindowMessageA, SendDlgItemMessageA, WinHelpA, GetCapture, GetClassLongA, GetClassNameA, SetPropA, GetPropA, RemovePropA, SetFocus, GetWindowTextLengthA, GetWindowTextA, GetForegroundWindow, GetTopWindow, GetMessageTime, MapWindowPoints, SetForegroundWindow, UpdateWindow, GetMenu, CreateWindowExA, GetClassInfoExA, GetClassInfoA, RegisterClassA, GetSysColor, CopyRect, PtInRect, GetDlgCtrlID, DefWindowProcA, CallWindowProcA, SetWindowLongA, SetWindowPos, SystemParametersInfoA, GetWindowPlacement, GetWindowRect, GetWindow, UnhookWindowsHookEx, GetDesktopWindow, SetActiveWindow, CreateDialogIndirectParamA, DestroyWindow, IsWindow, GetDlgItem, GetNextDlgTabItem, EndDialog, GetWindowThreadProcessId, GetWindowLongA, GetLastActivePopup, IsWindowEnabled, MessageBoxA, SetCursor, SetWindowsHookExA, CallNextHookEx, GetMessageA, TranslateMessage, DispatchMessageA, GetActiveWindow, IsWindowVisible, GetKeyState, PeekMessageA, GetCursorPos, ValidateRect, SetMenuItemBitmaps, DestroyMenu, UnregisterClassA, GetMessagePos, GetMenuCheckMarkDimensions, LoadBitmapA, GetFocus, GetParent, ModifyMenuA, EnableMenuItem, CheckMenuItem, PostQuitMessage, GetMenuState, GetMenuItemID, GetMenuItemCount, GetSubMenu, SetTimer, KillTimer, IsIconic, GetSystemMetrics, GetClientRect, DrawIcon, SendMessageA, ShowWindow, EnableWindow, LoadIconA, PostMessageA, AdjustWindowRectEx
                      GDI32.dllSetWindowExtEx, ScaleWindowExtEx, DeleteDC, GetStockObject, ScaleViewportExtEx, SetViewportExtEx, OffsetViewportOrgEx, SetViewportOrgEx, SelectObject, Escape, ExtTextOutA, TextOutA, RectVisible, PtVisible, GetDeviceCaps, DeleteObject, SetMapMode, RestoreDC, SaveDC, GetObjectA, SetBkColor, SetTextColor, GetClipBox, CreateBitmap
                      WINSPOOL.DRVDocumentPropertiesA, ClosePrinter, OpenPrinterA
                      ADVAPI32.dllRegSetValueExA, RegCreateKeyExA, RegQueryValueA, RegEnumKeyA, RegDeleteKeyA, RegOpenKeyExA, RegQueryValueExA, RegOpenKeyA, RegCloseKey
                      SHLWAPI.dllPathFindExtensionA
                      OLEAUT32.dllVariantClear, VariantChangeType, VariantInit
                      WS2_32.dllsendto, recvfrom, WSAStartup, inet_addr, htons, socket, bind, setsockopt, WSACleanup, closesocket, htonl

                      Exports

                      NameOrdinalAddress
                      DllRegisterServer10x10008af0

                      Version Infos

                      DescriptionData
                      LegalCopyright (C) 2014
                      InternalNameUDPTool
                      FileVersion1, 0, 0, 1
                      CompanyName
                      LegalTrademarks
                      ProductNameUDPTool
                      ProductVersion1, 0, 0, 1
                      FileDescriptionUDPTool Microsoft
                      OriginalFilenameUDPTool.EXE
                      Translation0x0804 0x04b0

                      Possible Origin

                      Language of compilation systemCountry where language is spokenMap
                      ChineseChina
                      EnglishUnited States

                      Network Behavior

                      Snort IDS Alerts

                      TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                      01/14/22-10:39:39.106239TCP2404332ET CNC Feodo Tracker Reported CnC Server TCP group 174974880192.168.2.345.138.98.34
                      01/14/22-10:39:40.292302TCP2404338ET CNC Feodo Tracker Reported CnC Server TCP group 20497498080192.168.2.369.16.218.101

                      Network Port Distribution

                      TCP Packets

                      TimestampSource PortDest PortSource IPDest IP
                      Jan 14, 2022 10:39:39.106239080 CET4974880192.168.2.345.138.98.34
                      Jan 14, 2022 10:39:39.123187065 CET804974845.138.98.34192.168.2.3
                      Jan 14, 2022 10:39:39.689399004 CET4974880192.168.2.345.138.98.34
                      Jan 14, 2022 10:39:39.706671953 CET804974845.138.98.34192.168.2.3
                      Jan 14, 2022 10:39:40.267855883 CET4974880192.168.2.345.138.98.34
                      Jan 14, 2022 10:39:40.284703016 CET804974845.138.98.34192.168.2.3
                      Jan 14, 2022 10:39:40.292301893 CET497498080192.168.2.369.16.218.101
                      Jan 14, 2022 10:39:40.421871901 CET80804974969.16.218.101192.168.2.3
                      Jan 14, 2022 10:39:40.422004938 CET497498080192.168.2.369.16.218.101
                      Jan 14, 2022 10:39:40.440761089 CET497498080192.168.2.369.16.218.101
                      Jan 14, 2022 10:39:40.571970940 CET80804974969.16.218.101192.168.2.3
                      Jan 14, 2022 10:39:40.584789991 CET80804974969.16.218.101192.168.2.3
                      Jan 14, 2022 10:39:40.584814072 CET80804974969.16.218.101192.168.2.3
                      Jan 14, 2022 10:39:40.585019112 CET497498080192.168.2.369.16.218.101
                      Jan 14, 2022 10:39:43.453438044 CET497498080192.168.2.369.16.218.101
                      Jan 14, 2022 10:39:43.583108902 CET80804974969.16.218.101192.168.2.3
                      Jan 14, 2022 10:39:43.583679914 CET80804974969.16.218.101192.168.2.3
                      Jan 14, 2022 10:39:43.583842039 CET497498080192.168.2.369.16.218.101
                      Jan 14, 2022 10:39:43.587878942 CET497498080192.168.2.369.16.218.101
                      Jan 14, 2022 10:39:43.717506886 CET80804974969.16.218.101192.168.2.3
                      Jan 14, 2022 10:39:44.243675947 CET80804974969.16.218.101192.168.2.3
                      Jan 14, 2022 10:39:44.246721029 CET497498080192.168.2.369.16.218.101
                      Jan 14, 2022 10:39:47.259376049 CET80804974969.16.218.101192.168.2.3
                      Jan 14, 2022 10:39:47.259411097 CET80804974969.16.218.101192.168.2.3
                      Jan 14, 2022 10:39:47.259488106 CET497498080192.168.2.369.16.218.101
                      Jan 14, 2022 10:41:29.087491035 CET497498080192.168.2.369.16.218.101
                      Jan 14, 2022 10:41:29.087542057 CET497498080192.168.2.369.16.218.101

                      DNS Answers

                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                      Jan 14, 2022 10:40:06.500219107 CET8.8.8.8192.168.2.30x6605No error (0)windowsupdate.s.llnwi.net41.63.96.128A (IP address)IN (0x0001)

                      Code Manipulations

                      Statistics

                      Behavior

                      Click to jump to process

                      System Behavior

                      General

                      Start time:10:39:19
                      Start date:14/01/2022
                      Path:C:\Windows\System32\loaddll32.exe
                      Wow64 process (32bit):true
                      Commandline:loaddll32.exe "C:\Users\user\Desktop\pugKLanrj3.dll"
                      Imagebase:0xe50000
                      File size:116736 bytes
                      MD5 hash:7DEB5DB86C0AC789123DEC286286B938
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:moderate

                      General

                      Start time:10:39:19
                      Start date:14/01/2022
                      Path:C:\Windows\SysWOW64\cmd.exe
                      Wow64 process (32bit):true
                      Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\pugKLanrj3.dll",#1
                      Imagebase:0xd80000
                      File size:232960 bytes
                      MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high

                      General

                      Start time:10:39:20
                      Start date:14/01/2022
                      Path:C:\Windows\SysWOW64\regsvr32.exe
                      Wow64 process (32bit):true
                      Commandline:regsvr32.exe /s C:\Users\user\Desktop\pugKLanrj3.dll
                      Imagebase:0xfd0000
                      File size:20992 bytes
                      MD5 hash:426E7499F6A7346F0410DEAD0805586B
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Yara matches:
                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000002.00000002.303434167.0000000000D20000.00000040.00000001.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000002.00000002.303487631.0000000000ED1000.00000020.00000001.sdmp, Author: Joe Security
                      Reputation:high

                      General

                      Start time:10:39:20
                      Start date:14/01/2022
                      Path:C:\Windows\SysWOW64\rundll32.exe
                      Wow64 process (32bit):true
                      Commandline:rundll32.exe "C:\Users\user\Desktop\pugKLanrj3.dll",#1
                      Imagebase:0xd50000
                      File size:61952 bytes
                      MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Yara matches:
                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000003.00000002.303864837.0000000002E50000.00000040.00000001.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000003.00000002.303938818.0000000003091000.00000020.00000001.sdmp, Author: Joe Security
                      Reputation:high

                      General

                      Start time:10:39:21
                      Start date:14/01/2022
                      Path:C:\Windows\SysWOW64\rundll32.exe
                      Wow64 process (32bit):true
                      Commandline:rundll32.exe C:\Users\user\Desktop\pugKLanrj3.dll,DllRegisterServer
                      Imagebase:0xd50000
                      File size:61952 bytes
                      MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Yara matches:
                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000004.00000002.312426426.0000000004790000.00000040.00000001.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000004.00000002.310675126.00000000006C1000.00000020.00000001.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000004.00000002.312707880.0000000004991000.00000020.00000001.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000004.00000002.312062487.0000000004571000.00000020.00000001.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000004.00000002.312157578.0000000004630000.00000040.00000001.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000004.00000002.310610436.0000000000690000.00000040.00000001.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000004.00000002.312211500.0000000004661000.00000020.00000001.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000004.00000002.312650834.0000000004960000.00000040.00000001.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000004.00000002.311999484.0000000004540000.00000040.00000001.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000004.00000002.312609575.0000000004821000.00000020.00000001.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000004.00000002.312500126.00000000047C1000.00000020.00000001.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000004.00000002.312556159.00000000047F0000.00000040.00000001.sdmp, Author: Joe Security
                      Reputation:high

                      General

                      Start time:10:39:22
                      Start date:14/01/2022
                      Path:C:\Windows\SysWOW64\rundll32.exe
                      Wow64 process (32bit):true
                      Commandline:C:\Windows\SysWOW64\rundll32.exe "C:\Users\user\Desktop\pugKLanrj3.dll",DllRegisterServer
                      Imagebase:0xd50000
                      File size:61952 bytes
                      MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high

                      General

                      Start time:10:39:22
                      Start date:14/01/2022
                      Path:C:\Windows\SysWOW64\rundll32.exe
                      Wow64 process (32bit):true
                      Commandline:C:\Windows\SysWOW64\rundll32.exe "C:\Users\user\Desktop\pugKLanrj3.dll",DllRegisterServer
                      Imagebase:0xd50000
                      File size:61952 bytes
                      MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Yara matches:
                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000007.00000002.308556502.0000000004971000.00000020.00000001.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000007.00000002.308717246.0000000004ED1000.00000020.00000001.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000007.00000002.308496197.00000000047A0000.00000040.00000001.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000007.00000002.308585132.0000000004D20000.00000040.00000001.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000007.00000002.308691982.0000000004EA0000.00000040.00000001.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000007.00000002.308783720.0000000004FE1000.00000020.00000001.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000007.00000002.308811399.0000000005011000.00000020.00000001.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000007.00000002.308759081.0000000004FB0000.00000040.00000001.sdmp, Author: Joe Security
                      Reputation:high

                      General

                      Start time:10:39:24
                      Start date:14/01/2022
                      Path:C:\Windows\SysWOW64\rundll32.exe
                      Wow64 process (32bit):true
                      Commandline:C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Ubjbeaftth\ufcmfnoys.ulp",EgkecrKVKe
                      Imagebase:0xd50000
                      File size:61952 bytes
                      MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Yara matches:
                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000009.00000002.312591906.0000000002E30000.00000040.00000001.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000009.00000002.312633523.0000000002E61000.00000020.00000001.sdmp, Author: Joe Security
                      Reputation:high

                      General

                      Start time:10:39:26
                      Start date:14/01/2022
                      Path:C:\Windows\SysWOW64\rundll32.exe
                      Wow64 process (32bit):true
                      Commandline:C:\Windows\SysWOW64\rundll32.exe "C:\Windows\System32\Ubjbeaftth\ufcmfnoys.ulp",DllRegisterServer
                      Imagebase:0xd50000
                      File size:61952 bytes
                      MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Yara matches:
                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000A.00000002.818600479.0000000004CA1000.00000020.00000001.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000A.00000002.816263427.0000000000551000.00000020.00000010.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000A.00000002.818149949.0000000004821000.00000020.00000001.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000A.00000002.818434536.0000000004B90000.00000040.00000001.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000A.00000002.818253319.00000000049B0000.00000040.00000001.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000A.00000002.818342645.0000000004A90000.00000040.00000001.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000A.00000002.816816895.00000000006C0000.00000040.00000001.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000A.00000002.818930567.0000000004F70000.00000040.00000001.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000A.00000002.818769110.0000000004E70000.00000040.00000001.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000A.00000002.818077767.0000000004741000.00000020.00000001.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000A.00000002.818990382.0000000004FA1000.00000020.00000001.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000A.00000002.818118455.00000000047F0000.00000040.00000001.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000A.00000002.818553417.0000000004C70000.00000040.00000001.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000A.00000002.818862903.0000000004EA1000.00000020.00000001.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000A.00000002.818277549.00000000049E1000.00000020.00000001.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000A.00000002.819036173.0000000004FD0000.00000040.00000001.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000A.00000002.818224414.0000000004981000.00000020.00000001.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000A.00000002.818194001.0000000004950000.00000040.00000001.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000A.00000002.819084555.0000000005001000.00000020.00000001.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000A.00000002.816889903.0000000000721000.00000020.00000001.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000A.00000002.816215619.0000000000520000.00000040.00000010.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000A.00000002.818044267.0000000004710000.00000040.00000001.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000A.00000002.818377834.0000000004AC1000.00000020.00000001.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000A.00000002.818471974.0000000004BC1000.00000020.00000001.sdmp, Author: Joe Security
                      Reputation:high

                      General

                      Start time:10:39:38
                      Start date:14/01/2022
                      Path:C:\Windows\System32\svchost.exe
                      Wow64 process (32bit):false
                      Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p
                      Imagebase:0x7ff70d6e0000
                      File size:51288 bytes
                      MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language

                      General

                      Start time:10:39:44
                      Start date:14/01/2022
                      Path:C:\Windows\System32\svchost.exe
                      Wow64 process (32bit):false
                      Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p
                      Imagebase:0x7ff70d6e0000
                      File size:51288 bytes
                      MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language

                      General

                      Start time:10:39:59
                      Start date:14/01/2022
                      Path:C:\Windows\System32\svchost.exe
                      Wow64 process (32bit):false
                      Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p
                      Imagebase:0x7ff70d6e0000
                      File size:51288 bytes
                      MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language

                      General

                      Start time:10:40:09
                      Start date:14/01/2022
                      Path:C:\Windows\System32\svchost.exe
                      Wow64 process (32bit):false
                      Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p
                      Imagebase:0x7ff70d6e0000
                      File size:51288 bytes
                      MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language

                      Disassembly

                      Code Analysis

                      Reset < >