Windows Analysis Report M2hsMd9hTq

Overview

General Information

Sample Name: M2hsMd9hTq (renamed file extension from none to dll)
Analysis ID: 553120
MD5: 707ec8851adeff69bdb3204692c340a8
SHA1: b51315290d9b490c55663a572bd85999f3267b7a
SHA256: a6d1ed377e3de0ae885c14ca65c2eafba01207e058ac353289182800a95b5fea
Tags: 32dllexetrojan
Infos:

Most interesting Screenshot:

Detection

Emotet
Score: 100
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

Found malware configuration
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Multi AV Scanner detection for submitted file
Yara detected Emotet
System process connects to network (likely due to code injection or exploit)
Antivirus detection for URL or domain
Changes security center settings (notifications, updates, antivirus, firewall)
Machine Learning detection for sample
Sigma detected: Suspicious Call by Ordinal
C2 URLs / IPs found in malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query locales information (e.g. system language)
Deletes files inside the Windows folder
May sleep (evasive loops) to hinder dynamic analysis
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Uses code obfuscation techniques (call, push, ret)
Creates files inside the system directory
Internet Provider seen in connection with other malware
Detected potential crypto function
Contains functionality to query CPU information (cpuid)
Found potential string decryption / allocating functions
Sample execution stops while process was sleeping (likely an evasion)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to dynamically determine API calls
Contains functionality which may be used to detect a debugger (GetProcessHeap)
IP address seen in connection with other malware
AV process strings found (often used to terminate AV products)
Sample file is different than original file name gathered from version info
PE file contains an invalid checksum
PE file contains strange resources
Tries to load missing DLLs
Contains functionality to read the PEB
Drops PE files to the windows directory (C:\Windows)
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Detected TCP or UDP traffic on non-standard ports
Checks if the current process is being debugged
Connects to several IPs in different countries
Potential key logger detected (key state polling based)
Registers a DLL
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Queries disk information (often used to detect virtual machines)
Found large amount of non-executed APIs
Creates a process in suspended mode (likely to inject code)

Classification

AV Detection:

barindex
Found malware configuration
Source: 8.2.rundll32.exe.5310000.2.raw.unpack Malware Configuration Extractor: Emotet {"C2 list": ["45.138.98.34:80", "69.16.218.101:8080", "51.210.242.234:8080", "185.148.168.220:8080", "142.4.219.173:8080", "54.38.242.185:443", "191.252.103.16:80", "104.131.62.48:8080", "62.171.178.147:8080", "217.182.143.207:443", "168.197.250.14:80", "37.44.244.177:8080", "66.42.57.149:443", "210.57.209.142:8080", "159.69.237.188:443", "116.124.128.206:8080", "128.199.192.135:8080", "195.154.146.35:443", "185.148.168.15:8080", "195.77.239.39:8080", "207.148.81.119:8080", "85.214.67.203:8080", "190.90.233.66:443", "78.46.73.125:443", "78.47.204.80:443", "37.59.209.141:8080", "54.37.228.122:443"], "Public Key": ["RUNLMSAAAADYNZPXY4tQxd/N4Wn5sTYAm5tUOxY2ol1ELrI4MNhHNi640vSLasjYTHpFRBoG+o84vtr7AJachCzOHjaAJFCW", "RUNTMSAAAAD0LxqDNhonUYwk8sqo7IWuUllRdUiUBnACc6romsQoe1YJD7wIe4AheqYofpZFucPDXCZ0z9i+ooUffqeoLZU0"]}
Multi AV Scanner detection for submitted file
Source: M2hsMd9hTq.dll Virustotal: Detection: 25% Perma Link
Source: M2hsMd9hTq.dll ReversingLabs: Detection: 34%
Antivirus detection for URL or domain
Source: https://45.138.98.34/1 Avira URL Cloud: Label: malware
Source: https://45.138.98.34/ Avira URL Cloud: Label: malware
Source: https://45.138.98.34:80/qIFNheLVNvvPNSNxkwhjxonGRMtffKSDvVT Avira URL Cloud: Label: malware
Machine Learning detection for sample
Source: M2hsMd9hTq.dll Joe Sandbox ML: detected

Compliance:

barindex
Uses 32bit PE files
Source: M2hsMd9hTq.dll Static PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE, DLL

Networking:

barindex
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Source: Traffic Snort IDS: 2404332 ET CNC Feodo Tracker Reported CnC Server TCP group 17 192.168.2.5:49758 -> 45.138.98.34:80
Source: Traffic Snort IDS: 2404338 ET CNC Feodo Tracker Reported CnC Server TCP group 20 192.168.2.5:49759 -> 69.16.218.101:8080
System process connects to network (likely due to code injection or exploit)
Source: C:\Windows\SysWOW64\rundll32.exe Network Connect: 69.16.218.101 144 Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Network Connect: 45.138.98.34 80 Jump to behavior
C2 URLs / IPs found in malware configuration
Source: Malware configuration extractor IPs: 45.138.98.34:80
Source: Malware configuration extractor IPs: 69.16.218.101:8080
Source: Malware configuration extractor IPs: 51.210.242.234:8080
Source: Malware configuration extractor IPs: 185.148.168.220:8080
Source: Malware configuration extractor IPs: 142.4.219.173:8080
Source: Malware configuration extractor IPs: 54.38.242.185:443
Source: Malware configuration extractor IPs: 191.252.103.16:80
Source: Malware configuration extractor IPs: 104.131.62.48:8080
Source: Malware configuration extractor IPs: 62.171.178.147:8080
Source: Malware configuration extractor IPs: 217.182.143.207:443
Source: Malware configuration extractor IPs: 168.197.250.14:80
Source: Malware configuration extractor IPs: 37.44.244.177:8080
Source: Malware configuration extractor IPs: 66.42.57.149:443
Source: Malware configuration extractor IPs: 210.57.209.142:8080
Source: Malware configuration extractor IPs: 159.69.237.188:443
Source: Malware configuration extractor IPs: 116.124.128.206:8080
Source: Malware configuration extractor IPs: 128.199.192.135:8080
Source: Malware configuration extractor IPs: 195.154.146.35:443
Source: Malware configuration extractor IPs: 185.148.168.15:8080
Source: Malware configuration extractor IPs: 195.77.239.39:8080
Source: Malware configuration extractor IPs: 207.148.81.119:8080
Source: Malware configuration extractor IPs: 85.214.67.203:8080
Source: Malware configuration extractor IPs: 190.90.233.66:443
Source: Malware configuration extractor IPs: 78.46.73.125:443
Source: Malware configuration extractor IPs: 78.47.204.80:443
Source: Malware configuration extractor IPs: 37.59.209.141:8080
Source: Malware configuration extractor IPs: 54.37.228.122:443
Internet Provider seen in connection with other malware
Source: Joe Sandbox View ASN Name: AS-CHOOPAUS AS-CHOOPAUS
Source: Joe Sandbox View ASN Name: DIGITALOCEAN-ASNUS DIGITALOCEAN-ASNUS
IP address seen in connection with other malware
Source: Joe Sandbox View IP Address: 207.148.81.119 207.148.81.119
Source: Joe Sandbox View IP Address: 104.131.62.48 104.131.62.48
Detected TCP or UDP traffic on non-standard ports
Source: global traffic TCP traffic: 192.168.2.5:49759 -> 69.16.218.101:8080
Connects to several IPs in different countries
Source: unknown Network traffic detected: IP country count 12
Source: unknown TCP traffic detected without corresponding DNS query: 45.138.98.34
Source: unknown TCP traffic detected without corresponding DNS query: 45.138.98.34
Source: unknown TCP traffic detected without corresponding DNS query: 45.138.98.34
Source: unknown TCP traffic detected without corresponding DNS query: 69.16.218.101
Source: unknown TCP traffic detected without corresponding DNS query: 69.16.218.101
Source: unknown TCP traffic detected without corresponding DNS query: 69.16.218.101
Source: unknown TCP traffic detected without corresponding DNS query: 69.16.218.101
Source: unknown TCP traffic detected without corresponding DNS query: 69.16.218.101
Source: unknown TCP traffic detected without corresponding DNS query: 69.16.218.101
Source: unknown TCP traffic detected without corresponding DNS query: 69.16.218.101
Source: unknown TCP traffic detected without corresponding DNS query: 69.16.218.101
Source: unknown TCP traffic detected without corresponding DNS query: 69.16.218.101
Source: unknown TCP traffic detected without corresponding DNS query: 69.16.218.101
Source: unknown TCP traffic detected without corresponding DNS query: 69.16.218.101
Source: unknown TCP traffic detected without corresponding DNS query: 69.16.218.101
Source: unknown TCP traffic detected without corresponding DNS query: 69.16.218.101
Source: svchost.exe, 00000021.00000003.571824588.000002A23118D000.00000004.00000001.sdmp String found in binary or memory: Try it free for 30 days, no strings attached\r\n\r\nLike us on Facebook: http://www.facebook.com/spotify \r\nFollow us on Twitter: http://twitter.com/spotify","ProductTitle":"Spotify - Music and Podcasts","SearchTitles":[{"SearchTitleString":"Spotify","SearchTitleType":"SearchHint"},{"SearchTitleString":"Music","SearchTitleType":"SearchHint"},{"SearchTitleString":"music apps","SearchTitleType":"SearchHint"},{"SearchTitleString":"free music","SearchTitleType":"SearchHint"},{"SearchTitleString":"podcasts","SearchTitleType":"SearchHint"},{"SearchTitleString":"streaming","SearchTitleType":"SearchHint"},{"SearchTitleString":"soundcloud","SearchTitleType":"SearchHint"}],"Language":"en-us","Markets":["US","DZ","AR","AU","AT","BH","BD","BE","BR","BG","CA","CL","CN","CO","CR","HR","CY","CZ","DK","EG","EE","FI","FR","DE","GR","GT","HK","HU","IS","IN","ID","IQ","IE","IL","IT","JP","JO","KZ","KE","KW","LV","LB","LI","LT","LU","MY","MT","MR","MX","MA","NL","NZ","NG","N equals www.facebook.com (Facebook)
Source: svchost.exe, 00000021.00000003.571824588.000002A23118D000.00000004.00000001.sdmp String found in binary or memory: Try it free for 30 days, no strings attached\r\n\r\nLike us on Facebook: http://www.facebook.com/spotify \r\nFollow us on Twitter: http://twitter.com/spotify","ProductTitle":"Spotify - Music and Podcasts","SearchTitles":[{"SearchTitleString":"Spotify","SearchTitleType":"SearchHint"},{"SearchTitleString":"Music","SearchTitleType":"SearchHint"},{"SearchTitleString":"music apps","SearchTitleType":"SearchHint"},{"SearchTitleString":"free music","SearchTitleType":"SearchHint"},{"SearchTitleString":"podcasts","SearchTitleType":"SearchHint"},{"SearchTitleString":"streaming","SearchTitleType":"SearchHint"},{"SearchTitleString":"soundcloud","SearchTitleType":"SearchHint"}],"Language":"en-us","Markets":["US","DZ","AR","AU","AT","BH","BD","BE","BR","BG","CA","CL","CN","CO","CR","HR","CY","CZ","DK","EG","EE","FI","FR","DE","GR","GT","HK","HU","IS","IN","ID","IQ","IE","IL","IT","JP","JO","KZ","KE","KW","LV","LB","LI","LT","LU","MY","MT","MR","MX","MA","NL","NZ","NG","N equals www.twitter.com (Twitter)
Source: svchost.exe, 00000021.00000003.571841091.000002A23119E000.00000004.00000001.sdmp, svchost.exe, 00000021.00000003.571824588.000002A23118D000.00000004.00000001.sdmp String found in binary or memory: Try it free for 30 days, no strings attached\r\n\r\nLike us on Facebook: http://www.facebook.com/spotify \r\nFollow us on Twitter: http://twitter.com/spotify","ProductTitle":"Spotify - Music and Podcasts","SearchTitles":[{"SearchTitleString":"Spotify","SearchTitleType":"SearchHint"},{"SearchTitleString":"Music","SearchTitleType":"SearchHint"},{"SearchTitleString":"music apps","SearchTitleType":"SearchHint"},{"SearchTitleString":"free music","SearchTitleType":"SearchHint"},{"SearchTitleString":"podcasts","SearchTitleType":"SearchHint"},{"SearchTitleString":"streaming","SearchTitleType":"SearchHint"},{"SearchTitleString":"soundcloud","SearchTitleType":"SearchHint"}],"Language":"en-us","Markets":["US","DZ","AR","AU","AT","BH","BD","BE","BR","BG","CA","CL","CN","CO","CR","HR","CY","CZ","DK","EG","EE","FI","FR","DE","GR","GT","HK","HU","IS","IN","ID","IQ","IE","IL","IT","JP","JO","KZ","KE","KW","LV","LB","LI","LT","LU","MY","MT","MR","MX","MA","NL","NZ","NG","NO","OM","PK","PE","PH","PL","PT","QA","RO","RU","SA","RS","SG","SK","SI","ZA","KR","ES","SE","CH","TW","TH","TT","TN","TR","UA","AE","GB","VN","YE","LY","LK","UY","VE","AF","AX","AL","AS","AO","AI","AQ","AG","AM","AW","BO","BQ","BA","BW","BV","IO","BN","BF","BI","KH","CM","CV","KY","CF","TD","TL","DJ","DM","DO","EC","SV","GQ","ER","ET","FK","FO","FJ","GF","PF","TF","GA","GM","GE","GH","GI","GL","GD","GP","GU","GG","GN","GW","GY","HT","HM","HN","AZ","BS","BB","BY","BZ","BJ","BM","BT","KM","CG","CD","CK","CX","CC","CI","CW","JM","SJ","JE","KI","KG","LA","LS","LR","MO","MK","MG","MW","IM","MH","MQ","MU","YT","FM","MD","MN","MS","MZ","MM","NA","NR","NP","MV","ML","NC","NI","NE","NU","NF","PW","PS","PA","PG","PY","RE","RW","BL","MF","WS","ST","SN","MP","PN","SX","SB","SO","SC","SL","GS","SH","KN","LC","PM","VC","TJ","TZ","TG","TK","TO","TM","TC","TV","UM","UG","VI","VG","WF","EH","ZM","ZW","UZ","VU","SR","SZ","AD","MC","SM","ME","VA","NEUTRAL"]}],"MarketProperties":[{"RelatedProducts":[],"Markets":["US"]}],"ProductASchema":"Product;3","ProductBSchema":"ProductUnifiedApp;3","ProductId":"9NCBCSZSJRSB","Properties":{"PackageFamilyName":"SpotifyAB.SpotifyMusic_zpdnekdrzrea0","PackageIdentityName":"SpotifyAB.SpotifyMusic","PublisherCertificateName":"CN=453637B3-4E12-4CDF-B0D3-2A3C863BF6EF","XboxCrossGenSetId":null,"XboxConsoleGenOptimized":null,"XboxConsoleGenCompatible":null},"AlternateIds":[{"IdType":"LegacyWindowsStoreProductId","Value":"ceac5d3f-8a4f-40e1-9a67-76d9108c7cb5"},{"IdType":"LegacyWindowsPhoneProductId","Value":"caac1b9d-621b-4f96-b143-e10e1397740a"},{"IdType":"XboxTitleId","Value":"1681279293"}],"IngestionSource":"DCE","IsMicrosoftProduct":false,"PreferredSkuId":"0010","ProductType":"Application","ValidationData":{"PassedValidation":false,"RevisionId":"2022-01-07T11:33:20.1626869Z||.||d5cdcec3-04df-404e-ba07-3240047c89f9||1152921505694348672||Null||fullrelease","ValidationResultUri":""},"MerchandizingTags":[],"PartD":"","ProductFamily":"Apps","ProductKind":"Application","DisplaySkuAvailab
Source: svchost.exe, 00000021.00000003.571841091.000002A23119E000.00000004.00000001.sdmp, svchost.exe, 00000021.00000003.571824588.000002A23118D000.00000004.00000001.sdmp String found in binary or memory: Try it free for 30 days, no strings attached\r\n\r\nLike us on Facebook: http://www.facebook.com/spotify \r\nFollow us on Twitter: http://twitter.com/spotify","ProductTitle":"Spotify - Music and Podcasts","SearchTitles":[{"SearchTitleString":"Spotify","SearchTitleType":"SearchHint"},{"SearchTitleString":"Music","SearchTitleType":"SearchHint"},{"SearchTitleString":"music apps","SearchTitleType":"SearchHint"},{"SearchTitleString":"free music","SearchTitleType":"SearchHint"},{"SearchTitleString":"podcasts","SearchTitleType":"SearchHint"},{"SearchTitleString":"streaming","SearchTitleType":"SearchHint"},{"SearchTitleString":"soundcloud","SearchTitleType":"SearchHint"}],"Language":"en-us","Markets":["US","DZ","AR","AU","AT","BH","BD","BE","BR","BG","CA","CL","CN","CO","CR","HR","CY","CZ","DK","EG","EE","FI","FR","DE","GR","GT","HK","HU","IS","IN","ID","IQ","IE","IL","IT","JP","JO","KZ","KE","KW","LV","LB","LI","LT","LU","MY","MT","MR","MX","MA","NL","NZ","NG","NO","OM","PK","PE","PH","PL","PT","QA","RO","RU","SA","RS","SG","SK","SI","ZA","KR","ES","SE","CH","TW","TH","TT","TN","TR","UA","AE","GB","VN","YE","LY","LK","UY","VE","AF","AX","AL","AS","AO","AI","AQ","AG","AM","AW","BO","BQ","BA","BW","BV","IO","BN","BF","BI","KH","CM","CV","KY","CF","TD","TL","DJ","DM","DO","EC","SV","GQ","ER","ET","FK","FO","FJ","GF","PF","TF","GA","GM","GE","GH","GI","GL","GD","GP","GU","GG","GN","GW","GY","HT","HM","HN","AZ","BS","BB","BY","BZ","BJ","BM","BT","KM","CG","CD","CK","CX","CC","CI","CW","JM","SJ","JE","KI","KG","LA","LS","LR","MO","MK","MG","MW","IM","MH","MQ","MU","YT","FM","MD","MN","MS","MZ","MM","NA","NR","NP","MV","ML","NC","NI","NE","NU","NF","PW","PS","PA","PG","PY","RE","RW","BL","MF","WS","ST","SN","MP","PN","SX","SB","SO","SC","SL","GS","SH","KN","LC","PM","VC","TJ","TZ","TG","TK","TO","TM","TC","TV","UM","UG","VI","VG","WF","EH","ZM","ZW","UZ","VU","SR","SZ","AD","MC","SM","ME","VA","NEUTRAL"]}],"MarketProperties":[{"RelatedProducts":[],"Markets":["US"]}],"ProductASchema":"Product;3","ProductBSchema":"ProductUnifiedApp;3","ProductId":"9NCBCSZSJRSB","Properties":{"PackageFamilyName":"SpotifyAB.SpotifyMusic_zpdnekdrzrea0","PackageIdentityName":"SpotifyAB.SpotifyMusic","PublisherCertificateName":"CN=453637B3-4E12-4CDF-B0D3-2A3C863BF6EF","XboxCrossGenSetId":null,"XboxConsoleGenOptimized":null,"XboxConsoleGenCompatible":null},"AlternateIds":[{"IdType":"LegacyWindowsStoreProductId","Value":"ceac5d3f-8a4f-40e1-9a67-76d9108c7cb5"},{"IdType":"LegacyWindowsPhoneProductId","Value":"caac1b9d-621b-4f96-b143-e10e1397740a"},{"IdType":"XboxTitleId","Value":"1681279293"}],"IngestionSource":"DCE","IsMicrosoftProduct":false,"PreferredSkuId":"0010","ProductType":"Application","ValidationData":{"PassedValidation":false,"RevisionId":"2022-01-07T11:33:20.1626869Z||.||d5cdcec3-04df-404e-ba07-3240047c89f9||1152921505694348672||Null||fullrelease","ValidationResultUri":""},"MerchandizingTags":[],"PartD":"","ProductFamily":"Apps","ProductKind":"Application","DisplaySkuAvailab
Source: rundll32.exe, 0000000A.00000003.287573549.000000000355C000.00000004.00000001.sdmp, rundll32.exe, 0000000A.00000002.762587120.000000000355C000.00000004.00000001.sdmp, svchost.exe, 0000000C.00000002.603169778.0000023DBF886000.00000004.00000001.sdmp, svchost.exe, 00000021.00000002.587498496.000002A231119000.00000004.00000001.sdmp String found in binary or memory: http://crl.globalsign.net/root-r2.crl0
Source: svchost.exe, 0000000C.00000002.603169778.0000023DBF886000.00000004.00000001.sdmp, svchost.exe, 00000021.00000002.587230521.000002A2308E8000.00000004.00000001.sdmp String found in binary or memory: http://crl.ver)
Source: rundll32.exe, 0000000A.00000003.287573549.000000000355C000.00000004.00000001.sdmp, rundll32.exe, 0000000A.00000002.762587120.000000000355C000.00000004.00000001.sdmp, 77EC63BDA74BD0D0E0426DC8F80085060.10.dr String found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
Source: rundll32.exe, 0000000A.00000003.287598003.0000000003514000.00000004.00000001.sdmp, rundll32.exe, 0000000A.00000003.284605285.0000000005B24000.00000004.00000001.sdmp, rundll32.exe, 0000000A.00000002.762430065.0000000003514000.00000004.00000001.sdmp String found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab?4bff1f73ae559
Source: rundll32.exe, 0000000A.00000003.287573549.000000000355C000.00000004.00000001.sdmp, rundll32.exe, 0000000A.00000002.762587120.000000000355C000.00000004.00000001.sdmp String found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cabe
Source: rundll32.exe, 0000000A.00000003.287598003.0000000003514000.00000004.00000001.sdmp, rundll32.exe, 0000000A.00000002.762430065.0000000003514000.00000004.00000001.sdmp String found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/enn
Source: svchost.exe, 00000021.00000003.568374017.000002A23116C000.00000004.00000001.sdmp, svchost.exe, 00000021.00000003.567636049.000002A231196000.00000004.00000001.sdmp, svchost.exe, 00000021.00000003.567551923.000002A231602000.00000004.00000001.sdmp, svchost.exe, 00000021.00000003.567736212.000002A231621000.00000004.00000001.sdmp, svchost.exe, 00000021.00000003.567519693.000002A231186000.00000004.00000001.sdmp, svchost.exe, 00000021.00000003.567531380.000002A231196000.00000004.00000001.sdmp String found in binary or memory: http://help.disneyplus.com.
Source: svchost.exe, 00000010.00000002.307173784.000001B50CE13000.00000004.00000001.sdmp String found in binary or memory: http://www.bingmapsportal.com
Source: svchost.exe, 0000000E.00000002.761004522.000002866503E000.00000004.00000001.sdmp String found in binary or memory: https://%s.dnet.xboxlive.com
Source: svchost.exe, 0000000E.00000002.761004522.000002866503E000.00000004.00000001.sdmp String found in binary or memory: https://%s.xboxlive.com
Source: rundll32.exe, 0000000A.00000003.287598003.0000000003514000.00000004.00000001.sdmp, rundll32.exe, 0000000A.00000002.762430065.0000000003514000.00000004.00000001.sdmp String found in binary or memory: https://45.138.98.34/
Source: rundll32.exe, 0000000A.00000003.287598003.0000000003514000.00000004.00000001.sdmp, rundll32.exe, 0000000A.00000002.762430065.0000000003514000.00000004.00000001.sdmp String found in binary or memory: https://45.138.98.34/1
Source: rundll32.exe, 0000000A.00000003.287598003.0000000003514000.00000004.00000001.sdmp, rundll32.exe, 0000000A.00000002.762430065.0000000003514000.00000004.00000001.sdmp String found in binary or memory: https://45.138.98.34:80/qIFNheLVNvvPNSNxkwhjxonGRMtffKSDvVT
Source: rundll32.exe, 0000000A.00000003.287598003.0000000003514000.00000004.00000001.sdmp, rundll32.exe, 0000000A.00000002.762430065.0000000003514000.00000004.00000001.sdmp String found in binary or memory: https://69.16.218.101/
Source: rundll32.exe, 0000000A.00000003.287598003.0000000003514000.00000004.00000001.sdmp, rundll32.exe, 0000000A.00000002.762430065.0000000003514000.00000004.00000001.sdmp String found in binary or memory: https://69.16.218.101/T
Source: rundll32.exe, 0000000A.00000002.762430065.0000000003514000.00000004.00000001.sdmp String found in binary or memory: https://69.16.218.101:8080/NkSVeNqehcFPnIYSRqyWkDgFYPfQVpAkO
Source: rundll32.exe, 0000000A.00000003.287598003.0000000003514000.00000004.00000001.sdmp, rundll32.exe, 0000000A.00000002.762430065.0000000003514000.00000004.00000001.sdmp String found in binary or memory: https://69.16.218.101:8080/NkSVeNqehcFPnIYSRqyWkDgFYPfQVpAkON
Source: svchost.exe, 0000000E.00000002.761004522.000002866503E000.00000004.00000001.sdmp String found in binary or memory: https://activity.windows.com
Source: svchost.exe, 00000010.00000003.306784912.000001B50CE61000.00000004.00000001.sdmp String found in binary or memory: https://appexmapsappupdate.blob.core.windows.net
Source: svchost.exe, 0000000E.00000002.761004522.000002866503E000.00000004.00000001.sdmp String found in binary or memory: https://bn2.notify.windows.com/v2/register/xplatform/device
Source: svchost.exe, 0000000E.00000002.761004522.000002866503E000.00000004.00000001.sdmp String found in binary or memory: https://co4-df.notify.windows.com/v2/register/xplatform/device
Source: svchost.exe, 00000010.00000003.306825607.000001B50CE49000.00000004.00000001.sdmp String found in binary or memory: https://dev.ditu.live.com/REST/v1/Imagery/Copyright/
Source: svchost.exe, 00000010.00000003.306784912.000001B50CE61000.00000004.00000001.sdmp String found in binary or memory: https://dev.ditu.live.com/REST/v1/Locations
Source: svchost.exe, 00000010.00000002.307226516.000001B50CE3D000.00000004.00000001.sdmp String found in binary or memory: https://dev.ditu.live.com/REST/v1/Routes/
Source: svchost.exe, 00000010.00000003.306756140.000001B50CE67000.00000004.00000001.sdmp, svchost.exe, 00000010.00000002.307290539.000001B50CE69000.00000004.00000001.sdmp String found in binary or memory: https://dev.ditu.live.com/REST/v1/Transit/Stops/
Source: svchost.exe, 00000010.00000003.306784912.000001B50CE61000.00000004.00000001.sdmp String found in binary or memory: https://dev.ditu.live.com/mapcontrol/logging.ashx
Source: svchost.exe, 00000010.00000003.306805584.000001B50CE4D000.00000004.00000001.sdmp, svchost.exe, 00000010.00000002.307252680.000001B50CE4E000.00000004.00000001.sdmp String found in binary or memory: https://dev.ditu.live.com/mapcontrol/mapconfiguration.ashx?name=native&v=
Source: svchost.exe, 00000010.00000003.284823827.000001B50CE30000.00000004.00000001.sdmp String found in binary or memory: https://dev.virtualearth.net/REST/v1/JsonFilter/VenueMaps/data/
Source: svchost.exe, 00000010.00000002.307226516.000001B50CE3D000.00000004.00000001.sdmp String found in binary or memory: https://dev.virtualearth.net/REST/v1/Routes/
Source: svchost.exe, 00000010.00000003.306784912.000001B50CE61000.00000004.00000001.sdmp String found in binary or memory: https://dev.virtualearth.net/REST/v1/Routes/Driving
Source: svchost.exe, 00000010.00000003.306784912.000001B50CE61000.00000004.00000001.sdmp String found in binary or memory: https://dev.virtualearth.net/REST/v1/Routes/Transit
Source: svchost.exe, 00000010.00000003.306784912.000001B50CE61000.00000004.00000001.sdmp String found in binary or memory: https://dev.virtualearth.net/REST/v1/Routes/Walking
Source: svchost.exe, 00000010.00000003.284823827.000001B50CE30000.00000004.00000001.sdmp String found in binary or memory: https://dev.virtualearth.net/REST/v1/Traffic/Incidents/
Source: svchost.exe, 00000010.00000003.306889893.000001B50CE41000.00000004.00000001.sdmp, svchost.exe, 00000010.00000002.307239059.000001B50CE42000.00000004.00000001.sdmp, svchost.exe, 00000010.00000003.306854743.000001B50CE40000.00000004.00000001.sdmp String found in binary or memory: https://dev.virtualearth.net/REST/v1/Transit/Schedules/
Source: svchost.exe, 00000010.00000003.306889893.000001B50CE41000.00000004.00000001.sdmp, svchost.exe, 00000010.00000002.307239059.000001B50CE42000.00000004.00000001.sdmp, svchost.exe, 00000010.00000003.306854743.000001B50CE40000.00000004.00000001.sdmp String found in binary or memory: https://dev.virtualearth.net/mapcontrol/HumanScaleServices/GetBubbles.ashx?n=
Source: svchost.exe, 00000010.00000003.306784912.000001B50CE61000.00000004.00000001.sdmp String found in binary or memory: https://dev.virtualearth.net/mapcontrol/logging.ashx
Source: svchost.exe, 00000010.00000003.306854743.000001B50CE40000.00000004.00000001.sdmp, svchost.exe, 00000010.00000002.307245662.000001B50CE4B000.00000004.00000001.sdmp, svchost.exe, 00000010.00000003.306825607.000001B50CE49000.00000004.00000001.sdmp String found in binary or memory: https://dev.virtualearth.net/webservices/v1/LoggingService/LoggingService.svc/Log?
Source: svchost.exe, 00000010.00000003.284823827.000001B50CE30000.00000004.00000001.sdmp String found in binary or memory: https://dev.virtualearth.net/webservices/v1/LoggingService/LoggingService.svc/Log?entry=
Source: svchost.exe, 00000021.00000003.568374017.000002A23116C000.00000004.00000001.sdmp, svchost.exe, 00000021.00000003.567636049.000002A231196000.00000004.00000001.sdmp, svchost.exe, 00000021.00000003.567551923.000002A231602000.00000004.00000001.sdmp, svchost.exe, 00000021.00000003.567736212.000002A231621000.00000004.00000001.sdmp, svchost.exe, 00000021.00000003.567519693.000002A231186000.00000004.00000001.sdmp, svchost.exe, 00000021.00000003.567531380.000002A231196000.00000004.00000001.sdmp String found in binary or memory: https://disneyplus.com/legal.
Source: svchost.exe, 00000010.00000003.306825607.000001B50CE49000.00000004.00000001.sdmp String found in binary or memory: https://dynamic.api.tiles.ditu.live.com/odvs/gd?pv=1&r=
Source: svchost.exe, 00000010.00000002.307245662.000001B50CE4B000.00000004.00000001.sdmp, svchost.exe, 00000010.00000003.306825607.000001B50CE49000.00000004.00000001.sdmp String found in binary or memory: https://dynamic.api.tiles.ditu.live.com/odvs/gdi?pv=1&r=
Source: svchost.exe, 00000010.00000002.307245662.000001B50CE4B000.00000004.00000001.sdmp, svchost.exe, 00000010.00000003.306825607.000001B50CE49000.00000004.00000001.sdmp String found in binary or memory: https://dynamic.api.tiles.ditu.live.com/odvs/gdv?pv=1&r=
Source: svchost.exe, 00000010.00000002.307252680.000001B50CE4E000.00000004.00000001.sdmp String found in binary or memory: https://dynamic.t
Source: svchost.exe, 00000010.00000003.306784912.000001B50CE61000.00000004.00000001.sdmp String found in binary or memory: https://dynamic.t0.tiles.ditu.live.com/comp/gen.ashx
Source: svchost.exe, 00000010.00000002.307226516.000001B50CE3D000.00000004.00000001.sdmp, svchost.exe, 00000010.00000003.284823827.000001B50CE30000.00000004.00000001.sdmp String found in binary or memory: https://ecn.dev.virtualearth.net/REST/v1/Imagery/Copyright/
Source: svchost.exe, 00000010.00000003.284823827.000001B50CE30000.00000004.00000001.sdmp String found in binary or memory: https://ecn.dev.virtualearth.net/mapcontrol/mapconfiguration.ashx?name=native&v=
Source: svchost.exe, 00000010.00000002.307226516.000001B50CE3D000.00000004.00000001.sdmp String found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/comp/gen.ashx
Source: svchost.exe, 00000010.00000002.307173784.000001B50CE13000.00000004.00000001.sdmp, svchost.exe, 00000010.00000002.307226516.000001B50CE3D000.00000004.00000001.sdmp String found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gd?pv=1&r=
Source: svchost.exe, 00000010.00000003.306854743.000001B50CE40000.00000004.00000001.sdmp, svchost.exe, 00000010.00000003.306884229.000001B50CE45000.00000004.00000001.sdmp String found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdi?pv=1&r=
Source: svchost.exe, 00000010.00000003.306854743.000001B50CE40000.00000004.00000001.sdmp, svchost.exe, 00000010.00000003.306884229.000001B50CE45000.00000004.00000001.sdmp String found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdv?pv=1&r=
Source: svchost.exe, 00000010.00000003.284823827.000001B50CE30000.00000004.00000001.sdmp String found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gri?pv=1&r=
Source: svchost.exe, 00000010.00000002.307214272.000001B50CE39000.00000004.00000001.sdmp, svchost.exe, 00000010.00000003.284823827.000001B50CE30000.00000004.00000001.sdmp String found in binary or memory: https://t0.ssl.ak.tiles.virtualearth.net/tiles/gen
Source: svchost.exe, 00000010.00000002.307173784.000001B50CE13000.00000004.00000001.sdmp String found in binary or memory: https://t0.tiles.ditu.live.com/tiles/gen
Source: svchost.exe, 00000021.00000003.568374017.000002A23116C000.00000004.00000001.sdmp, svchost.exe, 00000021.00000003.567636049.000002A231196000.00000004.00000001.sdmp, svchost.exe, 00000021.00000003.567551923.000002A231602000.00000004.00000001.sdmp, svchost.exe, 00000021.00000003.567736212.000002A231621000.00000004.00000001.sdmp, svchost.exe, 00000021.00000003.567519693.000002A231186000.00000004.00000001.sdmp, svchost.exe, 00000021.00000003.567531380.000002A231196000.00000004.00000001.sdmp String found in binary or memory: https://www.disneyplus.com/legal/privacy-policy
Source: svchost.exe, 00000021.00000003.568374017.000002A23116C000.00000004.00000001.sdmp, svchost.exe, 00000021.00000003.567636049.000002A231196000.00000004.00000001.sdmp, svchost.exe, 00000021.00000003.567551923.000002A231602000.00000004.00000001.sdmp, svchost.exe, 00000021.00000003.567736212.000002A231621000.00000004.00000001.sdmp, svchost.exe, 00000021.00000003.567519693.000002A231186000.00000004.00000001.sdmp, svchost.exe, 00000021.00000003.567531380.000002A231196000.00000004.00000001.sdmp String found in binary or memory: https://www.disneyplus.com/legal/your-california-privacy-rights
Source: svchost.exe, 00000021.00000003.568771357.000002A2311AD000.00000004.00000001.sdmp, svchost.exe, 00000021.00000003.568746551.000002A2311AD000.00000004.00000001.sdmp, svchost.exe, 00000021.00000003.568828899.000002A231602000.00000004.00000001.sdmp, svchost.exe, 00000021.00000003.568808654.000002A231196000.00000004.00000001.sdmp, svchost.exe, 00000021.00000003.568796159.000002A231185000.00000004.00000001.sdmp String found in binary or memory: https://www.tiktok.com/legal/report/feedback
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 3_2_100012D0 recvfrom, 3_2_100012D0

Key, Mouse, Clipboard, Microphone and Screen Capturing:

barindex
Potential key logger detected (key state polling based)
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 3_2_1000FF59 GetKeyState,GetKeyState,GetKeyState,GetKeyState,SendMessageA, 3_2_1000FF59
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_1000FF59 GetKeyState,GetKeyState,GetKeyState,GetKeyState,SendMessageA, 4_2_1000FF59

E-Banking Fraud:

barindex
Yara detected Emotet
Source: Yara match File source: 10.2.rundll32.exe.5d70000.20.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 9.2.rundll32.exe.23d0000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.5790000.10.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 4.2.rundll32.exe.4ed0000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 8.2.rundll32.exe.5480000.7.unpack, type: UNPACKEDPE
Source: Yara match File source: 5.2.rundll32.exe.4e90000.5.unpack, type: UNPACKEDPE
Source: Yara match File source: 8.2.rundll32.exe.5310000.2.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.5fd0000.22.unpack, type: UNPACKEDPE
Source: Yara match File source: 8.2.rundll32.exe.53f0000.4.unpack, type: UNPACKEDPE
Source: Yara match File source: 5.2.rundll32.exe.51a0000.10.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.3360000.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 3.2.regsvr32.exe.40d0000.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.5aa0000.17.unpack, type: UNPACKEDPE
Source: Yara match File source: 5.2.rundll32.exe.51d0000.11.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.54f0000.4.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.36e0000.3.unpack, type: UNPACKEDPE
Source: Yara match File source: 5.2.rundll32.exe.5020000.8.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 8.2.rundll32.exe.5340000.3.unpack, type: UNPACKEDPE
Source: Yara match File source: 5.2.rundll32.exe.4ff0000.7.unpack, type: UNPACKEDPE
Source: Yara match File source: 5.2.rundll32.exe.4850000.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.5600000.7.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.54f0000.4.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 5.2.rundll32.exe.5050000.9.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.55d0000.6.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.5730000.8.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 9.2.rundll32.exe.2790000.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 5.2.rundll32.exe.4db0000.3.unpack, type: UNPACKEDPE
Source: Yara match File source: 8.2.rundll32.exe.5310000.2.unpack, type: UNPACKEDPE
Source: Yara match File source: 8.2.rundll32.exe.5450000.6.unpack, type: UNPACKEDPE
Source: Yara match File source: 8.2.rundll32.exe.4df0000.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.57c0000.11.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.5c70000.18.unpack, type: UNPACKEDPE
Source: Yara match File source: 5.2.rundll32.exe.4d60000.2.unpack, type: UNPACKEDPE
Source: Yara match File source: 8.2.rundll32.exe.4cc0000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.5870000.12.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 5.2.rundll32.exe.4fc0000.6.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.5a70000.16.unpack, type: UNPACKEDPE
Source: Yara match File source: 5.2.rundll32.exe.3070000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.5520000.5.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.59c0000.15.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.5730000.8.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.6000000.23.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.3330000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 4.2.rundll32.exe.5000000.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.5da0000.21.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.5d70000.20.unpack, type: UNPACKEDPE
Source: Yara match File source: 3.2.regsvr32.exe.26d0000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.5990000.14.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.5870000.12.unpack, type: UNPACKEDPE
Source: Yara match File source: 8.2.rundll32.exe.53f0000.4.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.3330000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.5790000.10.unpack, type: UNPACKEDPE
Source: Yara match File source: 5.2.rundll32.exe.4e60000.4.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.58a0000.13.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.5a70000.16.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.5990000.14.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 8.2.rundll32.exe.5450000.6.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 5.2.rundll32.exe.5020000.8.unpack, type: UNPACKEDPE
Source: Yara match File source: 5.2.rundll32.exe.51a0000.10.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 9.2.rundll32.exe.23d0000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 5.2.rundll32.exe.4d60000.2.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 3.2.regsvr32.exe.26d0000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.5760000.9.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.5c70000.18.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.3480000.2.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.5ca0000.19.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.3480000.2.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 8.2.rundll32.exe.5420000.5.unpack, type: UNPACKEDPE
Source: Yara match File source: 5.2.rundll32.exe.3070000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 4.2.rundll32.exe.4ed0000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.5fd0000.22.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 8.2.rundll32.exe.4cc0000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.55d0000.6.unpack, type: UNPACKEDPE
Source: Yara match File source: 5.2.rundll32.exe.4e60000.4.unpack, type: UNPACKEDPE
Source: Yara match File source: 5.2.rundll32.exe.4fc0000.6.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 00000004.00000002.247708165.0000000004ED0000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.764384798.0000000005D70000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000005.00000002.251269260.0000000004DB1000.00000020.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.764593172.0000000005FD0000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000008.00000002.250801502.0000000004CC0000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000005.00000002.251317536.0000000004E60000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.763160491.00000000054F0000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000008.00000002.251543763.0000000005450000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000005.00000002.251018853.0000000004851000.00000020.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000009.00000002.254580749.0000000002791000.00000020.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.763467558.0000000005790000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.764153228.0000000005C70000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.763888533.0000000005AA1000.00000020.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.763578627.0000000005870000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.763623141.00000000058A1000.00000020.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.761812038.0000000003361000.00000020.00000010.sdmp, type: MEMORY
Source: Yara match File source: 00000005.00000002.251440561.0000000004FC0000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000005.00000002.250842742.0000000003070000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.763204211.0000000005521000.00000020.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000002.247153008.00000000026D0000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000008.00000002.251348106.0000000005341000.00000020.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.763293110.0000000005601000.00000020.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.762842466.00000000036E1000.00000020.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000008.00000002.251435374.00000000053F0000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000005.00000002.251474105.0000000004FF1000.00000020.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000009.00000002.254179155.00000000023D0000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.764675936.0000000006001000.00000020.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000005.00000002.251540171.0000000005051000.00000020.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000008.00000002.251287174.0000000005310000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000005.00000002.251612529.00000000051D1000.00000020.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.764435934.0000000005DA1000.00000020.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.763511347.00000000057C1000.00000020.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000008.00000002.251607526.0000000005481000.00000020.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.763831341.0000000005A70000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.764277951.0000000005CA1000.00000020.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.761623893.0000000003330000.00000040.00000010.sdmp, type: MEMORY
Source: Yara match File source: 00000005.00000002.251214045.0000000004D60000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.763416711.0000000005761000.00000020.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000005.00000002.251508844.0000000005020000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.762037427.0000000003480000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000008.00000002.250952211.0000000004DF1000.00000020.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.763764045.00000000059C1000.00000020.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000005.00000002.251355041.0000000004E91000.00000020.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000008.00000002.251487303.0000000005421000.00000020.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.763708229.0000000005990000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000005.00000002.251578591.00000000051A0000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000002.247650152.00000000040D1000.00000020.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.763252082.00000000055D0000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000004.00000002.247759843.0000000005001000.00000020.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.763375282.0000000005730000.00000040.00000001.sdmp, type: MEMORY

System Summary:

barindex
Uses 32bit PE files
Source: M2hsMd9hTq.dll Static PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE, DLL
Deletes files inside the Windows folder
Source: C:\Windows\SysWOW64\rundll32.exe File deleted: C:\Windows\SysWOW64\Zxfif\dcctxlgarqbqh.hrz:Zone.Identifier Jump to behavior
Creates files inside the system directory
Source: C:\Windows\SysWOW64\rundll32.exe File created: C:\Windows\SysWOW64\Zxfif\ Jump to behavior
Detected potential crypto function
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 3_2_10020011 3_2_10020011
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 3_2_100181CA 3_2_100181CA
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 3_2_1001929D 3_2_1001929D
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 3_2_1002542D 3_2_1002542D
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 3_2_100274AE 3_2_100274AE
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 3_2_10026575 3_2_10026575
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 3_2_1001869D 3_2_1001869D
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 3_2_1001178A 3_2_1001178A
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 3_2_10016860 3_2_10016860
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 3_2_1002596F 3_2_1002596F
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 3_2_10022A5C 3_2_10022A5C
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 3_2_10018A71 3_2_10018A71
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 3_2_1001AAB7 3_2_1001AAB7
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 3_2_1001CB16 3_2_1001CB16
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 3_2_10018E7D 3_2_10018E7D
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 3_2_10025EB1 3_2_10025EB1
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 3_2_040E85FF 3_2_040E85FF
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 3_2_040EEFDD 3_2_040EEFDD
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 3_2_040D3431 3_2_040D3431
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 3_2_040DA445 3_2_040DA445
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 3_2_040D7442 3_2_040D7442
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 3_2_040EA474 3_2_040EA474
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 3_2_040EDC71 3_2_040EDC71
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 3_2_040D1CA1 3_2_040D1CA1
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 3_2_040ECCD9 3_2_040ECCD9
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 3_2_040EE4E5 3_2_040EE4E5
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 3_2_040EAD08 3_2_040EAD08
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 3_2_040E5515 3_2_040E5515
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 3_2_040E8D3D 3_2_040E8D3D
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 3_2_040E654A 3_2_040E654A
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 3_2_040E7D5B 3_2_040E7D5B
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 3_2_040F2D53 3_2_040F2D53
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 3_2_040E3D85 3_2_040E3D85
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 3_2_040DC5D8 3_2_040DC5D8
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 3_2_040EC5D5 3_2_040EC5D5
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 3_2_040D55FF 3_2_040D55FF
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 3_2_040E9DF5 3_2_040E9DF5
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 3_2_040D8636 3_2_040D8636
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 3_2_040DE640 3_2_040DE640
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 3_2_040E2E5D 3_2_040E2E5D
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 3_2_040D7E79 3_2_040D7E79
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 3_2_040E567B 3_2_040E567B
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 3_2_040DDE74 3_2_040DDE74
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 3_2_040E3EAA 3_2_040E3EAA
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 3_2_040F36AA 3_2_040F36AA
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 3_2_040E0EBC 3_2_040E0EBC
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 3_2_040F46BD 3_2_040F46BD
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 3_2_040DC6B8 3_2_040DC6B8
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 3_2_040F3EE9 3_2_040F3EE9
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 3_2_040EBEFD 3_2_040EBEFD
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 3_2_040DEF0C 3_2_040DEF0C
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 3_2_040D670B 3_2_040D670B
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 3_2_040D1F38 3_2_040D1F38
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 3_2_040EFF58 3_2_040EFF58
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 3_2_040E5779 3_2_040E5779
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 3_2_040E4F74 3_2_040E4F74
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 3_2_040E9774 3_2_040E9774
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 3_2_040E0F86 3_2_040E0F86
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 3_2_040E8FAE 3_2_040E8FAE
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 3_2_040F07AA 3_2_040F07AA
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 3_2_040D77A3 3_2_040D77A3
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 3_2_040F17BD 3_2_040F17BD
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 3_2_040DBFBE 3_2_040DBFBE
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 3_2_040D57B8 3_2_040D57B8
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 3_2_040DE7DE 3_2_040DE7DE
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 3_2_040E67E6 3_2_040E67E6
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 3_2_040E27F9 3_2_040E27F9
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 3_2_040E07F4 3_2_040E07F4
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 3_2_040F2009 3_2_040F2009
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 3_2_040E8806 3_2_040E8806
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 3_2_040DB820 3_2_040DB820
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 3_2_040EF840 3_2_040EF840
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 3_2_040D7078 3_2_040D7078
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 3_2_040DA871 3_2_040DA871
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 3_2_040D80C0 3_2_040D80C0
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 3_2_040ED8DB 3_2_040ED8DB
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 3_2_040F00EF 3_2_040F00EF
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 3_2_040DF0E9 3_2_040DF0E9
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 3_2_040DD14C 3_2_040DD14C
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 3_2_040E2142 3_2_040E2142
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 3_2_040EE955 3_2_040EE955
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 3_2_040E017B 3_2_040E017B
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 3_2_040E6187 3_2_040E6187
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 3_2_040D2194 3_2_040D2194
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 3_2_040ED1BC 3_2_040ED1BC
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 3_2_040EE1F8 3_2_040EE1F8
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 3_2_040E7A0F 3_2_040E7A0F
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 3_2_040E9A01 3_2_040E9A01
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 3_2_040E4244 3_2_040E4244
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 3_2_040EB257 3_2_040EB257
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 3_2_040E4A66 3_2_040E4A66
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 3_2_040F0A64 3_2_040F0A64
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 3_2_040F3263 3_2_040F3263
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 3_2_040DBAA9 3_2_040DBAA9
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 3_2_040EA2A5 3_2_040EA2A5
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 3_2_040E0ABA 3_2_040E0ABA
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 3_2_040ECAD5 3_2_040ECAD5
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 3_2_040F2B09 3_2_040F2B09
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 3_2_040E5333 3_2_040E5333
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 3_2_040DF369 3_2_040DF369
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 3_2_040E437A 3_2_040E437A
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 3_2_040D6B7A 3_2_040D6B7A
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 3_2_040D238C 3_2_040D238C
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 3_2_040DFB8E 3_2_040DFB8E
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 3_2_040EFBDE 3_2_040EFBDE
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 3_2_040D4BFC 3_2_040D4BFC
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_10020011 4_2_10020011
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_100181CA 4_2_100181CA
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_1001929D 4_2_1001929D
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_1002542D 4_2_1002542D
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_100274AE 4_2_100274AE
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_10026575 4_2_10026575
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_1001869D 4_2_1001869D
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_1001178A 4_2_1001178A
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_10016860 4_2_10016860
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_1002596F 4_2_1002596F
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_10022A5C 4_2_10022A5C
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_10018A71 4_2_10018A71
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_1001AAB7 4_2_1001AAB7
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_1001CB16 4_2_1001CB16
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_10018E7D 4_2_10018E7D
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_10025EB1 4_2_10025EB1
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_050185FF 4_2_050185FF
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_0501EFDD 4_2_0501EFDD
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_0501AD08 4_2_0501AD08
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_05015515 4_2_05015515
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_05018D3D 4_2_05018D3D
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_0501654A 4_2_0501654A
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_05022D53 4_2_05022D53
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_05017D5B 4_2_05017D5B
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_05013D85 4_2_05013D85
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_0501C5D5 4_2_0501C5D5
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_0500C5D8 4_2_0500C5D8
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_05019DF5 4_2_05019DF5
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_050055FF 4_2_050055FF
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_05003431 4_2_05003431
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_05007442 4_2_05007442
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_0500A445 4_2_0500A445
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_0501DC71 4_2_0501DC71
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_0501A474 4_2_0501A474
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_05001CA1 4_2_05001CA1
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_0501CCD9 4_2_0501CCD9
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_0501E4E5 4_2_0501E4E5
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_0500670B 4_2_0500670B
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_0500EF0C 4_2_0500EF0C
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_05001F38 4_2_05001F38
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_0501FF58 4_2_0501FF58
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_05014F74 4_2_05014F74
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_05019774 4_2_05019774
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_05015779 4_2_05015779
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_05010F86 4_2_05010F86
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_050077A3 4_2_050077A3
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_050207AA 4_2_050207AA
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_05018FAE 4_2_05018FAE
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_050057B8 4_2_050057B8
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_0500BFBE 4_2_0500BFBE
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_050217BD 4_2_050217BD
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_0500E7DE 4_2_0500E7DE
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_050167E6 4_2_050167E6
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_050107F4 4_2_050107F4
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_050127F9 4_2_050127F9
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_05008636 4_2_05008636
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_0500E640 4_2_0500E640
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_05012E5D 4_2_05012E5D
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_0500DE74 4_2_0500DE74
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_05007E79 4_2_05007E79
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_0501567B 4_2_0501567B
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_050236AA 4_2_050236AA
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_05013EAA 4_2_05013EAA
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_0500C6B8 4_2_0500C6B8
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_05010EBC 4_2_05010EBC
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_050246BD 4_2_050246BD
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_05023EE9 4_2_05023EE9
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_0501BEFD 4_2_0501BEFD
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_05012142 4_2_05012142
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_0500D14C 4_2_0500D14C
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_0501E955 4_2_0501E955
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_0501017B 4_2_0501017B
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_05016187 4_2_05016187
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_05002194 4_2_05002194
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_0501D1BC 4_2_0501D1BC
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_0501E1F8 4_2_0501E1F8
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_05018806 4_2_05018806
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_05022009 4_2_05022009
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_0500B820 4_2_0500B820
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_0501F840 4_2_0501F840
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_0500A871 4_2_0500A871
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_05007078 4_2_05007078
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_050080C0 4_2_050080C0
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_0501D8DB 4_2_0501D8DB
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_0500F0E9 4_2_0500F0E9
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_050200EF 4_2_050200EF
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_05022B09 4_2_05022B09
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_05015333 4_2_05015333
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_0500F369 4_2_0500F369
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_05006B7A 4_2_05006B7A
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_0501437A 4_2_0501437A
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_0500238C 4_2_0500238C
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_0500FB8E 4_2_0500FB8E
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_0501FBDE 4_2_0501FBDE
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_05004BFC 4_2_05004BFC
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_05019A01 4_2_05019A01
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_05017A0F 4_2_05017A0F
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_05014244 4_2_05014244
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_0501B257 4_2_0501B257
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_05023263 4_2_05023263
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_05020A64 4_2_05020A64
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_05014A66 4_2_05014A66
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_0501A2A5 4_2_0501A2A5
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_0500BAA9 4_2_0500BAA9
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_05010ABA 4_2_05010ABA
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_0501CAD5 4_2_0501CAD5
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_04867A0F 5_2_04867A0F
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_04872009 5_2_04872009
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_04858636 5_2_04858636
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_0485A445 5_2_0485A445
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_0486B257 5_2_0486B257
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_04864A66 5_2_04864A66
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_0485DE74 5_2_0485DE74
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_048717BD 5_2_048717BD
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_0486EFDD 5_2_0486EFDD
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_0485C5D8 5_2_0485C5D8
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_048685FF 5_2_048685FF
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_0485670B 5_2_0485670B
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_0486AD08 5_2_0486AD08
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_04862142 5_2_04862142
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_0486654A 5_2_0486654A
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_0486E955 5_2_0486E955
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_0486FF58 5_2_0486FF58
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_0486A2A5 5_2_0486A2A5
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_04851CA1 5_2_04851CA1
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_04863EAA 5_2_04863EAA
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_0485BAA9 5_2_0485BAA9
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_048736AA 5_2_048736AA
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_048746BD 5_2_048746BD
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_04860EBC 5_2_04860EBC
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_04860ABA 5_2_04860ABA
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_0485C6B8 5_2_0485C6B8
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_048580C0 5_2_048580C0
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_0486CAD5 5_2_0486CAD5
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_0486D8DB 5_2_0486D8DB
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_0486CCD9 5_2_0486CCD9
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_0486E4E5 5_2_0486E4E5
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_048700EF 5_2_048700EF
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_0485F0E9 5_2_0485F0E9
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_04873EE9 5_2_04873EE9
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_0486BEFD 5_2_0486BEFD
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_04868806 5_2_04868806
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_04869A01 5_2_04869A01
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_0485B820 5_2_0485B820
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_04853431 5_2_04853431
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_04864244 5_2_04864244
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_0485E640 5_2_0485E640
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_0486F840 5_2_0486F840
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_04857442 5_2_04857442
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_04862E5D 5_2_04862E5D
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_04870A64 5_2_04870A64
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_04873263 5_2_04873263
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_0486A474 5_2_0486A474
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_0485A871 5_2_0485A871
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_0486DC71 5_2_0486DC71
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_04857E79 5_2_04857E79
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_04857078 5_2_04857078
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_0486567B 5_2_0486567B
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_04860F86 5_2_04860F86
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_04866187 5_2_04866187
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_04863D85 5_2_04863D85
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_0485238C 5_2_0485238C
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_0485FB8E 5_2_0485FB8E
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_04852194 5_2_04852194
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_048577A3 5_2_048577A3
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_04868FAE 5_2_04868FAE
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_048707AA 5_2_048707AA
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_0486D1BC 5_2_0486D1BC
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_0485BFBE 5_2_0485BFBE
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_048557B8 5_2_048557B8
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_0486C5D5 5_2_0486C5D5
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_0486FBDE 5_2_0486FBDE
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_0485E7DE 5_2_0485E7DE
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_048667E6 5_2_048667E6
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_048607F4 5_2_048607F4
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_04869DF5 5_2_04869DF5
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_04854BFC 5_2_04854BFC
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_048555FF 5_2_048555FF
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_0486E1F8 5_2_0486E1F8
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_048627F9 5_2_048627F9
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_0485EF0C 5_2_0485EF0C
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_04872B09 5_2_04872B09
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_04865515 5_2_04865515
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_04865333 5_2_04865333
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_04868D3D 5_2_04868D3D
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_04851F38 5_2_04851F38
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_0485D14C 5_2_0485D14C
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_04872D53 5_2_04872D53
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_04867D5B 5_2_04867D5B
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_0485F369 5_2_0485F369
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_04864F74 5_2_04864F74
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_04869774 5_2_04869774
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_0486437A 5_2_0486437A
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_0486017B 5_2_0486017B
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_04865779 5_2_04865779
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_04856B7A 5_2_04856B7A
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 8_2_04E04A66 8_2_04E04A66
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 8_2_04DFDE74 8_2_04DFDE74
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 8_2_04E12009 8_2_04E12009
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 8_2_04DF8636 8_2_04DF8636
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 8_2_04E07A0F 8_2_04E07A0F
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 8_2_04DFC5D8 8_2_04DFC5D8
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 8_2_04E0EFDD 8_2_04E0EFDD
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 8_2_04E02142 8_2_04E02142
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 8_2_04E0654A 8_2_04E0654A
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 8_2_04E0FF58 8_2_04E0FF58
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 8_2_04DF670B 8_2_04DF670B
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 8_2_04E0AD08 8_2_04E0AD08
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 8_2_04E0E4E5 8_2_04E0E4E5
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 8_2_04E13EE9 8_2_04E13EE9
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 8_2_04E100EF 8_2_04E100EF
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 8_2_04E0BEFD 8_2_04E0BEFD
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 8_2_04DF80C0 8_2_04DF80C0
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 8_2_04E0CAD5 8_2_04E0CAD5
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 8_2_04DFF0E9 8_2_04DFF0E9
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 8_2_04E0CCD9 8_2_04E0CCD9
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 8_2_04E0D8DB 8_2_04E0D8DB
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 8_2_04E0A2A5 8_2_04E0A2A5
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 8_2_04E03EAA 8_2_04E03EAA
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 8_2_04E136AA 8_2_04E136AA
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 8_2_04E00ABA 8_2_04E00ABA
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 8_2_04E146BD 8_2_04E146BD
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 8_2_04E00EBC 8_2_04E00EBC
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 8_2_04DFC6B8 8_2_04DFC6B8
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 8_2_04DFBAA9 8_2_04DFBAA9
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 8_2_04DF1CA1 8_2_04DF1CA1
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 8_2_04E13263 8_2_04E13263
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 8_2_04E10A64 8_2_04E10A64
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 8_2_04E0DC71 8_2_04E0DC71
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 8_2_04E0A474 8_2_04E0A474
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 8_2_04DFA445 8_2_04DFA445
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 8_2_04E0567B 8_2_04E0567B
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 8_2_04DF7442 8_2_04DF7442
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 8_2_04DFE640 8_2_04DFE640
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 8_2_04E0F840 8_2_04E0F840
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 8_2_04E04244 8_2_04E04244
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 8_2_04DF7E79 8_2_04DF7E79
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 8_2_04DF7078 8_2_04DF7078
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 8_2_04DFA871 8_2_04DFA871
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 8_2_04E0B257 8_2_04E0B257
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 8_2_04E02E5D 8_2_04E02E5D
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 8_2_04E09A01 8_2_04E09A01
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 8_2_04E08806 8_2_04E08806
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 8_2_04DF3431 8_2_04DF3431
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 8_2_04DFB820 8_2_04DFB820
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 8_2_04DFE7DE 8_2_04DFE7DE
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 8_2_04E067E6 8_2_04E067E6
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 8_2_04E007F4 8_2_04E007F4
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 8_2_04E09DF5 8_2_04E09DF5
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 8_2_04E0E1F8 8_2_04E0E1F8
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 8_2_04E027F9 8_2_04E027F9
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 8_2_04E085FF 8_2_04E085FF
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 8_2_04DF55FF 8_2_04DF55FF
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 8_2_04DF4BFC 8_2_04DF4BFC
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 8_2_04E0C5D5 8_2_04E0C5D5
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 8_2_04E0FBDE 8_2_04E0FBDE
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 8_2_04DF2194 8_2_04DF2194
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 8_2_04E107AA 8_2_04E107AA
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 8_2_04E08FAE 8_2_04E08FAE
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 8_2_04DFFB8E 8_2_04DFFB8E
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 8_2_04DF238C 8_2_04DF238C
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 8_2_04E0D1BC 8_2_04E0D1BC
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 8_2_04E117BD 8_2_04E117BD
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 8_2_04DFBFBE 8_2_04DFBFBE
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 8_2_04E03D85 8_2_04E03D85
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 8_2_04E00F86 8_2_04E00F86
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 8_2_04DF57B8 8_2_04DF57B8
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 8_2_04E06187 8_2_04E06187
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 8_2_04DF77A3 8_2_04DF77A3
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 8_2_04DFD14C 8_2_04DFD14C
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 8_2_04E04F74 8_2_04E04F74
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 8_2_04E09774 8_2_04E09774
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 8_2_04E05779 8_2_04E05779
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 8_2_04E0437A 8_2_04E0437A
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 8_2_04E0017B 8_2_04E0017B
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 8_2_04DF6B7A 8_2_04DF6B7A
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 8_2_04E12D53 8_2_04E12D53
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 8_2_04E0E955 8_2_04E0E955
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 8_2_04DFF369 8_2_04DFF369
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 8_2_04E07D5B 8_2_04E07D5B
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 8_2_04DFEF0C 8_2_04DFEF0C
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 8_2_04E05333 8_2_04E05333
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 8_2_04E08D3D 8_2_04E08D3D
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 8_2_04DF1F38 8_2_04DF1F38
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 8_2_04E12B09 8_2_04E12B09
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 8_2_04E05515 8_2_04E05515
Found potential string decryption / allocating functions
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: String function: 10017BC1 appears 68 times
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: String function: 1001984C appears 48 times
Source: C:\Windows\SysWOW64\rundll32.exe Code function: String function: 10017BC1 appears 68 times
Source: C:\Windows\SysWOW64\rundll32.exe Code function: String function: 1001984C appears 48 times
Sample file is different than original file name gathered from version info
Source: M2hsMd9hTq.dll Binary or memory string: OriginalFilenameUDPTool.EXE: vs M2hsMd9hTq.dll
PE file contains strange resources
Source: M2hsMd9hTq.dll Static PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Tries to load missing DLLs
Source: C:\Windows\SysWOW64\regsvr32.exe Section loaded: sfc.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: xboxlivetitleid.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: cdpsgshims.dll Jump to behavior
Source: M2hsMd9hTq.dll Virustotal: Detection: 25%
Source: M2hsMd9hTq.dll ReversingLabs: Detection: 34%
Source: M2hsMd9hTq.dll Static PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
Source: C:\Windows\System32\loaddll32.exe Key opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers Jump to behavior
Source: unknown Process created: C:\Windows\System32\loaddll32.exe loaddll32.exe "C:\Users\user\Desktop\M2hsMd9hTq.dll"
Source: C:\Windows\System32\loaddll32.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\M2hsMd9hTq.dll",#1
Source: C:\Windows\System32\loaddll32.exe Process created: C:\Windows\SysWOW64\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\M2hsMd9hTq.dll
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\M2hsMd9hTq.dll",#1
Source: C:\Windows\System32\loaddll32.exe Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\M2hsMd9hTq.dll,DllRegisterServer
Source: C:\Windows\SysWOW64\regsvr32.exe Process created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\rundll32.exe "C:\Users\user\Desktop\M2hsMd9hTq.dll",DllRegisterServer
Source: C:\Windows\SysWOW64\rundll32.exe Process created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\rundll32.exe "C:\Users\user\Desktop\M2hsMd9hTq.dll",DllRegisterServer
Source: C:\Windows\SysWOW64\rundll32.exe Process created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Zxfif\dcctxlgarqbqh.hrz",JFJwcZZNDUCWxQ
Source: C:\Windows\SysWOW64\rundll32.exe Process created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\rundll32.exe "C:\Windows\System32\Zxfif\dcctxlgarqbqh.hrz",DllRegisterServer
Source: unknown Process created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
Source: unknown Process created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p
Source: unknown Process created: C:\Windows\System32\svchost.exe c:\windows\system32\svchost.exe -k localservice -p -s CDPSvc
Source: unknown Process created: C:\Windows\System32\svchost.exe c:\windows\system32\svchost.exe -k networkservice -p -s DoSvc
Source: unknown Process created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k NetworkService -p
Source: unknown Process created: C:\Windows\System32\SgrmBroker.exe C:\Windows\system32\SgrmBroker.exe
Source: unknown Process created: C:\Windows\System32\svchost.exe c:\windows\system32\svchost.exe -k localservicenetworkrestricted -p -s wscsvc
Source: unknown Process created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p
Source: unknown Process created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p
Source: C:\Windows\System32\svchost.exe Process created: C:\Program Files\Windows Defender\MpCmdRun.exe "C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable
Source: C:\Program Files\Windows Defender\MpCmdRun.exe Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: unknown Process created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p
Source: unknown Process created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p
Source: C:\Windows\System32\loaddll32.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\M2hsMd9hTq.dll",#1 Jump to behavior
Source: C:\Windows\System32\loaddll32.exe Process created: C:\Windows\SysWOW64\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\M2hsMd9hTq.dll Jump to behavior
Source: C:\Windows\System32\loaddll32.exe Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\M2hsMd9hTq.dll,DllRegisterServer Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\M2hsMd9hTq.dll",#1 Jump to behavior
Source: C:\Windows\SysWOW64\regsvr32.exe Process created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\rundll32.exe "C:\Users\user\Desktop\M2hsMd9hTq.dll",DllRegisterServer Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\rundll32.exe "C:\Users\user\Desktop\M2hsMd9hTq.dll",DllRegisterServer Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Zxfif\dcctxlgarqbqh.hrz",JFJwcZZNDUCWxQ Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\rundll32.exe "C:\Windows\System32\Zxfif\dcctxlgarqbqh.hrz",DllRegisterServer Jump to behavior
Source: C:\Windows\System32\svchost.exe Process created: C:\Program Files\Windows Defender\MpCmdRun.exe "C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32 Jump to behavior
Source: classification engine Classification label: mal100.troj.evad.winDLL@31/9@0/29
Source: C:\Windows\SysWOW64\rundll32.exe File read: C:\Users\desktop.ini Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\M2hsMd9hTq.dll",#1
Source: C:\Windows\System32\conhost.exe Mutant created: \BaseNamedObjects\Local\SM0:5500:120:WilError_01
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 3_2_100126F9 FindResourceA,LoadResource,LockResource,FreeResource, 3_2_100126F9
Source: C:\Windows\SysWOW64\rundll32.exe File read: C:\Windows\System32\drivers\etc\hosts Jump to behavior
Source: C:\Windows\System32\svchost.exe File read: C:\Windows\System32\drivers\etc\hosts Jump to behavior
Source: C:\Windows\System32\svchost.exe File read: C:\Windows\System32\drivers\etc\hosts Jump to behavior
Source: C:\Windows\System32\svchost.exe File read: C:\Windows\System32\drivers\etc\hosts Jump to behavior
Source: C:\Windows\System32\svchost.exe File read: C:\Windows\System32\drivers\etc\hosts Jump to behavior
Source: M2hsMd9hTq.dll Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: M2hsMd9hTq.dll Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: M2hsMd9hTq.dll Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: M2hsMd9hTq.dll Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: M2hsMd9hTq.dll Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata

Data Obfuscation:

barindex
Uses code obfuscation techniques (call, push, ret)
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 3_2_10019891 push ecx; ret 3_2_100198A4
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 3_2_10017C60 push ecx; ret 3_2_10017C73
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 3_2_040D1195 push cs; iretd 3_2_040D1197
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_10019891 push ecx; ret 4_2_100198A4
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_10017C60 push ecx; ret 4_2_10017C73
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_05001195 push cs; iretd 4_2_05001197
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_04851195 push cs; iretd 5_2_04851197
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 8_2_04DF1195 push cs; iretd 8_2_04DF1197
Contains functionality to dynamically determine API calls
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 3_2_10023A79 LoadLibraryA,GetProcAddress,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,__invoke_watson,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,__decode_pointer,__decode_pointer,__invoke_watson,__decode_pointer,__decode_pointer,__decode_pointer, 3_2_10023A79
PE file contains an invalid checksum
Source: M2hsMd9hTq.dll Static PE information: real checksum: 0x66354 should be: 0x7479d
Registers a DLL
Source: C:\Windows\System32\loaddll32.exe Process created: C:\Windows\SysWOW64\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\M2hsMd9hTq.dll

Persistence and Installation Behavior:

barindex
Drops PE files to the windows directory (C:\Windows)
Source: C:\Windows\SysWOW64\rundll32.exe PE file moved: C:\Windows\SysWOW64\Zxfif\dcctxlgarqbqh.hrz Jump to behavior

Hooking and other Techniques for Hiding and Protection:

barindex
Hides that the sample has been downloaded from the Internet (zone.identifier)
Source: C:\Windows\SysWOW64\rundll32.exe File opened: C:\Windows\SysWOW64\Zxfif\dcctxlgarqbqh.hrz:Zone.Identifier read attributes | delete Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe File opened: C:\Windows\SysWOW64\Jfqipigpage\lfkhkwabjlp.gvp:Zone.Identifier read attributes | delete Jump to behavior
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 3_2_1000D804 IsIconic,GetWindowPlacement,GetWindowRect, 3_2_1000D804
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 3_2_10008B90 IsIconic,SendMessageA,GetSystemMetrics,GetSystemMetrics,GetClientRect,DrawIcon, 3_2_10008B90
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_1000D804 IsIconic,GetWindowPlacement,GetWindowRect, 4_2_1000D804
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_10008B90 IsIconic,SendMessageA,GetSystemMetrics,GetSystemMetrics,GetClientRect,DrawIcon, 4_2_10008B90
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Source: C:\Windows\SysWOW64\rundll32.exe Registry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process information set: NOOPENFILEERRORBOX Jump to behavior

Malware Analysis System Evasion:

barindex
May sleep (evasive loops) to hinder dynamic analysis
Source: C:\Windows\System32\svchost.exe TID: 2272 Thread sleep time: -30000s >= -30000s Jump to behavior
Source: C:\Windows\System32\svchost.exe TID: 2880 Thread sleep time: -30000s >= -30000s Jump to behavior
Source: C:\Windows\System32\svchost.exe TID: 5916 Thread sleep time: -210000s >= -30000s Jump to behavior
Sample execution stops while process was sleeping (likely an evasion)
Source: C:\Windows\System32\loaddll32.exe Last function: Thread delayed
Source: C:\Windows\System32\conhost.exe Last function: Thread delayed
Queries disk information (often used to detect virtual machines)
Source: C:\Windows\System32\svchost.exe File opened: PhysicalDrive0 Jump to behavior
Found large amount of non-executed APIs
Source: C:\Windows\SysWOW64\regsvr32.exe API coverage: 4.9 %
Source: C:\Windows\SysWOW64\rundll32.exe API coverage: 4.9 %
Source: C:\Windows\SysWOW64\regsvr32.exe API call chain: ExitProcess graph end node
Source: C:\Windows\SysWOW64\rundll32.exe API call chain: ExitProcess graph end node
Source: C:\Windows\SysWOW64\rundll32.exe File Volume queried: C:\ FullSizeInformation Jump to behavior
Source: rundll32.exe, 0000000A.00000003.287598003.0000000003514000.00000004.00000001.sdmp, rundll32.exe, 0000000A.00000002.762430065.0000000003514000.00000004.00000001.sdmp Binary or memory string: Hyper-V RAWX
Source: svchost.exe, 0000000C.00000002.603148618.0000023DBF862000.00000004.00000001.sdmp Binary or memory string: "@Hyper-V RAWGlobal\BFE_Notify_Event_{165f929e-c666-46f4-ace4-b77cc56f1e7e}LMEM
Source: rundll32.exe, 0000000A.00000003.287598003.0000000003514000.00000004.00000001.sdmp, rundll32.exe, 0000000A.00000002.762430065.0000000003514000.00000004.00000001.sdmp, svchost.exe, 0000000C.00000002.603130519.0000023DBF84C000.00000004.00000001.sdmp, svchost.exe, 00000021.00000002.587037532.000002A23086B000.00000004.00000001.sdmp, svchost.exe, 00000021.00000003.586277347.000002A23086A000.00000004.00000001.sdmp, svchost.exe, 00000021.00000002.587230521.000002A2308E8000.00000004.00000001.sdmp Binary or memory string: Hyper-V RAW
Source: svchost.exe, 0000000C.00000002.602838176.0000023DBA029000.00000004.00000001.sdmp Binary or memory string: Hyper-V RAW@Q
Source: svchost.exe, 0000000E.00000002.761004522.000002866503E000.00000004.00000001.sdmp, svchost.exe, 0000000F.00000002.761009269.000001F052629000.00000004.00000001.sdmp Binary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll

Anti Debugging:

barindex
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 3_2_1001C49A _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, 3_2_1001C49A
Contains functionality to dynamically determine API calls
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 3_2_10023A79 LoadLibraryA,GetProcAddress,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,__invoke_watson,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,__decode_pointer,__decode_pointer,__invoke_watson,__decode_pointer,__decode_pointer,__decode_pointer, 3_2_10023A79
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 3_2_100178B6 GetProcessHeap,GetProcessHeap,HeapAlloc,GetVersionExA,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,__heap_term,__RTC_Initialize,GetCommandLineA,___crtGetEnvironmentStringsA,__ioinit,__mtterm,__setargv,__setenvp,__cinit,__ioterm,__ioterm,__mtterm,__heap_term,___set_flsgetvalue,__calloc_crt,__decode_pointer,__initptd,GetCurrentThreadId,__freeptd, 3_2_100178B6
Contains functionality to read the PEB
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 3_2_040DF7F7 mov eax, dword ptr fs:[00000030h] 3_2_040DF7F7
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_0500F7F7 mov eax, dword ptr fs:[00000030h] 4_2_0500F7F7
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_0485F7F7 mov eax, dword ptr fs:[00000030h] 5_2_0485F7F7
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 8_2_04DFF7F7 mov eax, dword ptr fs:[00000030h] 8_2_04DFF7F7
Checks if the current process is being debugged
Source: C:\Windows\System32\loaddll32.exe Process queried: DebugPort Jump to behavior
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 3_2_1001C49A _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, 3_2_1001C49A
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 3_2_10021743 __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter, 3_2_10021743
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 3_2_100167D5 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, 3_2_100167D5
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 3_2_1001FC21 SetUnhandledExceptionFilter,__encode_pointer, 3_2_1001FC21
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 3_2_1001FC43 __decode_pointer,SetUnhandledExceptionFilter, 3_2_1001FC43
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_1001C49A _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, 4_2_1001C49A
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_10021743 __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter, 4_2_10021743
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_100167D5 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, 4_2_100167D5
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_1001FC21 SetUnhandledExceptionFilter,__encode_pointer, 4_2_1001FC21
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_1001FC43 __decode_pointer,SetUnhandledExceptionFilter, 4_2_1001FC43

HIPS / PFW / Operating System Protection Evasion:

barindex
System process connects to network (likely due to code injection or exploit)
Source: C:\Windows\SysWOW64\rundll32.exe Network Connect: 69.16.218.101 144 Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Network Connect: 45.138.98.34 80 Jump to behavior
Creates a process in suspended mode (likely to inject code)
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\M2hsMd9hTq.dll",#1 Jump to behavior
Source: rundll32.exe, 0000000A.00000002.762963759.0000000003AC0000.00000002.00020000.sdmp Binary or memory string: Shell_TrayWnd
Source: rundll32.exe, 0000000A.00000002.762963759.0000000003AC0000.00000002.00020000.sdmp Binary or memory string: Progman
Source: rundll32.exe, 0000000A.00000002.762963759.0000000003AC0000.00000002.00020000.sdmp Binary or memory string: SProgram Managerl
Source: rundll32.exe, 0000000A.00000002.762963759.0000000003AC0000.00000002.00020000.sdmp Binary or memory string: Shell_TrayWnd,
Source: rundll32.exe, 0000000A.00000002.762963759.0000000003AC0000.00000002.00020000.sdmp Binary or memory string: Progmanlock

Language, Device and Operating System Detection:

barindex
Queries the volume information (name, serial number etc) of a device
Source: C:\Windows\SysWOW64\rundll32.exe Queries volume information: C:\ VolumeInformation Jump to behavior
Source: C:\Windows\System32\svchost.exe Queries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation Jump to behavior
Source: C:\Windows\System32\svchost.exe Queries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation Jump to behavior
Source: C:\Windows\System32\svchost.exe Queries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation Jump to behavior
Source: C:\Windows\System32\svchost.exe Queries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation Jump to behavior
Source: C:\Windows\System32\svchost.exe Queries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation Jump to behavior
Source: C:\Windows\System32\svchost.exe Queries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation Jump to behavior
Source: C:\Windows\System32\svchost.exe Queries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation Jump to behavior
Source: C:\Windows\System32\svchost.exe Queries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformation Jump to behavior
Source: C:\Windows\System32\svchost.exe Queries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm VolumeInformation Jump to behavior
Source: C:\Windows\System32\svchost.exe Queries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformation Jump to behavior
Source: C:\Windows\System32\svchost.exe Queries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformation Jump to behavior
Source: C:\Windows\System32\svchost.exe Queries volume information: C:\ VolumeInformation Jump to behavior
Source: C:\Windows\System32\svchost.exe Queries volume information: C:\ VolumeInformation Jump to behavior
Source: C:\Windows\System32\svchost.exe Queries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation Jump to behavior
Source: C:\Windows\System32\svchost.exe Queries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation Jump to behavior
Source: C:\Windows\System32\svchost.exe Queries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation Jump to behavior
Contains functionality to query locales information (e.g. system language)
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: GetThreadLocale,GetLocaleInfoA,GetACP, 3_2_10027704
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: _strcpy_s,__snprintf_s,GetLocaleInfoA,LoadLibraryA, 3_2_1000A803
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: GetLocaleInfoA, 3_2_10023880
Source: C:\Windows\SysWOW64\rundll32.exe Code function: GetThreadLocale,GetLocaleInfoA,GetACP, 4_2_10027704
Source: C:\Windows\SysWOW64\rundll32.exe Code function: _strcpy_s,__snprintf_s,GetLocaleInfoA,LoadLibraryA, 4_2_1000A803
Source: C:\Windows\SysWOW64\rundll32.exe Code function: GetLocaleInfoA, 4_2_10023880
Contains functionality to query CPU information (cpuid)
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 3_2_10022853 cpuid 3_2_10022853
Source: C:\Windows\SysWOW64\rundll32.exe Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid Jump to behavior
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 3_2_1001F914 GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter, 3_2_1001F914
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 3_2_100178B6 GetProcessHeap,GetProcessHeap,HeapAlloc,GetVersionExA,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,__heap_term,__RTC_Initialize,GetCommandLineA,___crtGetEnvironmentStringsA,__ioinit,__mtterm,__setargv,__setenvp,__cinit,__ioterm,__ioterm,__mtterm,__heap_term,___set_flsgetvalue,__calloc_crt,__decode_pointer,__initptd,GetCurrentThreadId,__freeptd, 3_2_100178B6

Lowering of HIPS / PFW / Operating System Security Settings:

barindex
Changes security center settings (notifications, updates, antivirus, firewall)
Source: C:\Windows\System32\svchost.exe Key value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center cval Jump to behavior
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Source: C:\Windows\System32\svchost.exe WMI Queries: IWbemServices::ExecNotificationQuery - ROOT\SecurityCenter : SELECT * FROM __InstanceOperationEvent WHERE TargetInstance ISA 'AntiVirusProduct' OR TargetInstance ISA 'FirewallProduct' OR TargetInstance ISA 'AntiSpywareProduct'
Source: C:\Windows\System32\svchost.exe WMI Queries: IWbemServices::CreateInstanceEnum - ROOT\SecurityCenter2 : FirewallProduct
Source: C:\Windows\System32\svchost.exe WMI Queries: IWbemServices::CreateInstanceEnum - ROOT\SecurityCenter2 : AntiVirusProduct
Source: C:\Windows\System32\svchost.exe WMI Queries: IWbemServices::CreateInstanceEnum - ROOT\SecurityCenter2 : AntiSpywareProduct
AV process strings found (often used to terminate AV products)
Source: svchost.exe, 00000012.00000002.760931158.0000017D1C83D000.00000004.00000001.sdmp Binary or memory string: &@V%ProgramFiles%\Windows Defender\MsMpeng.exe
Source: svchost.exe, 00000012.00000002.760788276.0000017D1C813000.00000004.00000001.sdmp, svchost.exe, 00000012.00000002.761024824.0000017D1C902000.00000004.00000001.sdmp Binary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe

Stealing of Sensitive Information:

barindex
Yara detected Emotet
Source: Yara match File source: 10.2.rundll32.exe.5d70000.20.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 9.2.rundll32.exe.23d0000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.5790000.10.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 4.2.rundll32.exe.4ed0000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 8.2.rundll32.exe.5480000.7.unpack, type: UNPACKEDPE
Source: Yara match File source: 5.2.rundll32.exe.4e90000.5.unpack, type: UNPACKEDPE
Source: Yara match File source: 8.2.rundll32.exe.5310000.2.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.5fd0000.22.unpack, type: UNPACKEDPE
Source: Yara match File source: 8.2.rundll32.exe.53f0000.4.unpack, type: UNPACKEDPE
Source: Yara match File source: 5.2.rundll32.exe.51a0000.10.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.3360000.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 3.2.regsvr32.exe.40d0000.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.5aa0000.17.unpack, type: UNPACKEDPE
Source: Yara match File source: 5.2.rundll32.exe.51d0000.11.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.54f0000.4.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.36e0000.3.unpack, type: UNPACKEDPE
Source: Yara match File source: 5.2.rundll32.exe.5020000.8.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 8.2.rundll32.exe.5340000.3.unpack, type: UNPACKEDPE
Source: Yara match File source: 5.2.rundll32.exe.4ff0000.7.unpack, type: UNPACKEDPE
Source: Yara match File source: 5.2.rundll32.exe.4850000.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.5600000.7.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.54f0000.4.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 5.2.rundll32.exe.5050000.9.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.55d0000.6.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.5730000.8.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 9.2.rundll32.exe.2790000.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 5.2.rundll32.exe.4db0000.3.unpack, type: UNPACKEDPE
Source: Yara match File source: 8.2.rundll32.exe.5310000.2.unpack, type: UNPACKEDPE
Source: Yara match File source: 8.2.rundll32.exe.5450000.6.unpack, type: UNPACKEDPE
Source: Yara match File source: 8.2.rundll32.exe.4df0000.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.57c0000.11.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.5c70000.18.unpack, type: UNPACKEDPE
Source: Yara match File source: 5.2.rundll32.exe.4d60000.2.unpack, type: UNPACKEDPE
Source: Yara match File source: 8.2.rundll32.exe.4cc0000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.5870000.12.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 5.2.rundll32.exe.4fc0000.6.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.5a70000.16.unpack, type: UNPACKEDPE
Source: Yara match File source: 5.2.rundll32.exe.3070000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.5520000.5.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.59c0000.15.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.5730000.8.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.6000000.23.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.3330000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 4.2.rundll32.exe.5000000.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.5da0000.21.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.5d70000.20.unpack, type: UNPACKEDPE
Source: Yara match File source: 3.2.regsvr32.exe.26d0000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.5990000.14.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.5870000.12.unpack, type: UNPACKEDPE
Source: Yara match File source: 8.2.rundll32.exe.53f0000.4.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.3330000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.5790000.10.unpack, type: UNPACKEDPE
Source: Yara match File source: 5.2.rundll32.exe.4e60000.4.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.58a0000.13.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.5a70000.16.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.5990000.14.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 8.2.rundll32.exe.5450000.6.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 5.2.rundll32.exe.5020000.8.unpack, type: UNPACKEDPE
Source: Yara match File source: 5.2.rundll32.exe.51a0000.10.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 9.2.rundll32.exe.23d0000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 5.2.rundll32.exe.4d60000.2.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 3.2.regsvr32.exe.26d0000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.5760000.9.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.5c70000.18.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.3480000.2.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.5ca0000.19.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.3480000.2.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 8.2.rundll32.exe.5420000.5.unpack, type: UNPACKEDPE
Source: Yara match File source: 5.2.rundll32.exe.3070000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 4.2.rundll32.exe.4ed0000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.5fd0000.22.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 8.2.rundll32.exe.4cc0000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.55d0000.6.unpack, type: UNPACKEDPE
Source: Yara match File source: 5.2.rundll32.exe.4e60000.4.unpack, type: UNPACKEDPE
Source: Yara match File source: 5.2.rundll32.exe.4fc0000.6.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 00000004.00000002.247708165.0000000004ED0000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.764384798.0000000005D70000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000005.00000002.251269260.0000000004DB1000.00000020.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.764593172.0000000005FD0000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000008.00000002.250801502.0000000004CC0000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000005.00000002.251317536.0000000004E60000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.763160491.00000000054F0000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000008.00000002.251543763.0000000005450000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000005.00000002.251018853.0000000004851000.00000020.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000009.00000002.254580749.0000000002791000.00000020.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.763467558.0000000005790000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.764153228.0000000005C70000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.763888533.0000000005AA1000.00000020.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.763578627.0000000005870000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.763623141.00000000058A1000.00000020.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.761812038.0000000003361000.00000020.00000010.sdmp, type: MEMORY
Source: Yara match File source: 00000005.00000002.251440561.0000000004FC0000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000005.00000002.250842742.0000000003070000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.763204211.0000000005521000.00000020.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000002.247153008.00000000026D0000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000008.00000002.251348106.0000000005341000.00000020.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.763293110.0000000005601000.00000020.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.762842466.00000000036E1000.00000020.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000008.00000002.251435374.00000000053F0000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000005.00000002.251474105.0000000004FF1000.00000020.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000009.00000002.254179155.00000000023D0000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.764675936.0000000006001000.00000020.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000005.00000002.251540171.0000000005051000.00000020.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000008.00000002.251287174.0000000005310000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000005.00000002.251612529.00000000051D1000.00000020.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.764435934.0000000005DA1000.00000020.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.763511347.00000000057C1000.00000020.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000008.00000002.251607526.0000000005481000.00000020.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.763831341.0000000005A70000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.764277951.0000000005CA1000.00000020.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.761623893.0000000003330000.00000040.00000010.sdmp, type: MEMORY
Source: Yara match File source: 00000005.00000002.251214045.0000000004D60000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.763416711.0000000005761000.00000020.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000005.00000002.251508844.0000000005020000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.762037427.0000000003480000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000008.00000002.250952211.0000000004DF1000.00000020.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.763764045.00000000059C1000.00000020.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000005.00000002.251355041.0000000004E91000.00000020.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000008.00000002.251487303.0000000005421000.00000020.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.763708229.0000000005990000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000005.00000002.251578591.00000000051A0000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000002.247650152.00000000040D1000.00000020.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.763252082.00000000055D0000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000004.00000002.247759843.0000000005001000.00000020.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.763375282.0000000005730000.00000040.00000001.sdmp, type: MEMORY

Remote Access Functionality:

barindex
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 3_2_100011C0 WSAStartup,_memset,htonl,htons,socket,bind,setsockopt, 3_2_100011C0
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_100011C0 WSAStartup,_memset,htonl,htons,socket,bind,setsockopt, 4_2_100011C0
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs