Loading ...

Play interactive tourEdit tour

Windows Analysis Report M2hsMd9hTq

Overview

General Information

Sample Name:M2hsMd9hTq (renamed file extension from none to dll)
Analysis ID:553120
MD5:707ec8851adeff69bdb3204692c340a8
SHA1:b51315290d9b490c55663a572bd85999f3267b7a
SHA256:a6d1ed377e3de0ae885c14ca65c2eafba01207e058ac353289182800a95b5fea
Tags:32dllexetrojan
Infos:

Most interesting Screenshot:

Detection

Emotet
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Multi AV Scanner detection for submitted file
Yara detected Emotet
System process connects to network (likely due to code injection or exploit)
Antivirus detection for URL or domain
Changes security center settings (notifications, updates, antivirus, firewall)
Machine Learning detection for sample
Sigma detected: Suspicious Call by Ordinal
C2 URLs / IPs found in malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query locales information (e.g. system language)
Deletes files inside the Windows folder
May sleep (evasive loops) to hinder dynamic analysis
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Uses code obfuscation techniques (call, push, ret)
Creates files inside the system directory
Internet Provider seen in connection with other malware
Detected potential crypto function
Contains functionality to query CPU information (cpuid)
Found potential string decryption / allocating functions
Sample execution stops while process was sleeping (likely an evasion)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to dynamically determine API calls
Contains functionality which may be used to detect a debugger (GetProcessHeap)
IP address seen in connection with other malware
AV process strings found (often used to terminate AV products)
Sample file is different than original file name gathered from version info
PE file contains an invalid checksum
PE file contains strange resources
Tries to load missing DLLs
Contains functionality to read the PEB
Drops PE files to the windows directory (C:\Windows)
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Detected TCP or UDP traffic on non-standard ports
Checks if the current process is being debugged
Connects to several IPs in different countries
Potential key logger detected (key state polling based)
Registers a DLL
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Queries disk information (often used to detect virtual machines)
Found large amount of non-executed APIs
Creates a process in suspended mode (likely to inject code)

Classification

Process Tree

  • System is w10x64
  • loaddll32.exe (PID: 328 cmdline: loaddll32.exe "C:\Users\user\Desktop\M2hsMd9hTq.dll" MD5: 7DEB5DB86C0AC789123DEC286286B938)
    • cmd.exe (PID: 5872 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\M2hsMd9hTq.dll",#1 MD5: F3BDBE3BB6F734E357235F4D5898582D)
      • rundll32.exe (PID: 4892 cmdline: rundll32.exe "C:\Users\user\Desktop\M2hsMd9hTq.dll",#1 MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
        • rundll32.exe (PID: 984 cmdline: C:\Windows\SysWOW64\rundll32.exe "C:\Users\user\Desktop\M2hsMd9hTq.dll",DllRegisterServer MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
    • regsvr32.exe (PID: 2512 cmdline: regsvr32.exe /s C:\Users\user\Desktop\M2hsMd9hTq.dll MD5: 426E7499F6A7346F0410DEAD0805586B)
      • rundll32.exe (PID: 3256 cmdline: C:\Windows\SysWOW64\rundll32.exe "C:\Users\user\Desktop\M2hsMd9hTq.dll",DllRegisterServer MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
    • rundll32.exe (PID: 4940 cmdline: rundll32.exe C:\Users\user\Desktop\M2hsMd9hTq.dll,DllRegisterServer MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
      • rundll32.exe (PID: 1264 cmdline: C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Zxfif\dcctxlgarqbqh.hrz",JFJwcZZNDUCWxQ MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
        • rundll32.exe (PID: 4652 cmdline: C:\Windows\SysWOW64\rundll32.exe "C:\Windows\System32\Zxfif\dcctxlgarqbqh.hrz",DllRegisterServer MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
  • svchost.exe (PID: 3224 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 5516 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 4488 cmdline: c:\windows\system32\svchost.exe -k localservice -p -s CDPSvc MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 1404 cmdline: c:\windows\system32\svchost.exe -k networkservice -p -s DoSvc MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 4564 cmdline: C:\Windows\System32\svchost.exe -k NetworkService -p MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • SgrmBroker.exe (PID: 2224 cmdline: C:\Windows\system32\SgrmBroker.exe MD5: D3170A3F3A9626597EEE1888686E3EA6)
  • svchost.exe (PID: 780 cmdline: c:\windows\system32\svchost.exe -k localservicenetworkrestricted -p -s wscsvc MD5: 32569E403279B3FD2EDB7EBD036273FA)
    • MpCmdRun.exe (PID: 5536 cmdline: "C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable MD5: A267555174BFA53844371226F482B86B)
      • conhost.exe (PID: 5500 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • svchost.exe (PID: 3000 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 6036 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 4624 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 1560 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • cleanup

Malware Configuration

Threatname: Emotet

{"C2 list": ["45.138.98.34:80", "69.16.218.101:8080", "51.210.242.234:8080", "185.148.168.220:8080", "142.4.219.173:8080", "54.38.242.185:443", "191.252.103.16:80", "104.131.62.48:8080", "62.171.178.147:8080", "217.182.143.207:443", "168.197.250.14:80", "37.44.244.177:8080", "66.42.57.149:443", "210.57.209.142:8080", "159.69.237.188:443", "116.124.128.206:8080", "128.199.192.135:8080", "195.154.146.35:443", "185.148.168.15:8080", "195.77.239.39:8080", "207.148.81.119:8080", "85.214.67.203:8080", "190.90.233.66:443", "78.46.73.125:443", "78.47.204.80:443", "37.59.209.141:8080", "54.37.228.122:443"], "Public Key": ["RUNLMSAAAADYNZPXY4tQxd/N4Wn5sTYAm5tUOxY2ol1ELrI4MNhHNi640vSLasjYTHpFRBoG+o84vtr7AJachCzOHjaAJFCW", "RUNTMSAAAAD0LxqDNhonUYwk8sqo7IWuUllRdUiUBnACc6romsQoe1YJD7wIe4AheqYofpZFucPDXCZ0z9i+ooUffqeoLZU0"]}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000004.00000002.247708165.0000000004ED0000.00000040.00000001.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
    0000000A.00000002.764384798.0000000005D70000.00000040.00000001.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
      00000005.00000002.251269260.0000000004DB1000.00000020.00000001.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
        0000000A.00000002.764593172.0000000005FD0000.00000040.00000001.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
          00000008.00000002.250801502.0000000004CC0000.00000040.00000001.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
            Click to see the 45 entries

            Unpacked PEs

            SourceRuleDescriptionAuthorStrings
            10.2.rundll32.exe.5d70000.20.raw.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
              9.2.rundll32.exe.23d0000.0.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
                10.2.rundll32.exe.5790000.10.raw.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
                  4.2.rundll32.exe.4ed0000.0.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
                    8.2.rundll32.exe.5480000.7.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
                      Click to see the 70 entries

                      Sigma Overview

                      System Summary:

                      barindex
                      Sigma detected: Suspicious Call by OrdinalShow sources
                      Source: Process startedAuthor: Florian Roth: Data: Command: rundll32.exe "C:\Users\user\Desktop\M2hsMd9hTq.dll",#1, CommandLine: rundll32.exe "C:\Users\user\Desktop\M2hsMd9hTq.dll",#1, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\rundll32.exe, NewProcessName: C:\Windows\SysWOW64\rundll32.exe, OriginalFileName: C:\Windows\SysWOW64\rundll32.exe, ParentCommandLine: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\M2hsMd9hTq.dll",#1, ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 5872, ProcessCommandLine: rundll32.exe "C:\Users\user\Desktop\M2hsMd9hTq.dll",#1, ProcessId: 4892

                      Jbx Signature Overview

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection:

                      barindex
                      Found malware configurationShow sources
                      Source: 8.2.rundll32.exe.5310000.2.raw.unpackMalware Configuration Extractor: Emotet {"C2 list": ["45.138.98.34:80", "69.16.218.101:8080", "51.210.242.234:8080", "185.148.168.220:8080", "142.4.219.173:8080", "54.38.242.185:443", "191.252.103.16:80", "104.131.62.48:8080", "62.171.178.147:8080", "217.182.143.207:443", "168.197.250.14:80", "37.44.244.177:8080", "66.42.57.149:443", "210.57.209.142:8080", "159.69.237.188:443", "116.124.128.206:8080", "128.199.192.135:8080", "195.154.146.35:443", "185.148.168.15:8080", "195.77.239.39:8080", "207.148.81.119:8080", "85.214.67.203:8080", "190.90.233.66:443", "78.46.73.125:443", "78.47.204.80:443", "37.59.209.141:8080", "54.37.228.122:443"], "Public Key": ["RUNLMSAAAADYNZPXY4tQxd/N4Wn5sTYAm5tUOxY2ol1ELrI4MNhHNi640vSLasjYTHpFRBoG+o84vtr7AJachCzOHjaAJFCW", "RUNTMSAAAAD0LxqDNhonUYwk8sqo7IWuUllRdUiUBnACc6romsQoe1YJD7wIe4AheqYofpZFucPDXCZ0z9i+ooUffqeoLZU0"]}
                      Multi AV Scanner detection for submitted fileShow sources
                      Source: M2hsMd9hTq.dllVirustotal: Detection: 25%Perma Link
                      Source: M2hsMd9hTq.dllReversingLabs: Detection: 34%
                      Antivirus detection for URL or domainShow sources
                      Source: https://45.138.98.34/1Avira URL Cloud: Label: malware
                      Source: https://45.138.98.34/Avira URL Cloud: Label: malware
                      Source: https://45.138.98.34:80/qIFNheLVNvvPNSNxkwhjxonGRMtffKSDvVTAvira URL Cloud: Label: malware
                      Machine Learning detection for sampleShow sources
                      Source: M2hsMd9hTq.dllJoe Sandbox ML: detected
                      Source: M2hsMd9hTq.dllStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE, DLL

                      Networking:

                      barindex
                      Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)Show sources
                      Source: TrafficSnort IDS: 2404332 ET CNC Feodo Tracker Reported CnC Server TCP group 17 192.168.2.5:49758 -> 45.138.98.34:80
                      Source: TrafficSnort IDS: 2404338 ET CNC Feodo Tracker Reported CnC Server TCP group 20 192.168.2.5:49759 -> 69.16.218.101:8080
                      System process connects to network (likely due to code injection or exploit)Show sources
                      Source: C:\Windows\SysWOW64\rundll32.exeNetwork Connect: 69.16.218.101 144
                      Source: C:\Windows\SysWOW64\rundll32.exeNetwork Connect: 45.138.98.34 80
                      C2 URLs / IPs found in malware configurationShow sources
                      Source: Malware configuration extractorIPs: 45.138.98.34:80
                      Source: Malware configuration extractorIPs: 69.16.218.101:8080
                      Source: Malware configuration extractorIPs: 51.210.242.234:8080
                      Source: Malware configuration extractorIPs: 185.148.168.220:8080
                      Source: Malware configuration extractorIPs: 142.4.219.173:8080
                      Source: Malware configuration extractorIPs: 54.38.242.185:443
                      Source: Malware configuration extractorIPs: 191.252.103.16:80
                      Source: Malware configuration extractorIPs: 104.131.62.48:8080
                      Source: Malware configuration extractorIPs: 62.171.178.147:8080
                      Source: Malware configuration extractorIPs: 217.182.143.207:443
                      Source: Malware configuration extractorIPs: 168.197.250.14:80
                      Source: Malware configuration extractorIPs: 37.44.244.177:8080
                      Source: Malware configuration extractorIPs: 66.42.57.149:443
                      Source: Malware configuration extractorIPs: 210.57.209.142:8080
                      Source: Malware configuration extractorIPs: 159.69.237.188:443
                      Source: Malware configuration extractorIPs: 116.124.128.206:8080
                      Source: Malware configuration extractorIPs: 128.199.192.135:8080
                      Source: Malware configuration extractorIPs: 195.154.146.35:443
                      Source: Malware configuration extractorIPs: 185.148.168.15:8080
                      Source: Malware configuration extractorIPs: 195.77.239.39:8080
                      Source: Malware configuration extractorIPs: 207.148.81.119:8080
                      Source: Malware configuration extractorIPs: 85.214.67.203:8080
                      Source: Malware configuration extractorIPs: 190.90.233.66:443
                      Source: Malware configuration extractorIPs: 78.46.73.125:443
                      Source: Malware configuration extractorIPs: 78.47.204.80:443
                      Source: Malware configuration extractorIPs: 37.59.209.141:8080
                      Source: Malware configuration extractorIPs: 54.37.228.122:443
                      Source: Joe Sandbox ViewASN Name: AS-CHOOPAUS AS-CHOOPAUS
                      Source: Joe Sandbox ViewASN Name: DIGITALOCEAN-ASNUS DIGITALOCEAN-ASNUS
                      Source: Joe Sandbox ViewIP Address: 207.148.81.119 207.148.81.119
                      Source: Joe Sandbox ViewIP Address: 104.131.62.48 104.131.62.48
                      Source: global trafficTCP traffic: 192.168.2.5:49759 -> 69.16.218.101:8080
                      Source: unknownNetwork traffic detected: IP country count 12
                      Source: unknownTCP traffic detected without corresponding DNS query: 45.138.98.34
                      Source: unknownTCP traffic detected without corresponding DNS query: 45.138.98.34
                      Source: unknownTCP traffic detected without corresponding DNS query: 45.138.98.34
                      Source: unknownTCP traffic detected without corresponding DNS query: 69.16.218.101
                      Source: unknownTCP traffic detected without corresponding DNS query: 69.16.218.101
                      Source: unknownTCP traffic detected without corresponding DNS query: 69.16.218.101
                      Source: unknownTCP traffic detected without corresponding DNS query: 69.16.218.101
                      Source: unknownTCP traffic detected without corresponding DNS query: 69.16.218.101
                      Source: unknownTCP traffic detected without corresponding DNS query: 69.16.218.101
                      Source: unknownTCP traffic detected without corresponding DNS query: 69.16.218.101
                      Source: unknownTCP traffic detected without corresponding DNS query: 69.16.218.101
                      Source: unknownTCP traffic detected without corresponding DNS query: 69.16.218.101
                      Source: unknownTCP traffic detected without corresponding DNS query: 69.16.218.101
                      Source: unknownTCP traffic detected without corresponding DNS query: 69.16.218.101
                      Source: unknownTCP traffic detected without corresponding DNS query: 69.16.218.101
                      Source: unknownTCP traffic detected without corresponding DNS query: 69.16.218.101
                      Source: svchost.exe, 00000021.00000003.571824588.000002A23118D000.00000004.00000001.sdmpString found in binary or memory: Try it free for 30 days, no strings attached\r\n\r\nLike us on Facebook: http://www.facebook.com/spotify \r\nFollow us on Twitter: http://twitter.com/spotify","ProductTitle":"Spotify - Music and Podcasts","SearchTitles":[{"SearchTitleString":"Spotify","SearchTitleType":"SearchHint"},{"SearchTitleString":"Music","SearchTitleType":"SearchHint"},{"SearchTitleString":"music apps","SearchTitleType":"SearchHint"},{"SearchTitleString":"free music","SearchTitleType":"SearchHint"},{"SearchTitleString":"podcasts","SearchTitleType":"SearchHint"},{"SearchTitleString":"streaming","SearchTitleType":"SearchHint"},{"SearchTitleString":"soundcloud","SearchTitleType":"SearchHint"}],"Language":"en-us","Markets":["US","DZ","AR","AU","AT","BH","BD","BE","BR","BG","CA","CL","CN","CO","CR","HR","CY","CZ","DK","EG","EE","FI","FR","DE","GR","GT","HK","HU","IS","IN","ID","IQ","IE","IL","IT","JP","JO","KZ","KE","KW","LV","LB","LI","LT","LU","MY","MT","MR","MX","MA","NL","NZ","NG","N equals www.facebook.com (Facebook)
                      Source: svchost.exe, 00000021.00000003.571824588.000002A23118D000.00000004.00000001.sdmpString found in binary or memory: Try it free for 30 days, no strings attached\r\n\r\nLike us on Facebook: http://www.facebook.com/spotify \r\nFollow us on Twitter: http://twitter.com/spotify","ProductTitle":"Spotify - Music and Podcasts","SearchTitles":[{"SearchTitleString":"Spotify","SearchTitleType":"SearchHint"},{"SearchTitleString":"Music","SearchTitleType":"SearchHint"},{"SearchTitleString":"music apps","SearchTitleType":"SearchHint"},{"SearchTitleString":"free music","SearchTitleType":"SearchHint"},{"SearchTitleString":"podcasts","SearchTitleType":"SearchHint"},{"SearchTitleString":"streaming","SearchTitleType":"SearchHint"},{"SearchTitleString":"soundcloud","SearchTitleType":"SearchHint"}],"Language":"en-us","Markets":["US","DZ","AR","AU","AT","BH","BD","BE","BR","BG","CA","CL","CN","CO","CR","HR","CY","CZ","DK","EG","EE","FI","FR","DE","GR","GT","HK","HU","IS","IN","ID","IQ","IE","IL","IT","JP","JO","KZ","KE","KW","LV","LB","LI","LT","LU","MY","MT","MR","MX","MA","NL","NZ","NG","N equals www.twitter.com (Twitter)
                      Source: svchost.exe, 00000021.00000003.571841091.000002A23119E000.00000004.00000001.sdmp, svchost.exe, 00000021.00000003.571824588.000002A23118D000.00000004.00000001.sdmpString found in binary or memory: Try it free for 30 days, no strings attached\r\n\r\nLike us on Facebook: http://www.facebook.com/spotify \r\nFollow us on Twitter: http://twitter.com/spotify","ProductTitle":"Spotify - Music and Podcasts","SearchTitles":[{"SearchTitleString":"Spotify","SearchTitleType":"SearchHint"},{"SearchTitleString":"Music","SearchTitleType":"SearchHint"},{"SearchTitleString":"music apps","SearchTitleType":"SearchHint"},{"SearchTitleString":"free music","SearchTitleType":"SearchHint"},{"SearchTitleString":"podcasts","SearchTitleType":"SearchHint"},{"SearchTitleString":"streaming","SearchTitleType":"SearchHint"},{"SearchTitleString":"soundcloud","SearchTitleType":"SearchHint"}],"Language":"en-us","Markets":["US","DZ","AR","AU","AT","BH","BD","BE","BR","BG","CA","CL","CN","CO","CR","HR","CY","CZ","DK","EG","EE","FI","FR","DE","GR","GT","HK","HU","IS","IN","ID","IQ","IE","IL","IT","JP","JO","KZ","KE","KW","LV","LB","LI","LT","LU","MY","MT","MR","MX","MA","NL","NZ","NG","NO","OM","PK","PE","PH","PL","PT","QA","RO","RU","SA","RS","SG","SK","SI","ZA","KR","ES","SE","CH","TW","TH","TT","TN","TR","UA","AE","GB","VN","YE","LY","LK","UY","VE","AF","AX","AL","AS","AO","AI","AQ","AG","AM","AW","BO","BQ","BA","BW","BV","IO","BN","BF","BI","KH","CM","CV","KY","CF","TD","TL","DJ","DM","DO","EC","SV","GQ","ER","ET","FK","FO","FJ","GF","PF","TF","GA","GM","GE","GH","GI","GL","GD","GP","GU","GG","GN","GW","GY","HT","HM","HN","AZ","BS","BB","BY","BZ","BJ","BM","BT","KM","CG","CD","CK","CX","CC","CI","CW","JM","SJ","JE","KI","KG","LA","LS","LR","MO","MK","MG","MW","IM","MH","MQ","MU","YT","FM","MD","MN","MS","MZ","MM","NA","NR","NP","MV","ML","NC","NI","NE","NU","NF","PW","PS","PA","PG","PY","RE","RW","BL","MF","WS","ST","SN","MP","PN","SX","SB","SO","SC","SL","GS","SH","KN","LC","PM","VC","TJ","TZ","TG","TK","TO","TM","TC","TV","UM","UG","VI","VG","WF","EH","ZM","ZW","UZ","VU","SR","SZ","AD","MC","SM","ME","VA","NEUTRAL"]}],"MarketProperties":[{"RelatedProducts":[],"Markets":["US"]}],"ProductASchema":"Product;3","ProductBSchema":"ProductUnifiedApp;3","ProductId":"9NCBCSZSJRSB","Properties":{"PackageFamilyName":"SpotifyAB.SpotifyMusic_zpdnekdrzrea0","PackageIdentityName":"SpotifyAB.SpotifyMusic","PublisherCertificateName":"CN=453637B3-4E12-4CDF-B0D3-2A3C863BF6EF","XboxCrossGenSetId":null,"XboxConsoleGenOptimized":null,"XboxConsoleGenCompatible":null},"AlternateIds":[{"IdType":"LegacyWindowsStoreProductId","Value":"ceac5d3f-8a4f-40e1-9a67-76d9108c7cb5"},{"IdType":"LegacyWindowsPhoneProductId","Value":"caac1b9d-621b-4f96-b143-e10e1397740a"},{"IdType":"XboxTitleId","Value":"1681279293"}],"IngestionSource":"DCE","IsMicrosoftProduct":false,"PreferredSkuId":"0010","ProductType":"Application","ValidationData":{"PassedValidation":false,"RevisionId":"2022-01-07T11:33:20.1626869Z||.||d5cdcec3-04df-404e-ba07-3240047c89f9||1152921505694348672||Null||fullrelease","ValidationResultUri":""},"MerchandizingTags":[],"PartD":"","ProductFamily":"Apps","ProductKind":"Application","DisplaySkuAvailab
                      Source: svchost.exe, 00000021.00000003.571841091.000002A23119E000.00000004.00000001.sdmp, svchost.exe, 00000021.00000003.571824588.000002A23118D000.00000004.00000001.sdmpString found in binary or memory: Try it free for 30 days, no strings attached\r\n\r\nLike us on Facebook: http://www.facebook.com/spotify \r\nFollow us on Twitter: http://twitter.com/spotify","ProductTitle":"Spotify - Music and Podcasts","SearchTitles":[{"SearchTitleString":"Spotify","SearchTitleType":"SearchHint"},{"SearchTitleString":"Music","SearchTitleType":"SearchHint"},{"SearchTitleString":"music apps","SearchTitleType":"SearchHint"},{"SearchTitleString":"free music","SearchTitleType":"SearchHint"},{"SearchTitleString":"podcasts","SearchTitleType":"SearchHint"},{"SearchTitleString":"streaming","SearchTitleType":"SearchHint"},{"SearchTitleString":"soundcloud","SearchTitleType":"SearchHint"}],"Language":"en-us","Markets":["US","DZ","AR","AU","AT","BH","BD","BE","BR","BG","CA","CL","CN","CO","CR","HR","CY","CZ","DK","EG","EE","FI","FR","DE","GR","GT","HK","HU","IS","IN","ID","IQ","IE","IL","IT","JP","JO","KZ","KE","KW","LV","LB","LI","LT","LU","MY","MT","MR","MX","MA","NL","NZ","NG","NO","OM","PK","PE","PH","PL","PT","QA","RO","RU","SA","RS","SG","SK","SI","ZA","KR","ES","SE","CH","TW","TH","TT","TN","TR","UA","AE","GB","VN","YE","LY","LK","UY","VE","AF","AX","AL","AS","AO","AI","AQ","AG","AM","AW","BO","BQ","BA","BW","BV","IO","BN","BF","BI","KH","CM","CV","KY","CF","TD","TL","DJ","DM","DO","EC","SV","GQ","ER","ET","FK","FO","FJ","GF","PF","TF","GA","GM","GE","GH","GI","GL","GD","GP","GU","GG","GN","GW","GY","HT","HM","HN","AZ","BS","BB","BY","BZ","BJ","BM","BT","KM","CG","CD","CK","CX","CC","CI","CW","JM","SJ","JE","KI","KG","LA","LS","LR","MO","MK","MG","MW","IM","MH","MQ","MU","YT","FM","MD","MN","MS","MZ","MM","NA","NR","NP","MV","ML","NC","NI","NE","NU","NF","PW","PS","PA","PG","PY","RE","RW","BL","MF","WS","ST","SN","MP","PN","SX","SB","SO","SC","SL","GS","SH","KN","LC","PM","VC","TJ","TZ","TG","TK","TO","TM","TC","TV","UM","UG","VI","VG","WF","EH","ZM","ZW","UZ","VU","SR","SZ","AD","MC","SM","ME","VA","NEUTRAL"]}],"MarketProperties":[{"RelatedProducts":[],"Markets":["US"]}],"ProductASchema":"Product;3","ProductBSchema":"ProductUnifiedApp;3","ProductId":"9NCBCSZSJRSB","Properties":{"PackageFamilyName":"SpotifyAB.SpotifyMusic_zpdnekdrzrea0","PackageIdentityName":"SpotifyAB.SpotifyMusic","PublisherCertificateName":"CN=453637B3-4E12-4CDF-B0D3-2A3C863BF6EF","XboxCrossGenSetId":null,"XboxConsoleGenOptimized":null,"XboxConsoleGenCompatible":null},"AlternateIds":[{"IdType":"LegacyWindowsStoreProductId","Value":"ceac5d3f-8a4f-40e1-9a67-76d9108c7cb5"},{"IdType":"LegacyWindowsPhoneProductId","Value":"caac1b9d-621b-4f96-b143-e10e1397740a"},{"IdType":"XboxTitleId","Value":"1681279293"}],"IngestionSource":"DCE","IsMicrosoftProduct":false,"PreferredSkuId":"0010","ProductType":"Application","ValidationData":{"PassedValidation":false,"RevisionId":"2022-01-07T11:33:20.1626869Z||.||d5cdcec3-04df-404e-ba07-3240047c89f9||1152921505694348672||Null||fullrelease","ValidationResultUri":""},"MerchandizingTags":[],"PartD":"","ProductFamily":"Apps","ProductKind":"Application","DisplaySkuAvailab
                      Source: rundll32.exe, 0000000A.00000003.287573549.000000000355C000.00000004.00000001.sdmp, rundll32.exe, 0000000A.00000002.762587120.000000000355C000.00000004.00000001.sdmp, svchost.exe, 0000000C.00000002.603169778.0000023DBF886000.00000004.00000001.sdmp, svchost.exe, 00000021.00000002.587498496.000002A231119000.00000004.00000001.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
                      Source: svchost.exe, 0000000C.00000002.603169778.0000023DBF886000.00000004.00000001.sdmp, svchost.exe, 00000021.00000002.587230521.000002A2308E8000.00000004.00000001.sdmpString found in binary or memory: http://crl.ver)
                      Source: rundll32.exe, 0000000A.00000003.287573549.000000000355C000.00000004.00000001.sdmp, rundll32.exe, 0000000A.00000002.762587120.000000000355C000.00000004.00000001.sdmp, 77EC63BDA74BD0D0E0426DC8F80085060.10.drString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
                      Source: rundll32.exe, 0000000A.00000003.287598003.0000000003514000.00000004.00000001.sdmp, rundll32.exe, 0000000A.00000003.284605285.0000000005B24000.00000004.00000001.sdmp, rundll32.exe, 0000000A.00000002.762430065.0000000003514000.00000004.00000001.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab?4bff1f73ae559
                      Source: rundll32.exe, 0000000A.00000003.287573549.000000000355C000.00000004.00000001.sdmp, rundll32.exe, 0000000A.00000002.762587120.000000000355C000.00000004.00000001.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cabe
                      Source: rundll32.exe, 0000000A.00000003.287598003.0000000003514000.00000004.00000001.sdmp, rundll32.exe, 0000000A.00000002.762430065.0000000003514000.00000004.00000001.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/enn
                      Source: svchost.exe, 00000021.00000003.568374017.000002A23116C000.00000004.00000001.sdmp, svchost.exe, 00000021.00000003.567636049.000002A231196000.00000004.00000001.sdmp, svchost.exe, 00000021.00000003.567551923.000002A231602000.00000004.00000001.sdmp, svchost.exe, 00000021.00000003.567736212.000002A231621000.00000004.00000001.sdmp, svchost.exe, 00000021.00000003.567519693.000002A231186000.00000004.00000001.sdmp, svchost.exe, 00000021.00000003.567531380.000002A231196000.00000004.00000001.sdmpString found in binary or memory: http://help.disneyplus.com.
                      Source: svchost.exe, 00000010.00000002.307173784.000001B50CE13000.00000004.00000001.sdmpString found in binary or memory: http://www.bingmapsportal.com
                      Source: svchost.exe, 0000000E.00000002.761004522.000002866503E000.00000004.00000001.sdmpString found in binary or memory: https://%s.dnet.xboxlive.com
                      Source: svchost.exe, 0000000E.00000002.761004522.000002866503E000.00000004.00000001.sdmpString found in binary or memory: https://%s.xboxlive.com
                      Source: rundll32.exe, 0000000A.00000003.287598003.0000000003514000.00000004.00000001.sdmp, rundll32.exe, 0000000A.00000002.762430065.0000000003514000.00000004.00000001.sdmpString found in binary or memory: https://45.138.98.34/
                      Source: rundll32.exe, 0000000A.00000003.287598003.0000000003514000.00000004.00000001.sdmp, rundll32.exe, 0000000A.00000002.762430065.0000000003514000.00000004.00000001.sdmpString found in binary or memory: https://45.138.98.34/1
                      Source: rundll32.exe, 0000000A.00000003.287598003.0000000003514000.00000004.00000001.sdmp, rundll32.exe, 0000000A.00000002.762430065.0000000003514000.00000004.00000001.sdmpString found in binary or memory: https://45.138.98.34:80/qIFNheLVNvvPNSNxkwhjxonGRMtffKSDvVT
                      Source: rundll32.exe, 0000000A.00000003.287598003.0000000003514000.00000004.00000001.sdmp, rundll32.exe, 0000000A.00000002.762430065.0000000003514000.00000004.00000001.sdmpString found in binary or memory: https://69.16.218.101/
                      Source: rundll32.exe, 0000000A.00000003.287598003.0000000003514000.00000004.00000001.sdmp, rundll32.exe, 0000000A.00000002.762430065.0000000003514000.00000004.00000001.sdmpString found in binary or memory: https://69.16.218.101/T
                      Source: rundll32.exe, 0000000A.00000002.762430065.0000000003514000.00000004.00000001.sdmpString found in binary or memory: https://69.16.218.101:8080/NkSVeNqehcFPnIYSRqyWkDgFYPfQVpAkO
                      Source: rundll32.exe, 0000000A.00000003.287598003.0000000003514000.00000004.00000001.sdmp, rundll32.exe, 0000000A.00000002.762430065.0000000003514000.00000004.00000001.sdmpString found in binary or memory: https://69.16.218.101:8080/NkSVeNqehcFPnIYSRqyWkDgFYPfQVpAkON
                      Source: svchost.exe, 0000000E.00000002.761004522.000002866503E000.00000004.00000001.sdmpString found in binary or memory: https://activity.windows.com
                      Source: svchost.exe, 00000010.00000003.306784912.000001B50CE61000.00000004.00000001.sdmpString found in binary or memory: https://appexmapsappupdate.blob.core.windows.net
                      Source: svchost.exe, 0000000E.00000002.761004522.000002866503E000.00000004.00000001.sdmpString found in binary or memory: https://bn2.notify.windows.com/v2/register/xplatform/device
                      Source: svchost.exe, 0000000E.00000002.761004522.000002866503E000.00000004.00000001.sdmpString found in binary or memory: https://co4-df.notify.windows.com/v2/register/xplatform/device
                      Source: svchost.exe, 00000010.00000003.306825607.000001B50CE49000.00000004.00000001.sdmpString found in binary or memory: https://dev.ditu.live.com/REST/v1/Imagery/Copyright/
                      Source: svchost.exe, 00000010.00000003.306784912.000001B50CE61000.00000004.00000001.sdmpString found in binary or memory: https://dev.ditu.live.com/REST/v1/Locations
                      Source: svchost.exe, 00000010.00000002.307226516.000001B50CE3D000.00000004.00000001.sdmpString found in binary or memory: https://dev.ditu.live.com/REST/v1/Routes/
                      Source: svchost.exe, 00000010.00000003.306756140.000001B50CE67000.00000004.00000001.sdmp, svchost.exe, 00000010.00000002.307290539.000001B50CE69000.00000004.00000001.sdmpString found in binary or memory: https://dev.ditu.live.com/REST/v1/Transit/Stops/
                      Source: svchost.exe, 00000010.00000003.306784912.000001B50CE61000.00000004.00000001.sdmpString found in binary or memory: https://dev.ditu.live.com/mapcontrol/logging.ashx
                      Source: svchost.exe, 00000010.00000003.306805584.000001B50CE4D000.00000004.00000001.sdmp, svchost.exe, 00000010.00000002.307252680.000001B50CE4E000.00000004.00000001.sdmpString found in binary or memory: https://dev.ditu.live.com/mapcontrol/mapconfiguration.ashx?name=native&v=
                      Source: svchost.exe, 00000010.00000003.284823827.000001B50CE30000.00000004.00000001.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/JsonFilter/VenueMaps/data/
                      Source: svchost.exe, 00000010.00000002.307226516.000001B50CE3D000.00000004.00000001.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Routes/
                      Source: svchost.exe, 00000010.00000003.306784912.000001B50CE61000.00000004.00000001.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Routes/Driving
                      Source: svchost.exe, 00000010.00000003.306784912.000001B50CE61000.00000004.00000001.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Routes/Transit
                      Source: svchost.exe, 00000010.00000003.306784912.000001B50CE61000.00000004.00000001.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Routes/Walking
                      Source: svchost.exe, 00000010.00000003.284823827.000001B50CE30000.00000004.00000001.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Traffic/Incidents/
                      Source: svchost.exe, 00000010.00000003.306889893.000001B50CE41000.00000004.00000001.sdmp, svchost.exe, 00000010.00000002.307239059.000001B50CE42000.00000004.00000001.sdmp, svchost.exe, 00000010.00000003.306854743.000001B50CE40000.00000004.00000001.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Transit/Schedules/
                      Source: svchost.exe, 00000010.00000003.306889893.000001B50CE41000.00000004.00000001.sdmp, svchost.exe, 00000010.00000002.307239059.000001B50CE42000.00000004.00000001.sdmp, svchost.exe, 00000010.00000003.306854743.000001B50CE40000.00000004.00000001.sdmpString found in binary or memory: https://dev.virtualearth.net/mapcontrol/HumanScaleServices/GetBubbles.ashx?n=
                      Source: svchost.exe, 00000010.00000003.306784912.000001B50CE61000.00000004.00000001.sdmpString found in binary or memory: https://dev.virtualearth.net/mapcontrol/logging.ashx
                      Source: svchost.exe, 00000010.00000003.306854743.000001B50CE40000.00000004.00000001.sdmp, svchost.exe, 00000010.00000002.307245662.000001B50CE4B000.00000004.00000001.sdmp, svchost.exe, 00000010.00000003.306825607.000001B50CE49000.00000004.00000001.sdmpString found in binary or memory: https://dev.virtualearth.net/webservices/v1/LoggingService/LoggingService.svc/Log?
                      Source: svchost.exe, 00000010.00000003.284823827.000001B50CE30000.00000004.00000001.sdmpString found in binary or memory: https://dev.virtualearth.net/webservices/v1/LoggingService/LoggingService.svc/Log?entry=
                      Source: svchost.exe, 00000021.00000003.568374017.000002A23116C000.00000004.00000001.sdmp, svchost.exe, 00000021.00000003.567636049.000002A231196000.00000004.00000001.sdmp, svchost.exe, 00000021.00000003.567551923.000002A231602000.00000004.00000001.sdmp, svchost.exe, 00000021.00000003.567736212.000002A231621000.00000004.00000001.sdmp, svchost.exe, 00000021.00000003.567519693.000002A231186000.00000004.00000001.sdmp, svchost.exe, 00000021.00000003.567531380.000002A231196000.00000004.00000001.sdmpString found in binary or memory: https://disneyplus.com/legal.
                      Source: svchost.exe, 00000010.00000003.306825607.000001B50CE49000.00000004.00000001.sdmpString found in binary or memory: https://dynamic.api.tiles.ditu.live.com/odvs/gd?pv=1&r=
                      Source: svchost.exe, 00000010.00000002.307245662.000001B50CE4B000.00000004.00000001.sdmp, svchost.exe, 00000010.00000003.306825607.000001B50CE49000.00000004.00000001.sdmpString found in binary or memory: https://dynamic.api.tiles.ditu.live.com/odvs/gdi?pv=1&r=
                      Source: svchost.exe, 00000010.00000002.307245662.000001B50CE4B000.00000004.00000001.sdmp, svchost.exe, 00000010.00000003.306825607.000001B50CE49000.00000004.00000001.sdmpString found in binary or memory: https://dynamic.api.tiles.ditu.live.com/odvs/gdv?pv=1&r=
                      Source: svchost.exe, 00000010.00000002.307252680.000001B50CE4E000.00000004.00000001.sdmpString found in binary or memory: https://dynamic.t
                      Source: svchost.exe, 00000010.00000003.306784912.000001B50CE61000.00000004.00000001.sdmpString found in binary or memory: https://dynamic.t0.tiles.ditu.live.com/comp/gen.ashx
                      Source: svchost.exe, 00000010.00000002.307226516.000001B50CE3D000.00000004.00000001.sdmp, svchost.exe, 00000010.00000003.284823827.000001B50CE30000.00000004.00000001.sdmpString found in binary or memory: https://ecn.dev.virtualearth.net/REST/v1/Imagery/Copyright/
                      Source: svchost.exe, 00000010.00000003.284823827.000001B50CE30000.00000004.00000001.sdmpString found in binary or memory: https://ecn.dev.virtualearth.net/mapcontrol/mapconfiguration.ashx?name=native&v=
                      Source: svchost.exe, 00000010.00000002.307226516.000001B50CE3D000.00000004.00000001.sdmpString found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/comp/gen.ashx
                      Source: svchost.exe, 00000010.00000002.307173784.000001B50CE13000.00000004.00000001.sdmp, svchost.exe, 00000010.00000002.307226516.000001B50CE3D000.00000004.00000001.sdmpString found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gd?pv=1&r=
                      Source: svchost.exe, 00000010.00000003.306854743.000001B50CE40000.00000004.00000001.sdmp, svchost.exe, 00000010.00000003.306884229.000001B50CE45000.00000004.00000001.sdmpString found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdi?pv=1&r=
                      Source: svchost.exe, 00000010.00000003.306854743.000001B50CE40000.00000004.00000001.sdmp, svchost.exe, 00000010.00000003.306884229.000001B50CE45000.00000004.00000001.sdmpString found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdv?pv=1&r=
                      Source: svchost.exe, 00000010.00000003.284823827.000001B50CE30000.00000004.00000001.sdmpString found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gri?pv=1&r=
                      Source: svchost.exe, 00000010.00000002.307214272.000001B50CE39000.00000004.00000001.sdmp, svchost.exe, 00000010.00000003.284823827.000001B50CE30000.00000004.00000001.sdmpString found in binary or memory: https://t0.ssl.ak.tiles.virtualearth.net/tiles/gen
                      Source: svchost.exe, 00000010.00000002.307173784.000001B50CE13000.00000004.00000001.sdmpString found in binary or memory: https://t0.tiles.ditu.live.com/tiles/gen
                      Source: svchost.exe, 00000021.00000003.568374017.000002A23116C000.00000004.00000001.sdmp, svchost.exe, 00000021.00000003.567636049.000002A231196000.00000004.00000001.sdmp, svchost.exe, 00000021.00000003.567551923.000002A231602000.00000004.00000001.sdmp, svchost.exe, 00000021.00000003.567736212.000002A231621000.00000004.00000001.sdmp, svchost.exe, 00000021.00000003.567519693.000002A231186000.00000004.00000001.sdmp, svchost.exe, 00000021.00000003.567531380.000002A231196000.00000004.00000001.sdmpString found in binary or memory: https://www.disneyplus.com/legal/privacy-policy
                      Source: svchost.exe, 00000021.00000003.568374017.000002A23116C000.00000004.00000001.sdmp, svchost.exe, 00000021.00000003.567636049.000002A231196000.00000004.00000001.sdmp, svchost.exe, 00000021.00000003.567551923.000002A231602000.00000004.00000001.sdmp, svchost.exe, 00000021.00000003.567736212.000002A231621000.00000004.00000001.sdmp, svchost.exe, 00000021.00000003.567519693.000002A231186000.00000004.00000001.sdmp, svchost.exe, 00000021.00000003.567531380.000002A231196000.00000004.00000001.sdmpString found in binary or memory: https://www.disneyplus.com/legal/your-california-privacy-rights
                      Source: svchost.exe, 00000021.00000003.568771357.000002A2311AD000.00000004.00000001.sdmp, svchost.exe, 00000021.00000003.568746551.000002A2311AD000.00000004.00000001.sdmp, svchost.exe, 00000021.00000003.568828899.000002A231602000.00000004.00000001.sdmp, svchost.exe, 00000021.00000003.568808654.000002A231196000.00000004.00000001.sdmp, svchost.exe, 00000021.00000003.568796159.000002A231185000.00000004.00000001.sdmpString found in binary or memory: https://www.tiktok.com/legal/report/feedback
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_100012D0 recvfrom,
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_1000FF59 GetKeyState,GetKeyState,GetKeyState,GetKeyState,SendMessageA,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_1000FF59 GetKeyState,GetKeyState,GetKeyState,GetKeyState,SendMessageA,

                      E-Banking Fraud:

                      barindex
                      Yara detected EmotetShow sources
                      Source: Yara matchFile source: 10.2.rundll32.exe.5d70000.20.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 9.2.rundll32.exe.23d0000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.rundll32.exe.5790000.10.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.4ed0000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.rundll32.exe.5480000.7.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.rundll32.exe.4e90000.5.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.rundll32.exe.5310000.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.rundll32.exe.5fd0000.22.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.rundll32.exe.53f0000.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.rundll32.exe.51a0000.10.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.rundll32.exe.3360000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.regsvr32.exe.40d0000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.rundll32.exe.5aa0000.17.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.rundll32.exe.51d0000.11.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.rundll32.exe.54f0000.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.rundll32.exe.36e0000.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.rundll32.exe.5020000.8.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.rundll32.exe.5340000.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.rundll32.exe.4ff0000.7.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.rundll32.exe.4850000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.rundll32.exe.5600000.7.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.rundll32.exe.54f0000.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.rundll32.exe.5050000.9.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.rundll32.exe.55d0000.6.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.rundll32.exe.5730000.8.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 9.2.rundll32.exe.2790000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.rundll32.exe.4db0000.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.rundll32.exe.5310000.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.rundll32.exe.5450000.6.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.rundll32.exe.4df0000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.rundll32.exe.57c0000.11.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.rundll32.exe.5c70000.18.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.rundll32.exe.4d60000.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.rundll32.exe.4cc0000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.rundll32.exe.5870000.12.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.rundll32.exe.4fc0000.6.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.rundll32.exe.5a70000.16.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.rundll32.exe.3070000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.rundll32.exe.5520000.5.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.rundll32.exe.59c0000.15.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.rundll32.exe.5730000.8.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.rundll32.exe.6000000.23.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.rundll32.exe.3330000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.5000000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.rundll32.exe.5da0000.21.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.rundll32.exe.5d70000.20.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.regsvr32.exe.26d0000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.rundll32.exe.5990000.14.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.rundll32.exe.5870000.12.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.rundll32.exe.53f0000.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.rundll32.exe.3330000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.rundll32.exe.5790000.10.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.rundll32.exe.4e60000.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.rundll32.exe.58a0000.13.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.rundll32.exe.5a70000.16.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.rundll32.exe.5990000.14.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.rundll32.exe.5450000.6.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.rundll32.exe.5020000.8.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.rundll32.exe.51a0000.10.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 9.2.rundll32.exe.23d0000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.rundll32.exe.4d60000.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.regsvr32.exe.26d0000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.rundll32.exe.5760000.9.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.rundll32.exe.5c70000.18.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.rundll32.exe.3480000.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.rundll32.exe.5ca0000.19.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.rundll32.exe.3480000.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.rundll32.exe.5420000.5.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.rundll32.exe.3070000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.4ed0000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.rundll32.exe.5fd0000.22.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.rundll32.exe.4cc0000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.rundll32.exe.55d0000.6.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.rundll32.exe.4e60000.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.rundll32.exe.4fc0000.6.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000004.00000002.247708165.0000000004ED0000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.764384798.0000000005D70000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.251269260.0000000004DB1000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.764593172.0000000005FD0000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000008.00000002.250801502.0000000004CC0000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.251317536.0000000004E60000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.763160491.00000000054F0000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000008.00000002.251543763.0000000005450000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.251018853.0000000004851000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000009.00000002.254580749.0000000002791000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.763467558.0000000005790000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.764153228.0000000005C70000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.763888533.0000000005AA1000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.763578627.0000000005870000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.763623141.00000000058A1000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.761812038.0000000003361000.00000020.00000010.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.251440561.0000000004FC0000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.250842742.0000000003070000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.763204211.0000000005521000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.247153008.00000000026D0000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000008.00000002.251348106.0000000005341000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.763293110.0000000005601000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.762842466.00000000036E1000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000008.00000002.251435374.00000000053F0000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.251474105.0000000004FF1000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000009.00000002.254179155.00000000023D0000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.764675936.0000000006001000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.251540171.0000000005051000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000008.00000002.251287174.0000000005310000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.251612529.00000000051D1000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.764435934.0000000005DA1000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.763511347.00000000057C1000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000008.00000002.251607526.0000000005481000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.763831341.0000000005A70000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.764277951.0000000005CA1000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.761623893.0000000003330000.00000040.00000010.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.251214045.0000000004D60000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.763416711.0000000005761000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.251508844.0000000005020000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.762037427.0000000003480000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000008.00000002.250952211.0000000004DF1000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.763764045.00000000059C1000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.251355041.0000000004E91000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000008.00000002.251487303.0000000005421000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.763708229.0000000005990000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.251578591.00000000051A0000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.247650152.00000000040D1000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.763252082.00000000055D0000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.247759843.0000000005001000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.763375282.0000000005730000.00000040.00000001.sdmp, type: MEMORY

                      System Summary:

                      barindex
                      Source: M2hsMd9hTq.dllStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE, DLL
                      Source: C:\Windows\SysWOW64\rundll32.exeFile deleted: C:\Windows\SysWOW64\Zxfif\dcctxlgarqbqh.hrz:Zone.IdentifierJump to behavior
                      Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Windows\SysWOW64\Zxfif\Jump to behavior
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_10020011
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_100181CA
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_1001929D
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_1002542D
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_100274AE
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_10026575
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_1001869D
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_1001178A
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_10016860
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_1002596F
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_10022A5C
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_10018A71
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_1001AAB7
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_1001CB16
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_10018E7D
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_10025EB1
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_040E85FF
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_040EEFDD
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_040D3431
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_040DA445
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_040D7442
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_040EA474
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_040EDC71
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_040D1CA1
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_040ECCD9
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_040EE4E5
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_040EAD08
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_040E5515
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_040E8D3D
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_040E654A
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_040E7D5B
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_040F2D53
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_040E3D85
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_040DC5D8
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_040EC5D5
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_040D55FF
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_040E9DF5
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_040D8636
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_040DE640
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_040E2E5D
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_040D7E79
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_040E567B
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_040DDE74
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_040E3EAA
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_040F36AA
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_040E0EBC
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_040F46BD
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_040DC6B8
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_040F3EE9
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_040EBEFD
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_040DEF0C
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_040D670B
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_040D1F38
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_040EFF58
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_040E5779
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_040E4F74
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_040E9774
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_040E0F86
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_040E8FAE
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_040F07AA
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_040D77A3
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_040F17BD
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_040DBFBE
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_040D57B8
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_040DE7DE
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_040E67E6
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_040E27F9
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_040E07F4
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_040F2009
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_040E8806
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_040DB820
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_040EF840
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_040D7078
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_040DA871
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_040D80C0
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_040ED8DB
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_040F00EF
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_040DF0E9
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_040DD14C
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_040E2142
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_040EE955
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_040E017B
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_040E6187
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_040D2194
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_040ED1BC
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_040EE1F8
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_040E7A0F
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_040E9A01
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_040E4244
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_040EB257
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_040E4A66
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_040F0A64
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_040F3263
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_040DBAA9
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_040EA2A5
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_040E0ABA
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_040ECAD5
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_040F2B09
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_040E5333
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_040DF369
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_040E437A
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_040D6B7A
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_040D238C
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_040DFB8E
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_040EFBDE
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_040D4BFC
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_10020011
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_100181CA
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_1001929D
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_1002542D
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_100274AE
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_10026575
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_1001869D
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_1001178A
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_10016860
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_1002596F
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_10022A5C
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_10018A71
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_1001AAB7
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_1001CB16
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_10018E7D
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_10025EB1
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_050185FF
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_0501EFDD
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_0501AD08
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_05015515
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_05018D3D
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_0501654A
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_05022D53
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_05017D5B
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_05013D85
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_0501C5D5
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_0500C5D8
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_05019DF5
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_050055FF
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_05003431
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_05007442
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_0500A445
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_0501DC71
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_0501A474
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_05001CA1
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_0501CCD9
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_0501E4E5
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_0500670B
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_0500EF0C
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_05001F38
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_0501FF58
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_05014F74
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_05019774
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_05015779
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_05010F86
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_050077A3
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_050207AA
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_05018FAE
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_050057B8
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_0500BFBE
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_050217BD
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_0500E7DE
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_050167E6
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_050107F4
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_050127F9
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_05008636
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_0500E640
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_05012E5D
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_0500DE74
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_05007E79
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_0501567B
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_050236AA
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_05013EAA
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_0500C6B8
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_05010EBC
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_050246BD
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_05023EE9
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_0501BEFD
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_05012142
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_0500D14C
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_0501E955
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_0501017B
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_05016187
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_05002194
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_0501D1BC
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_0501E1F8
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_05018806
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_05022009
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_0500B820
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_0501F840
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_0500A871
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_05007078
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_050080C0
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_0501D8DB
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_0500F0E9
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_050200EF
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_05022B09
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_05015333
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_0500F369
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_05006B7A
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_0501437A
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_0500238C
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_0500FB8E
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_0501FBDE
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_05004BFC
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_05019A01
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_05017A0F
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_05014244
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_0501B257
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_05023263
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_05020A64
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_05014A66
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_0501A2A5
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_0500BAA9
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_05010ABA
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_0501CAD5
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_04867A0F
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_04872009
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_04858636
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_0485A445
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_0486B257
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_04864A66
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_0485DE74
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_048717BD
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_0486EFDD
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_0485C5D8
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_048685FF
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_0485670B
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_0486AD08
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_04862142
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_0486654A
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_0486E955
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_0486FF58
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_0486A2A5
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_04851CA1
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_04863EAA
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_0485BAA9
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_048736AA
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_048746BD
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_04860EBC
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_04860ABA
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_0485C6B8
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_048580C0
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_0486CAD5
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_0486D8DB
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_0486CCD9
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_0486E4E5
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_048700EF
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_0485F0E9
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_04873EE9
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_0486BEFD
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_04868806
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_04869A01
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_0485B820
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_04853431
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_04864244
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_0485E640
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_0486F840
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_04857442
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_04862E5D
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_04870A64
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_04873263
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_0486A474
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_0485A871
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_0486DC71
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_04857E79
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_04857078
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_0486567B
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_04860F86
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_04866187
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_04863D85
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_0485238C
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_0485FB8E
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_04852194
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_048577A3
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_04868FAE
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_048707AA
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_0486D1BC
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_0485BFBE
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_048557B8
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_0486C5D5
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_0486FBDE
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_0485E7DE
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_048667E6
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_048607F4
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_04869DF5
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_04854BFC
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_048555FF
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_0486E1F8
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_048627F9
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_0485EF0C
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_04872B09
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_04865515
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_04865333
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_04868D3D
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_04851F38
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_0485D14C
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_04872D53
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_04867D5B
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_0485F369
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_04864F74
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_04869774
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_0486437A
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_0486017B
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_04865779
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_04856B7A
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04E04A66
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04DFDE74
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04E12009
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04DF8636
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04E07A0F
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04DFC5D8
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04E0EFDD
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04E02142
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04E0654A
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04E0FF58
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04DF670B
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04E0AD08
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04E0E4E5
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04E13EE9
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04E100EF
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04E0BEFD
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04DF80C0
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04E0CAD5
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04DFF0E9
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04E0CCD9
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04E0D8DB
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04E0A2A5
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04E03EAA
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04E136AA
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04E00ABA
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04E146BD
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04E00EBC
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04DFC6B8
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04DFBAA9
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04DF1CA1
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04E13263
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04E10A64
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04E0DC71
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04E0A474
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04DFA445
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04E0567B
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04DF7442
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04DFE640
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04E0F840
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04E04244
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04DF7E79
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04DF7078
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04DFA871
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04E0B257
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04E02E5D
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04E09A01
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04E08806
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04DF3431
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04DFB820
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04DFE7DE
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04E067E6
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04E007F4
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04E09DF5
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04E0E1F8
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04E027F9
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04E085FF
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04DF55FF
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04DF4BFC
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04E0C5D5
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04E0FBDE
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04DF2194
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04E107AA
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04E08FAE
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04DFFB8E
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04DF238C
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04E0D1BC
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04E117BD
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04DFBFBE
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04E03D85
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04E00F86
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04DF57B8
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04E06187
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04DF77A3
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04DFD14C
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04E04F74
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04E09774
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04E05779
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04E0437A
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04E0017B
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04DF6B7A
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04E12D53
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04E0E955
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04DFF369
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04E07D5B
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04DFEF0C
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04E05333
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04E08D3D
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04DF1F38
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04E12B09
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04E05515
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: String function: 10017BC1 appears 68 times
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: String function: 1001984C appears 48 times
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: String function: 10017BC1 appears 68 times
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: String function: 1001984C appears 48 times
                      Source: M2hsMd9hTq.dllBinary or memory string: OriginalFilenameUDPTool.EXE: vs M2hsMd9hTq.dll
                      Source: M2hsMd9hTq.dllStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                      Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: sfc.dll
                      Source: C:\Windows\System32\svchost.exeSection loaded: xboxlivetitleid.dll
                      Source: C:\Windows\System32\svchost.exeSection loaded: cdpsgshims.dll
                      Source: M2hsMd9hTq.dllVirustotal: Detection: 25%
                      Source: M2hsMd9hTq.dllReversingLabs: Detection: 34%
                      Source: M2hsMd9hTq.dllStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                      Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                      Source: unknownProcess created: C:\Windows\System32\loaddll32.exe loaddll32.exe "C:\Users\user\Desktop\M2hsMd9hTq.dll"
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\M2hsMd9hTq.dll",#1
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\M2hsMd9hTq.dll
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\M2hsMd9hTq.dll",#1
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\M2hsMd9hTq.dll,DllRegisterServer
                      Source: C:\Windows\SysWOW64\regsvr32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\rundll32.exe "C:\Users\user\Desktop\M2hsMd9hTq.dll",DllRegisterServer
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\rundll32.exe "C:\Users\user\Desktop\M2hsMd9hTq.dll",DllRegisterServer
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Zxfif\dcctxlgarqbqh.hrz",JFJwcZZNDUCWxQ
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\rundll32.exe "C:\Windows\System32\Zxfif\dcctxlgarqbqh.hrz",DllRegisterServer
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe c:\windows\system32\svchost.exe -k localservice -p -s CDPSvc
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe c:\windows\system32\svchost.exe -k networkservice -p -s DoSvc
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k NetworkService -p
                      Source: unknownProcess created: C:\Windows\System32\SgrmBroker.exe C:\Windows\system32\SgrmBroker.exe
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe c:\windows\system32\svchost.exe -k localservicenetworkrestricted -p -s wscsvc
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p
                      Source: C:\Windows\System32\svchost.exeProcess created: C:\Program Files\Windows Defender\MpCmdRun.exe "C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable
                      Source: C:\Program Files\Windows Defender\MpCmdRun.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\M2hsMd9hTq.dll",#1
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\M2hsMd9hTq.dll
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\M2hsMd9hTq.dll,DllRegisterServer
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\M2hsMd9hTq.dll",#1
                      Source: C:\Windows\SysWOW64\regsvr32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\rundll32.exe "C:\Users\user\Desktop\M2hsMd9hTq.dll",DllRegisterServer
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\rundll32.exe "C:\Users\user\Desktop\M2hsMd9hTq.dll",DllRegisterServer
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Zxfif\dcctxlgarqbqh.hrz",JFJwcZZNDUCWxQ
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\rundll32.exe "C:\Windows\System32\Zxfif\dcctxlgarqbqh.hrz",DllRegisterServer
                      Source: C:\Windows\System32\svchost.exeProcess created: C:\Program Files\Windows Defender\MpCmdRun.exe "C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable
                      Source: C:\Windows\SysWOW64\rundll32.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32
                      Source: classification engineClassification label: mal100.troj.evad.winDLL@31/9@0/29
                      Source: C:\Windows\SysWOW64\rundll32.exeFile read: C:\Users\desktop.iniJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\M2hsMd9hTq.dll",#1
                      Source: C:\Windows\System32\conhost.exeMutant created: \BaseNamedObjects\Local\SM0:5500:120:WilError_01
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_100126F9 FindResourceA,LoadResource,LockResource,FreeResource,
                      Source: C:\Windows\SysWOW64\rundll32.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: M2hsMd9hTq.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                      Source: M2hsMd9hTq.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                      Source: M2hsMd9hTq.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                      Source: M2hsMd9hTq.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                      Source: M2hsMd9hTq.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_10019891 push ecx; ret
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_10017C60 push ecx; ret
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_040D1195 push cs; iretd
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_10019891 push ecx; ret
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_10017C60 push ecx; ret
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_05001195 push cs; iretd
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_04851195 push cs; iretd
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04DF1195 push cs; iretd
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_10023A79 LoadLibraryA,GetProcAddress,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,__invoke_watson,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,__decode_pointer,__decode_pointer,__invoke_watson,__decode_pointer,__decode_pointer,__decode_pointer,
                      Source: M2hsMd9hTq.dllStatic PE information: real checksum: 0x66354 should be: 0x7479d
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\M2hsMd9hTq.dll
                      Source: C:\Windows\SysWOW64\rundll32.exePE file moved: C:\Windows\SysWOW64\Zxfif\dcctxlgarqbqh.hrzJump to behavior

                      Hooking and other Techniques for Hiding and Protection:

                      barindex
                      Hides that the sample has been downloaded from the Internet (zone.identifier)Show sources
                      Source: C:\Windows\SysWOW64\rundll32.exeFile opened: C:\Windows\SysWOW64\Zxfif\dcctxlgarqbqh.hrz:Zone.Identifier read attributes | delete
                      Source: C:\Windows\SysWOW64\rundll32.exeFile opened: C:\Windows\SysWOW64\Jfqipigpage\lfkhkwabjlp.gvp:Zone.Identifier read attributes | delete
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_1000D804 IsIconic,GetWindowPlacement,GetWindowRect,
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_10008B90 IsIconic,SendMessageA,GetSystemMetrics,GetSystemMetrics,GetClientRect,DrawIcon,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_1000D804 IsIconic,GetWindowPlacement,GetWindowRect,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_10008B90 IsIconic,SendMessageA,GetSystemMetrics,GetSystemMetrics,GetClientRect,DrawIcon,
                      Source: C:\Windows\SysWOW64\rundll32.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\svchost.exe TID: 2272Thread sleep time: -30000s >= -30000s
                      Source: C:\Windows\System32\svchost.exe TID: 2880Thread sleep time: -30000s >= -30000s
                      Source: C:\Windows\System32\svchost.exe TID: 5916Thread sleep time: -210000s >= -30000s
                      Source: C:\Windows\System32\loaddll32.exeLast function: Thread delayed
                      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                      Source: C:\Windows\System32\svchost.exeFile opened: PhysicalDrive0
                      Source: C:\Windows\SysWOW64\regsvr32.exeAPI coverage: 4.9 %
                      Source: C:\Windows\SysWOW64\rundll32.exeAPI coverage: 4.9 %
                      Source: C:\Windows\SysWOW64\regsvr32.exeAPI call chain: ExitProcess graph end node
                      Source: C:\Windows\SysWOW64\rundll32.exeAPI call chain: ExitProcess graph end node
                      Source: C:\Windows\SysWOW64\rundll32.exeFile Volume queried: C:\ FullSizeInformation
                      Source: rundll32.exe, 0000000A.00000003.287598003.0000000003514000.00000004.00000001.sdmp, rundll32.exe, 0000000A.00000002.762430065.0000000003514000.00000004.00000001.sdmpBinary or memory string: Hyper-V RAWX
                      Source: svchost.exe, 0000000C.00000002.603148618.0000023DBF862000.00000004.00000001.sdmpBinary or memory string: "@Hyper-V RAWGlobal\BFE_Notify_Event_{165f929e-c666-46f4-ace4-b77cc56f1e7e}LMEM
                      Source: rundll32.exe, 0000000A.00000003.287598003.0000000003514000.00000004.00000001.sdmp, rundll32.exe, 0000000A.00000002.762430065.0000000003514000.00000004.00000001.sdmp, svchost.exe, 0000000C.00000002.603130519.0000023DBF84C000.00000004.00000001.sdmp, svchost.exe, 00000021.00000002.587037532.000002A23086B000.00000004.00000001.sdmp, svchost.exe, 00000021.00000003.586277347.000002A23086A000.00000004.00000001.sdmp, svchost.exe, 00000021.00000002.587230521.000002A2308E8000.00000004.00000001.sdmpBinary or memory string: Hyper-V RAW
                      Source: svchost.exe, 0000000C.00000002.602838176.0000023DBA029000.00000004.00000001.sdmpBinary or memory string: Hyper-V RAW@Q
                      Source: svchost.exe, 0000000E.00000002.761004522.000002866503E000.00000004.00000001.sdmp, svchost.exe, 0000000F.00000002.761009269.000001F052629000.00000004.00000001.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_1001C49A _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_10023A79 LoadLibraryA,GetProcAddress,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,__invoke_watson,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,__decode_pointer,__decode_pointer,__invoke_watson,__decode_pointer,__decode_pointer,__decode_pointer,
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_100178B6 GetProcessHeap,GetProcessHeap,HeapAlloc,GetVersionExA,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,__heap_term,__RTC_Initialize,GetCommandLineA,___crtGetEnvironmentStringsA,__ioinit,__mtterm,__setargv,__setenvp,__cinit,__ioterm,__ioterm,__mtterm,__heap_term,___set_flsgetvalue,__calloc_crt,__decode_pointer,__initptd,GetCurrentThreadId,__freeptd,
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_040DF7F7 mov eax, dword ptr fs:[00000030h]
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_0500F7F7 mov eax, dword ptr fs:[00000030h]
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_0485F7F7 mov eax, dword ptr fs:[00000030h]
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04DFF7F7 mov eax, dword ptr fs:[00000030h]
                      Source: C:\Windows\System32\loaddll32.exeProcess queried: DebugPort
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_1001C49A _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_10021743 __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_100167D5 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_1001FC21 SetUnhandledExceptionFilter,__encode_pointer,
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_1001FC43 __decode_pointer,SetUnhandledExceptionFilter,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_1001C49A _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_10021743 __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_100167D5 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_1001FC21 SetUnhandledExceptionFilter,__encode_pointer,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_1001FC43 __decode_pointer,SetUnhandledExceptionFilter,

                      HIPS / PFW / Operating System Protection Evasion:

                      barindex
                      System process connects to network (likely due to code injection or exploit)Show sources
                      Source: C:\Windows\SysWOW64\rundll32.exeNetwork Connect: 69.16.218.101 144
                      Source: C:\Windows\SysWOW64\rundll32.exeNetwork Connect: 45.138.98.34 80
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\M2hsMd9hTq.dll",#1
                      Source: rundll32.exe, 0000000A.00000002.762963759.0000000003AC0000.00000002.00020000.sdmpBinary or memory string: Shell_TrayWnd
                      Source: rundll32.exe, 0000000A.00000002.762963759.0000000003AC0000.00000002.00020000.sdmpBinary or memory string: Progman
                      Source: rundll32.exe, 0000000A.00000002.762963759.0000000003AC0000.00000002.00020000.sdmpBinary or memory string: SProgram Managerl
                      Source: rundll32.exe, 0000000A.00000002.762963759.0000000003AC0000.00000002.00020000.sdmpBinary or memory string: Shell_TrayWnd,
                      Source: rundll32.exe, 0000000A.00000002.762963759.0000000003AC0000.00000002.00020000.sdmpBinary or memory string: Progmanlock
                      Source: C:\Windows\SysWOW64\rundll32.exeQueries volume information: C:\ VolumeInformation
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformation
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm VolumeInformation
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformation
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformation
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformation
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformation
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: GetThreadLocale,GetLocaleInfoA,GetACP,
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: _strcpy_s,__snprintf_s,GetLocaleInfoA,LoadLibraryA,
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: GetLocaleInfoA,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetThreadLocale,GetLocaleInfoA,GetACP,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: _strcpy_s,__snprintf_s,GetLocaleInfoA,LoadLibraryA,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetLocaleInfoA,
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_10022853 cpuid
                      Source: C:\Windows\SysWOW64\rundll32.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_1001F914 GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter,
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_100178B6 GetProcessHeap,GetProcessHeap,HeapAlloc,GetVersionExA,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,__heap_term,__RTC_Initialize,GetCommandLineA,___crtGetEnvironmentStringsA,__ioinit,__mtterm,__setargv,__setenvp,__cinit,__ioterm,__ioterm,__mtterm,__heap_term,___set_flsgetvalue,__calloc_crt,__decode_pointer,__initptd,GetCurrentThreadId,__freeptd,

                      Lowering of HIPS / PFW / Operating System Security Settings:

                      barindex
                      Changes security center settings (notifications, updates, antivirus, firewall)Show sources
                      Source: C:\Windows\System32\svchost.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center cvalJump to behavior
                      Source: C:\Windows\System32\svchost.exeWMI Queries: IWbemServices::ExecNotificationQuery - ROOT\SecurityCenter : SELECT * FROM __InstanceOperationEvent WHERE TargetInstance ISA 'AntiVirusProduct' OR TargetInstance ISA 'FirewallProduct' OR TargetInstance ISA 'AntiSpywareProduct'
                      Source: C:\Windows\System32\svchost.exeWMI Queries: IWbemServices::CreateInstanceEnum - ROOT\SecurityCenter2 : FirewallProduct
                      Source: C:\Windows\System32\svchost.exeWMI Queries: IWbemServices::CreateInstanceEnum - ROOT\SecurityCenter2 : AntiVirusProduct
                      Source: C:\Windows\System32\svchost.exeWMI Queries: IWbemServices::CreateInstanceEnum - ROOT\SecurityCenter2 : AntiSpywareProduct
                      Source: svchost.exe, 00000012.00000002.760931158.0000017D1C83D000.00000004.00000001.sdmpBinary or memory string: &@V%ProgramFiles%\Windows Defender\MsMpeng.exe
                      Source: svchost.exe, 00000012.00000002.760788276.0000017D1C813000.00000004.00000001.sdmp, svchost.exe, 00000012.00000002.761024824.0000017D1C902000.00000004.00000001.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe

                      Stealing of Sensitive Information:

                      barindex
                      Yara detected EmotetShow sources
                      Source: Yara matchFile source: 10.2.rundll32.exe.5d70000.20.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 9.2.rundll32.exe.23d0000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.rundll32.exe.5790000.10.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.4ed0000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.rundll32.exe.5480000.7.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.rundll32.exe.4e90000.5.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.rundll32.exe.5310000.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.rundll32.exe.5fd0000.22.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.rundll32.exe.53f0000.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.rundll32.exe.51a0000.10.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.rundll32.exe.3360000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.regsvr32.exe.40d0000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.rundll32.exe.5aa0000.17.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.rundll32.exe.51d0000.11.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.rundll32.exe.54f0000.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.rundll32.exe.36e0000.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.rundll32.exe.5020000.8.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.rundll32.exe.5340000.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.rundll32.exe.4ff0000.7.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.rundll32.exe.4850000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.rundll32.exe.5600000.7.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.rundll32.exe.54f0000.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.rundll32.exe.5050000.9.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.rundll32.exe.55d0000.6.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.rundll32.exe.5730000.8.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 9.2.rundll32.exe.2790000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.rundll32.exe.4db0000.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.rundll32.exe.5310000.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.rundll32.exe.5450000.6.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.rundll32.exe.4df0000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.rundll32.exe.57c0000.11.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.rundll32.exe.5c70000.18.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.rundll32.exe.4d60000.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.rundll32.exe.4cc0000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.rundll32.exe.5870000.12.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.rundll32.exe.4fc0000.6.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.rundll32.exe.5a70000.16.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.rundll32.exe.3070000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.rundll32.exe.5520000.5.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.rundll32.exe.59c0000.15.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.rundll32.exe.5730000.8.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.rundll32.exe.6000000.23.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.rundll32.exe.3330000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.5000000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.rundll32.exe.5da0000.21.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.rundll32.exe.5d70000.20.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.regsvr32.exe.26d0000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.rundll32.exe.5990000.14.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.rundll32.exe.5870000.12.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.rundll32.exe.53f0000.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.rundll32.exe.3330000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.rundll32.exe.5790000.10.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.rundll32.exe.4e60000.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.rundll32.exe.58a0000.13.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.rundll32.exe.5a70000.16.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.rundll32.exe.5990000.14.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.rundll32.exe.5450000.6.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.rundll32.exe.5020000.8.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.rundll32.exe.51a0000.10.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 9.2.rundll32.exe.23d0000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.rundll32.exe.4d60000.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.regsvr32.exe.26d0000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.rundll32.exe.5760000.9.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.rundll32.exe.5c70000.18.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.rundll32.exe.3480000.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.rundll32.exe.5ca0000.19.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.rundll32.exe.3480000.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.rundll32.exe.5420000.5.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.rundll32.exe.3070000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.4ed0000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.rundll32.exe.5fd0000.22.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.rundll32.exe.4cc0000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.rundll32.exe.55d0000.6.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.rundll32.exe.4e60000.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.rundll32.exe.4fc0000.6.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000004.00000002.247708165.0000000004ED0000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.764384798.0000000005D70000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.251269260.0000000004DB1000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.764593172.0000000005FD0000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000008.00000002.250801502.0000000004CC0000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.251317536.0000000004E60000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.763160491.00000000054F0000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000008.00000002.251543763.0000000005450000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.251018853.0000000004851000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000009.00000002.254580749.0000000002791000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.763467558.0000000005790000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.764153228.0000000005C70000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.763888533.0000000005AA1000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.763578627.0000000005870000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.763623141.00000000058A1000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.761812038.0000000003361000.00000020.00000010.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.251440561.0000000004FC0000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.250842742.0000000003070000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.763204211.0000000005521000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.247153008.00000000026D0000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000008.00000002.251348106.0000000005341000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.763293110.0000000005601000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.762842466.00000000036E1000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000008.00000002.251435374.00000000053F0000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.251474105.0000000004FF1000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000009.00000002.254179155.00000000023D0000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.764675936.0000000006001000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.251540171.0000000005051000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000008.00000002.251287174.0000000005310000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.251612529.00000000051D1000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.764435934.0000000005DA1000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.763511347.00000000057C1000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000008.00000002.251607526.0000000005481000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.763831341.0000000005A70000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.764277951.0000000005CA1000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.761623893.0000000003330000.00000040.00000010.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.251214045.0000000004D60000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.763416711.0000000005761000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.251508844.0000000005020000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.762037427.0000000003480000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000008.00000002.250952211.0000000004DF1000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.763764045.00000000059C1000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.251355041.0000000004E91000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000008.00000002.251487303.0000000005421000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.763708229.0000000005990000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.251578591.00000000051A0000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.247650152.00000000040D1000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.763252082.00000000055D0000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.247759843.0000000005001000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.763375282.0000000005730000.00000040.00000001.sdmp, type: MEMORY
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_100011C0 WSAStartup,_memset,htonl,htons,socket,bind,setsockopt,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_100011C0 WSAStartup,_memset,htonl,htons,socket,bind,setsockopt,

                      Mitre Att&ck Matrix

                      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                      Valid AccountsWindows Management Instrumentation1DLL Side-Loading1DLL Side-Loading1Disable or Modify Tools1Input Capture1System Time Discovery1Remote ServicesArchive Collected Data1Exfiltration Over Other Network MediumIngress Tool Transfer1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                      Default AccountsNative API1Boot or Logon Initialization ScriptsProcess Injection112Deobfuscate/Decode Files or Information1LSASS MemoryFile and Directory Discovery1Remote Desktop ProtocolInput Capture1Exfiltration Over BluetoothEncrypted Channel1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                      Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Obfuscated Files or Information2Security Account ManagerSystem Information Discovery45SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationNon-Standard Port1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                      Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)DLL Side-Loading1NTDSQuery Registry1Distributed Component Object ModelInput CaptureScheduled TransferApplication Layer Protocol1SIM Card SwapCarrier Billing Fraud
                      Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptFile Deletion1LSA SecretsSecurity Software Discovery61SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                      Replication Through Removable MediaLaunchdRc.commonRc.commonMasquerading2Cached Domain CredentialsVirtualization/Sandbox Evasion3VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                      External Remote ServicesScheduled TaskStartup ItemsStartup ItemsVirtualization/Sandbox Evasion3DCSyncProcess Discovery1Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                      Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobProcess Injection112Proc FilesystemApplication Window Discovery1Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
                      Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)Hidden Files and Directories1/etc/passwd and /etc/shadowRemote System Discovery1Software Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
                      Supply Chain CompromiseAppleScriptAt (Windows)At (Windows)Regsvr321Network SniffingProcess DiscoveryTaint Shared ContentLocal Data StagingExfiltration Over Unencrypted/Obfuscated Non-C2 ProtocolFile Transfer ProtocolsData Encrypted for Impact
                      Compromise Software Dependencies and Development ToolsWindows Command ShellCronCronRundll321Input CapturePermission Groups DiscoveryReplication Through Removable MediaRemote Data StagingExfiltration Over Physical MediumMail ProtocolsService Stop

                      Behavior Graph

                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet
                      behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 553120 Sample: M2hsMd9hTq Startdate: 14/01/2022 Architecture: WINDOWS Score: 100 42 210.57.209.142 UNAIR-AS-IDUniversitasAirlanggaID Indonesia 2->42 44 85.214.67.203 STRATOSTRATOAGDE Germany 2->44 46 23 other IPs or domains 2->46 56 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->56 58 Found malware configuration 2->58 60 Antivirus detection for URL or domain 2->60 62 5 other signatures 2->62 9 loaddll32.exe 1 2->9         started        11 svchost.exe 2->11         started        14 svchost.exe 9 1 2->14         started        17 9 other processes 2->17 signatures3 process4 dnsIp5 19 rundll32.exe 2 9->19         started        22 cmd.exe 1 9->22         started        24 regsvr32.exe 9->24         started        70 Changes security center settings (notifications, updates, antivirus, firewall) 11->70 26 MpCmdRun.exe 1 11->26         started        54 127.0.0.1 unknown unknown 14->54 signatures6 process7 signatures8 64 Hides that the sample has been downloaded from the Internet (zone.identifier) 19->64 28 rundll32.exe 19->28         started        30 rundll32.exe 22->30         started        32 rundll32.exe 24->32         started        34 conhost.exe 26->34         started        process9 process10 36 rundll32.exe 28->36         started        40 rundll32.exe 2 30->40         started        dnsIp11 48 45.138.98.34, 49758, 80 M247GB Germany 36->48 50 69.16.218.101, 49759, 8080 LIQUIDWEBUS United States 36->50 66 System process connects to network (likely due to code injection or exploit) 36->66 52 192.168.2.1 unknown unknown 40->52 68 Hides that the sample has been downloaded from the Internet (zone.identifier) 40->68 signatures12

                      Screenshots

                      Thumbnails

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.

                      windows-stand

                      Antivirus, Machine Learning and Genetic Malware Detection

                      Initial Sample

                      SourceDetectionScannerLabelLink
                      M2hsMd9hTq.dll25%VirustotalBrowse
                      M2hsMd9hTq.dll35%ReversingLabsWin32.Trojan.Emotet
                      M2hsMd9hTq.dll100%Joe Sandbox ML

                      Dropped Files

                      No Antivirus matches

                      Unpacked PE Files

                      SourceDetectionScannerLabelLinkDownload
                      9.2.rundll32.exe.23d0000.0.unpack100%AviraHEUR/AGEN.1145233Download File
                      4.2.rundll32.exe.4ed0000.0.unpack100%AviraHEUR/AGEN.1145233Download File
                      10.2.rundll32.exe.3360000.1.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      8.2.rundll32.exe.53f0000.4.unpack100%AviraHEUR/AGEN.1145233Download File
                      5.2.rundll32.exe.4e90000.5.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      10.2.rundll32.exe.36e0000.3.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      5.2.rundll32.exe.51d0000.11.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      5.2.rundll32.exe.51a0000.10.unpack100%AviraHEUR/AGEN.1145233Download File
                      10.2.rundll32.exe.5fd0000.22.unpack100%AviraHEUR/AGEN.1145233Download File
                      8.2.rundll32.exe.5480000.7.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      10.2.rundll32.exe.5aa0000.17.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      8.2.rundll32.exe.5340000.3.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      3.2.regsvr32.exe.40d0000.1.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      10.2.rundll32.exe.54f0000.4.unpack100%AviraHEUR/AGEN.1145233Download File
                      5.2.rundll32.exe.4ff0000.7.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      10.2.rundll32.exe.5600000.7.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      5.2.rundll32.exe.4850000.1.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      5.2.rundll32.exe.5050000.9.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      9.2.rundll32.exe.2790000.1.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      8.2.rundll32.exe.5450000.6.unpack100%AviraHEUR/AGEN.1145233Download File
                      5.2.rundll32.exe.4db0000.3.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      5.2.rundll32.exe.4d60000.2.unpack100%AviraHEUR/AGEN.1145233Download File
                      8.2.rundll32.exe.5310000.2.unpack100%AviraHEUR/AGEN.1145233Download File
                      10.2.rundll32.exe.57c0000.11.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      8.2.rundll32.exe.4df0000.1.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      10.2.rundll32.exe.5c70000.18.unpack100%AviraHEUR/AGEN.1145233Download File
                      5.2.rundll32.exe.4fc0000.6.unpack100%AviraHEUR/AGEN.1145233Download File
                      10.2.rundll32.exe.5a70000.16.unpack100%AviraHEUR/AGEN.1145233Download File
                      10.2.rundll32.exe.5520000.5.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      10.2.rundll32.exe.5730000.8.unpack100%AviraHEUR/AGEN.1145233Download File
                      10.2.rundll32.exe.59c0000.15.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      4.2.rundll32.exe.5000000.1.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      10.2.rundll32.exe.6000000.23.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      3.2.regsvr32.exe.26d0000.0.unpack100%AviraHEUR/AGEN.1145233Download File
                      10.2.rundll32.exe.5da0000.21.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      10.2.rundll32.exe.5990000.14.unpack100%AviraHEUR/AGEN.1145233Download File
                      10.2.rundll32.exe.5d70000.20.unpack100%AviraHEUR/AGEN.1145233Download File
                      10.2.rundll32.exe.5870000.12.unpack100%AviraHEUR/AGEN.1145233Download File
                      10.2.rundll32.exe.5790000.10.unpack100%AviraHEUR/AGEN.1145233Download File
                      10.2.rundll32.exe.3330000.0.unpack100%AviraHEUR/AGEN.1145233Download File
                      10.2.rundll32.exe.58a0000.13.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      5.2.rundll32.exe.5020000.8.unpack100%AviraHEUR/AGEN.1145233Download File
                      5.2.rundll32.exe.3070000.0.unpack100%AviraHEUR/AGEN.1145233Download File
                      10.2.rundll32.exe.5760000.9.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      10.2.rundll32.exe.3480000.2.unpack100%AviraHEUR/AGEN.1145233Download File
                      10.2.rundll32.exe.5ca0000.19.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      8.2.rundll32.exe.5420000.5.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      10.2.rundll32.exe.55d0000.6.unpack100%AviraHEUR/AGEN.1145233Download File
                      8.2.rundll32.exe.4cc0000.0.unpack100%AviraHEUR/AGEN.1145233Download File
                      5.2.rundll32.exe.4e60000.4.unpack100%AviraHEUR/AGEN.1145233Download File

                      Domains

                      No Antivirus matches

                      URLs

                      SourceDetectionScannerLabelLink
                      https://www.disneyplus.com/legal/your-california-privacy-rights0%URL Reputationsafe
                      https://45.138.98.34/1100%Avira URL Cloudmalware
                      https://45.138.98.34/100%Avira URL Cloudmalware
                      http://crl.ver)0%Avira URL Cloudsafe
                      https://69.16.218.101:8080/NkSVeNqehcFPnIYSRqyWkDgFYPfQVpAkO0%Avira URL Cloudsafe
                      https://www.tiktok.com/legal/report/feedback0%URL Reputationsafe
                      https://69.16.218.101:8080/NkSVeNqehcFPnIYSRqyWkDgFYPfQVpAkON0%Avira URL Cloudsafe
                      https://%s.xboxlive.com0%URL Reputationsafe
                      https://69.16.218.101/T0%Avira URL Cloudsafe
                      https://www.disneyplus.com/legal/privacy-policy0%URL Reputationsafe
                      https://dynamic.t0%URL Reputationsafe
                      https://45.138.98.34:80/qIFNheLVNvvPNSNxkwhjxonGRMtffKSDvVT100%Avira URL Cloudmalware
                      https://disneyplus.com/legal.0%URL Reputationsafe
                      http://help.disneyplus.com.0%URL Reputationsafe
                      https://69.16.218.101/0%Avira URL Cloudsafe
                      https://%s.dnet.xboxlive.com0%URL Reputationsafe

                      Domains and IPs

                      Contacted Domains

                      No contacted domains info

                      URLs from Memory and Binaries

                      NameSourceMaliciousAntivirus DetectionReputation
                      https://dynamic.t0.tiles.ditu.live.com/comp/gen.ashxsvchost.exe, 00000010.00000003.306784912.000001B50CE61000.00000004.00000001.sdmpfalse
                        high
                        https://www.disneyplus.com/legal/your-california-privacy-rightssvchost.exe, 00000021.00000003.568374017.000002A23116C000.00000004.00000001.sdmp, svchost.exe, 00000021.00000003.567636049.000002A231196000.00000004.00000001.sdmp, svchost.exe, 00000021.00000003.567551923.000002A231602000.00000004.00000001.sdmp, svchost.exe, 00000021.00000003.567736212.000002A231621000.00000004.00000001.sdmp, svchost.exe, 00000021.00000003.567519693.000002A231186000.00000004.00000001.sdmp, svchost.exe, 00000021.00000003.567531380.000002A231196000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        https://45.138.98.34/1rundll32.exe, 0000000A.00000003.287598003.0000000003514000.00000004.00000001.sdmp, rundll32.exe, 0000000A.00000002.762430065.0000000003514000.00000004.00000001.sdmptrue
                        • Avira URL Cloud: malware
                        unknown
                        https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdv?pv=1&r=svchost.exe, 00000010.00000003.306854743.000001B50CE40000.00000004.00000001.sdmp, svchost.exe, 00000010.00000003.306884229.000001B50CE45000.00000004.00000001.sdmpfalse
                          high
                          https://dev.ditu.live.com/REST/v1/Routes/svchost.exe, 00000010.00000002.307226516.000001B50CE3D000.00000004.00000001.sdmpfalse
                            high
                            https://dev.virtualearth.net/REST/v1/Routes/Drivingsvchost.exe, 00000010.00000003.306784912.000001B50CE61000.00000004.00000001.sdmpfalse
                              high
                              https://t0.ssl.ak.dynamic.tiles.virtualearth.net/comp/gen.ashxsvchost.exe, 00000010.00000002.307226516.000001B50CE3D000.00000004.00000001.sdmpfalse
                                high
                                https://dev.ditu.live.com/REST/v1/Transit/Stops/svchost.exe, 00000010.00000003.306756140.000001B50CE67000.00000004.00000001.sdmp, svchost.exe, 00000010.00000002.307290539.000001B50CE69000.00000004.00000001.sdmpfalse
                                  high
                                  https://t0.tiles.ditu.live.com/tiles/gensvchost.exe, 00000010.00000002.307173784.000001B50CE13000.00000004.00000001.sdmpfalse
                                    high
                                    https://dev.virtualearth.net/REST/v1/Routes/svchost.exe, 00000010.00000002.307226516.000001B50CE3D000.00000004.00000001.sdmpfalse
                                      high
                                      https://dev.virtualearth.net/REST/v1/Traffic/Incidents/svchost.exe, 00000010.00000003.284823827.000001B50CE30000.00000004.00000001.sdmpfalse
                                        high
                                        https://45.138.98.34/rundll32.exe, 0000000A.00000003.287598003.0000000003514000.00000004.00000001.sdmp, rundll32.exe, 0000000A.00000002.762430065.0000000003514000.00000004.00000001.sdmptrue
                                        • Avira URL Cloud: malware
                                        unknown
                                        https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdi?pv=1&r=svchost.exe, 00000010.00000003.306854743.000001B50CE40000.00000004.00000001.sdmp, svchost.exe, 00000010.00000003.306884229.000001B50CE45000.00000004.00000001.sdmpfalse
                                          high
                                          https://dev.virtualearth.net/REST/v1/Routes/Walkingsvchost.exe, 00000010.00000003.306784912.000001B50CE61000.00000004.00000001.sdmpfalse
                                            high
                                            http://crl.ver)svchost.exe, 0000000C.00000002.603169778.0000023DBF886000.00000004.00000001.sdmp, svchost.exe, 00000021.00000002.587230521.000002A2308E8000.00000004.00000001.sdmpfalse
                                            • Avira URL Cloud: safe
                                            low
                                            https://dev.virtualearth.net/webservices/v1/LoggingService/LoggingService.svc/Log?svchost.exe, 00000010.00000003.306854743.000001B50CE40000.00000004.00000001.sdmp, svchost.exe, 00000010.00000002.307245662.000001B50CE4B000.00000004.00000001.sdmp, svchost.exe, 00000010.00000003.306825607.000001B50CE49000.00000004.00000001.sdmpfalse
                                              high
                                              https://69.16.218.101:8080/NkSVeNqehcFPnIYSRqyWkDgFYPfQVpAkOrundll32.exe, 0000000A.00000002.762430065.0000000003514000.00000004.00000001.sdmpfalse
                                              • Avira URL Cloud: safe
                                              unknown
                                              https://www.tiktok.com/legal/report/feedbacksvchost.exe, 00000021.00000003.568771357.000002A2311AD000.00000004.00000001.sdmp, svchost.exe, 00000021.00000003.568746551.000002A2311AD000.00000004.00000001.sdmp, svchost.exe, 00000021.00000003.568828899.000002A231602000.00000004.00000001.sdmp, svchost.exe, 00000021.00000003.568808654.000002A231196000.00000004.00000001.sdmp, svchost.exe, 00000021.00000003.568796159.000002A231185000.00000004.00000001.sdmpfalse
                                              • URL Reputation: safe
                                              unknown
                                              https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gd?pv=1&r=svchost.exe, 00000010.00000002.307173784.000001B50CE13000.00000004.00000001.sdmp, svchost.exe, 00000010.00000002.307226516.000001B50CE3D000.00000004.00000001.sdmpfalse
                                                high
                                                https://dev.virtualearth.net/mapcontrol/HumanScaleServices/GetBubbles.ashx?n=svchost.exe, 00000010.00000003.306889893.000001B50CE41000.00000004.00000001.sdmp, svchost.exe, 00000010.00000002.307239059.000001B50CE42000.00000004.00000001.sdmp, svchost.exe, 00000010.00000003.306854743.000001B50CE40000.00000004.00000001.sdmpfalse
                                                  high
                                                  https://69.16.218.101:8080/NkSVeNqehcFPnIYSRqyWkDgFYPfQVpAkONrundll32.exe, 0000000A.00000003.287598003.0000000003514000.00000004.00000001.sdmp, rundll32.exe, 0000000A.00000002.762430065.0000000003514000.00000004.00000001.sdmpfalse
                                                  • Avira URL Cloud: safe
                                                  unknown
                                                  https://%s.xboxlive.comsvchost.exe, 0000000E.00000002.761004522.000002866503E000.00000004.00000001.sdmpfalse
                                                  • URL Reputation: safe
                                                  low
                                                  https://69.16.218.101/Trundll32.exe, 0000000A.00000003.287598003.0000000003514000.00000004.00000001.sdmp, rundll32.exe, 0000000A.00000002.762430065.0000000003514000.00000004.00000001.sdmpfalse
                                                  • Avira URL Cloud: safe
                                                  unknown
                                                  https://dev.ditu.live.com/mapcontrol/mapconfiguration.ashx?name=native&v=svchost.exe, 00000010.00000003.306805584.000001B50CE4D000.00000004.00000001.sdmp, svchost.exe, 00000010.00000002.307252680.000001B50CE4E000.00000004.00000001.sdmpfalse
                                                    high
                                                    https://ecn.dev.virtualearth.net/mapcontrol/mapconfiguration.ashx?name=native&v=svchost.exe, 00000010.00000003.284823827.000001B50CE30000.00000004.00000001.sdmpfalse
                                                      high
                                                      https://dev.virtualearth.net/mapcontrol/logging.ashxsvchost.exe, 00000010.00000003.306784912.000001B50CE61000.00000004.00000001.sdmpfalse
                                                        high
                                                        https://dev.ditu.live.com/mapcontrol/logging.ashxsvchost.exe, 00000010.00000003.306784912.000001B50CE61000.00000004.00000001.sdmpfalse
                                                          high
                                                          https://dev.ditu.live.com/REST/v1/Imagery/Copyright/svchost.exe, 00000010.00000003.306825607.000001B50CE49000.00000004.00000001.sdmpfalse
                                                            high
                                                            https://dev.virtualearth.net/webservices/v1/LoggingService/LoggingService.svc/Log?entry=svchost.exe, 00000010.00000003.284823827.000001B50CE30000.00000004.00000001.sdmpfalse
                                                              high
                                                              https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gri?pv=1&r=svchost.exe, 00000010.00000003.284823827.000001B50CE30000.00000004.00000001.sdmpfalse
                                                                high
                                                                https://dynamic.api.tiles.ditu.live.com/odvs/gdi?pv=1&r=svchost.exe, 00000010.00000002.307245662.000001B50CE4B000.00000004.00000001.sdmp, svchost.exe, 00000010.00000003.306825607.000001B50CE49000.00000004.00000001.sdmpfalse
                                                                  high
                                                                  https://www.disneyplus.com/legal/privacy-policysvchost.exe, 00000021.00000003.568374017.000002A23116C000.00000004.00000001.sdmp, svchost.exe, 00000021.00000003.567636049.000002A231196000.00000004.00000001.sdmp, svchost.exe, 00000021.00000003.567551923.000002A231602000.00000004.00000001.sdmp, svchost.exe, 00000021.00000003.567736212.000002A231621000.00000004.00000001.sdmp, svchost.exe, 00000021.00000003.567519693.000002A231186000.00000004.00000001.sdmp, svchost.exe, 00000021.00000003.567531380.000002A231196000.00000004.00000001.sdmpfalse
                                                                  • URL Reputation: safe
                                                                  unknown
                                                                  https://dev.virtualearth.net/REST/v1/JsonFilter/VenueMaps/data/svchost.exe, 00000010.00000003.284823827.000001B50CE30000.00000004.00000001.sdmpfalse
                                                                    high
                                                                    https://dev.virtualearth.net/REST/v1/Transit/Schedules/svchost.exe, 00000010.00000003.306889893.000001B50CE41000.00000004.00000001.sdmp, svchost.exe, 00000010.00000002.307239059.000001B50CE42000.00000004.00000001.sdmp, svchost.exe, 00000010.00000003.306854743.000001B50CE40000.00000004.00000001.sdmpfalse
                                                                      high
                                                                      https://dynamic.tsvchost.exe, 00000010.00000002.307252680.000001B50CE4E000.00000004.00000001.sdmpfalse
                                                                      • URL Reputation: safe
                                                                      unknown
                                                                      https://dev.virtualearth.net/REST/v1/Routes/Transitsvchost.exe, 00000010.00000003.306784912.000001B50CE61000.00000004.00000001.sdmpfalse
                                                                        high
                                                                        https://45.138.98.34:80/qIFNheLVNvvPNSNxkwhjxonGRMtffKSDvVTrundll32.exe, 0000000A.00000003.287598003.0000000003514000.00000004.00000001.sdmp, rundll32.exe, 0000000A.00000002.762430065.0000000003514000.00000004.00000001.sdmptrue
                                                                        • Avira URL Cloud: malware
                                                                        unknown
                                                                        https://disneyplus.com/legal.svchost.exe, 00000021.00000003.568374017.000002A23116C000.00000004.00000001.sdmp, svchost.exe, 00000021.00000003.567636049.000002A231196000.00000004.00000001.sdmp, svchost.exe, 00000021.00000003.567551923.000002A231602000.00000004.00000001.sdmp, svchost.exe, 00000021.00000003.567736212.000002A231621000.00000004.00000001.sdmp, svchost.exe, 00000021.00000003.567519693.000002A231186000.00000004.00000001.sdmp, svchost.exe, 00000021.00000003.567531380.000002A231196000.00000004.00000001.sdmpfalse
                                                                        • URL Reputation: safe
                                                                        unknown
                                                                        https://t0.ssl.ak.tiles.virtualearth.net/tiles/gensvchost.exe, 00000010.00000002.307214272.000001B50CE39000.00000004.00000001.sdmp, svchost.exe, 00000010.00000003.284823827.000001B50CE30000.00000004.00000001.sdmpfalse
                                                                          high
                                                                          https://dynamic.api.tiles.ditu.live.com/odvs/gdv?pv=1&r=svchost.exe, 00000010.00000002.307245662.000001B50CE4B000.00000004.00000001.sdmp, svchost.exe, 00000010.00000003.306825607.000001B50CE49000.00000004.00000001.sdmpfalse
                                                                            high
                                                                            https://activity.windows.comsvchost.exe, 0000000E.00000002.761004522.000002866503E000.00000004.00000001.sdmpfalse
                                                                              high
                                                                              http://www.bingmapsportal.comsvchost.exe, 00000010.00000002.307173784.000001B50CE13000.00000004.00000001.sdmpfalse
                                                                                high
                                                                                https://dev.ditu.live.com/REST/v1/Locationssvchost.exe, 00000010.00000003.306784912.000001B50CE61000.00000004.00000001.sdmpfalse
                                                                                  high
                                                                                  http://help.disneyplus.com.svchost.exe, 00000021.00000003.568374017.000002A23116C000.00000004.00000001.sdmp, svchost.exe, 00000021.00000003.567636049.000002A231196000.00000004.00000001.sdmp, svchost.exe, 00000021.00000003.567551923.000002A231602000.00000004.00000001.sdmp, svchost.exe, 00000021.00000003.567736212.000002A231621000.00000004.00000001.sdmp, svchost.exe, 00000021.00000003.567519693.000002A231186000.00000004.00000001.sdmp, svchost.exe, 00000021.00000003.567531380.000002A231196000.00000004.00000001.sdmpfalse
                                                                                  • URL Reputation: safe
                                                                                  unknown
                                                                                  https://69.16.218.101/rundll32.exe, 0000000A.00000003.287598003.0000000003514000.00000004.00000001.sdmp, rundll32.exe, 0000000A.00000002.762430065.0000000003514000.00000004.00000001.sdmpfalse
                                                                                  • Avira URL Cloud: safe
                                                                                  unknown
                                                                                  https://ecn.dev.virtualearth.net/REST/v1/Imagery/Copyright/svchost.exe, 00000010.00000002.307226516.000001B50CE3D000.00000004.00000001.sdmp, svchost.exe, 00000010.00000003.284823827.000001B50CE30000.00000004.00000001.sdmpfalse
                                                                                    high
                                                                                    https://%s.dnet.xboxlive.comsvchost.exe, 0000000E.00000002.761004522.000002866503E000.00000004.00000001.sdmpfalse
                                                                                    • URL Reputation: safe
                                                                                    low
                                                                                    https://dynamic.api.tiles.ditu.live.com/odvs/gd?pv=1&r=svchost.exe, 00000010.00000003.306825607.000001B50CE49000.00000004.00000001.sdmpfalse
                                                                                      high

                                                                                      Contacted IPs

                                                                                      • No. of IPs < 25%
                                                                                      • 25% < No. of IPs < 50%
                                                                                      • 50% < No. of IPs < 75%
                                                                                      • 75% < No. of IPs

                                                                                      Public

                                                                                      IPDomainCountryFlagASNASN NameMalicious
                                                                                      207.148.81.119
                                                                                      unknownUnited States
                                                                                      20473AS-CHOOPAUStrue
                                                                                      104.131.62.48
                                                                                      unknownUnited States
                                                                                      14061DIGITALOCEAN-ASNUStrue
                                                                                      85.214.67.203
                                                                                      unknownGermany
                                                                                      6724STRATOSTRATOAGDEtrue
                                                                                      191.252.103.16
                                                                                      unknownBrazil
                                                                                      27715LocawebServicosdeInternetSABRtrue
                                                                                      168.197.250.14
                                                                                      unknownArgentina
                                                                                      264776OmarAnselmoRipollTDCNETARtrue
                                                                                      66.42.57.149
                                                                                      unknownUnited States
                                                                                      20473AS-CHOOPAUStrue
                                                                                      185.148.168.15
                                                                                      unknownGermany
                                                                                      44780EVERSCALE-ASDEtrue
                                                                                      51.210.242.234
                                                                                      unknownFrance
                                                                                      16276OVHFRtrue
                                                                                      217.182.143.207
                                                                                      unknownFrance
                                                                                      16276OVHFRtrue
                                                                                      69.16.218.101
                                                                                      unknownUnited States
                                                                                      32244LIQUIDWEBUStrue
                                                                                      159.69.237.188
                                                                                      unknownGermany
                                                                                      24940HETZNER-ASDEtrue
                                                                                      45.138.98.34
                                                                                      unknownGermany
                                                                                      9009M247GBtrue
                                                                                      116.124.128.206
                                                                                      unknownKorea Republic of
                                                                                      9318SKB-ASSKBroadbandCoLtdKRtrue
                                                                                      78.46.73.125
                                                                                      unknownGermany
                                                                                      24940HETZNER-ASDEtrue
                                                                                      37.59.209.141
                                                                                      unknownFrance
                                                                                      16276OVHFRtrue
                                                                                      210.57.209.142
                                                                                      unknownIndonesia
                                                                                      38142UNAIR-AS-IDUniversitasAirlanggaIDtrue
                                                                                      185.148.168.220
                                                                                      unknownGermany
                                                                                      44780EVERSCALE-ASDEtrue
                                                                                      54.37.228.122
                                                                                      unknownFrance
                                                                                      16276OVHFRtrue
                                                                                      190.90.233.66
                                                                                      unknownColombia
                                                                                      18678INTERNEXASAESPCOtrue
                                                                                      142.4.219.173
                                                                                      unknownCanada
                                                                                      16276OVHFRtrue
                                                                                      54.38.242.185
                                                                                      unknownFrance
                                                                                      16276OVHFRtrue
                                                                                      195.154.146.35
                                                                                      unknownFrance
                                                                                      12876OnlineSASFRtrue
                                                                                      195.77.239.39
                                                                                      unknownSpain
                                                                                      60493FICOSA-ASEStrue
                                                                                      78.47.204.80
                                                                                      unknownGermany
                                                                                      24940HETZNER-ASDEtrue
                                                                                      37.44.244.177
                                                                                      unknownGermany
                                                                                      47583AS-HOSTINGERLTtrue
                                                                                      62.171.178.147
                                                                                      unknownUnited Kingdom
                                                                                      51167CONTABODEtrue
                                                                                      128.199.192.135
                                                                                      unknownUnited Kingdom
                                                                                      14061DIGITALOCEAN-ASNUStrue

                                                                                      Private

                                                                                      IP
                                                                                      192.168.2.1
                                                                                      127.0.0.1

                                                                                      General Information

                                                                                      Joe Sandbox Version:34.0.0 Boulder Opal
                                                                                      Analysis ID:553120
                                                                                      Start date:14.01.2022
                                                                                      Start time:10:50:42
                                                                                      Joe Sandbox Product:CloudBasic
                                                                                      Overall analysis duration:0h 13m 16s
                                                                                      Hypervisor based Inspection enabled:false
                                                                                      Report type:light
                                                                                      Sample file name:M2hsMd9hTq (renamed file extension from none to dll)
                                                                                      Cookbook file name:default.jbs
                                                                                      Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                                                                      Number of analysed new started processes analysed:36
                                                                                      Number of new started drivers analysed:0
                                                                                      Number of existing processes analysed:0
                                                                                      Number of existing drivers analysed:0
                                                                                      Number of injected processes analysed:0
                                                                                      Technologies:
                                                                                      • HCA enabled
                                                                                      • EGA enabled
                                                                                      • HDC enabled
                                                                                      • AMSI enabled
                                                                                      Analysis Mode:default
                                                                                      Analysis stop reason:Timeout
                                                                                      Detection:MAL
                                                                                      Classification:mal100.troj.evad.winDLL@31/9@0/29
                                                                                      EGA Information:
                                                                                      • Successful, ratio: 80%
                                                                                      HDC Information:
                                                                                      • Successful, ratio: 32.1% (good quality ratio 30.7%)
                                                                                      • Quality average: 76.3%
                                                                                      • Quality standard deviation: 25.1%
                                                                                      HCA Information:
                                                                                      • Successful, ratio: 100%
                                                                                      • Number of executed functions: 0
                                                                                      • Number of non-executed functions: 0
                                                                                      Cookbook Comments:
                                                                                      • Adjust boot time
                                                                                      • Enable AMSI
                                                                                      • Override analysis time to 240s for rundll32
                                                                                      Warnings:
                                                                                      Show All
                                                                                      • Exclude process from analysis (whitelisted): audiodg.exe, BackgroundTransferHost.exe, WMIADAP.exe, backgroundTaskHost.exe, wuapihost.exe
                                                                                      • Excluded IPs from analysis (whitelisted): 23.211.6.115, 23.211.4.86, 173.222.108.210, 173.222.108.226, 20.54.110.249
                                                                                      • Excluded domains from analysis (whitelisted): client.wns.windows.com, fs.microsoft.com, displaycatalog-rp-europe.md.mp.microsoft.com.akadns.net, wu-shim.trafficmanager.net, neu-displaycatalogrp.frontdoor.bigcatalog.commerce.microsoft.com, store-images.s-microsoft.com-c.edgekey.net, e1723.g.akamaiedge.net, ctldl.windowsupdate.com, a767.dspw65.akamai.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, arc.msn.com, download.windowsupdate.com.edgesuite.net, ris.api.iris.microsoft.com, e12564.dspb.akamaiedge.net, consumer-displaycatalogrp-aks2aks-europe.md.mp.microsoft.com.akadns.net, store-images.s-microsoft.com, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, prod.fs.microsoft.com.akadns.net, displaycatalog-rp.md.mp.microsoft.com.akadns.net
                                                                                      • Not all processes where analyzed, report is missing behavior information
                                                                                      • Report creation exceeded maximum time and may have missing disassembly code information.
                                                                                      • Report size exceeded maximum capacity and may have missing behavior information.
                                                                                      • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                                      • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                                                      • Report size getting too big, too many NtQueryValueKey calls found.

                                                                                      Simulations

                                                                                      Behavior and APIs

                                                                                      TimeTypeDescription
                                                                                      10:51:47API Interceptor10x Sleep call for process: svchost.exe modified
                                                                                      10:53:02API Interceptor1x Sleep call for process: MpCmdRun.exe modified

                                                                                      Joe Sandbox View / Context

                                                                                      IPs

                                                                                      No context

                                                                                      Domains

                                                                                      No context

                                                                                      ASN

                                                                                      No context

                                                                                      JA3 Fingerprints

                                                                                      No context

                                                                                      Dropped Files

                                                                                      No context

                                                                                      Created / dropped Files

                                                                                      C:\ProgramData\Microsoft\Network\Downloader\edb.chk
                                                                                      Process:C:\Windows\System32\svchost.exe
                                                                                      File Type:data
                                                                                      Category:dropped
                                                                                      Size (bytes):8192
                                                                                      Entropy (8bit):0.3593198815979092
                                                                                      Encrypted:false
                                                                                      SSDEEP:12:SnaaD0JcaaD0JwQQU2naaD0JcaaD0JwQQU:4tgJctgJw/tgJctgJw
                                                                                      MD5:BF1DC7D5D8DAD7478F426DF8B3F8BAA6
                                                                                      SHA1:C6B0BDE788F553F865D65F773D8F6A3546887E42
                                                                                      SHA-256:BE47C764C38CA7A90A345BE183F5261E89B98743B5E35989E9A8BE0DA498C0F2
                                                                                      SHA-512:00F2412AA04E09EA19A8315D80BE66D2727C713FC0F5AE6A9334BABA539817F568A98CA3A45B2673282BDD325B8B0E2840A393A4DCFADCB16473F5EAF2AF3180
                                                                                      Malicious:false
                                                                                      Preview: .............*..........3...w..................C:\ProgramData\Microsoft\Network\Downloader\.........................................................................................................................................................................................................................C:\ProgramData\Microsoft\Network\Downloader\..........................................................................................................................................................................................................................0u..................@...@......................................................*.............................................................................................................................................................................................................................................................................................................................................................
                                                                                      C:\ProgramData\Microsoft\Network\Downloader\edb.log
                                                                                      Process:C:\Windows\System32\svchost.exe
                                                                                      File Type:MPEG-4 LOAS
                                                                                      Category:dropped
                                                                                      Size (bytes):1310720
                                                                                      Entropy (8bit):0.2494625269555927
                                                                                      Encrypted:false
                                                                                      SSDEEP:1536:BJiRdfVzkZm3lyf49uyc0ga04PdHS9LrM/oVMUdSRU4S:BJiRdwfu2SRU4S
                                                                                      MD5:F7181E58DBD46FD6667C111BB57ADB6E
                                                                                      SHA1:26A557E1C7992A5E5B45ADB790734B09C59E2648
                                                                                      SHA-256:03ED7237861CFBE9DE2AFDC3CC15579F975609AA850F29ECD1D6396761556CA8
                                                                                      SHA-512:5A4B8DC392E3960E82F73C18D239FAFEB25D13A3F411477A3AAD9A2350401EB1279E8AD94FE267CF4767AE6DDE896D27ECCF79843A8C37C76E54427741B39701
                                                                                      Malicious:false
                                                                                      Preview: V.d.........@..@.3...w...........................3...w..................C:\ProgramData\Microsoft\Network\Downloader\.........................................................................................................................................................................................................................C:\ProgramData\Microsoft\Network\Downloader\..........................................................................................................................................................................................................................0u..................@...@.........................................d#.................................................................................................................................................................................................................................................................................................................................................
                                                                                      C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
                                                                                      Process:C:\Windows\System32\svchost.exe
                                                                                      File Type:Extensible storage engine DataBase, version 0x620, checksum 0x7a4cdab4, page size 16384, Windows version 10.0
                                                                                      Category:dropped
                                                                                      Size (bytes):786432
                                                                                      Entropy (8bit):0.25072088032938816
                                                                                      Encrypted:false
                                                                                      SSDEEP:384:bDs+W0StseCJ48EApW0StseCJ48E2rTSjlK/ebmLerYSRSY1J2:bDzSB2nSB2RSjlK/+mLesOj1J2
                                                                                      MD5:0B4230BCE3C5BC298429551F080EC64B
                                                                                      SHA1:6806B5CEFE5834EAA742874B90DCE6276FA7F9F4
                                                                                      SHA-256:A59293E5432507411A916322A2BBD533BB47057674819361C551EA5C56AA8CA0
                                                                                      SHA-512:26206B6AEBF985C8EF10D229A92EAF607C4A4A3644AA6744D305048BF7ACE0F508963DEDC83609699C7FD9368703C385F56FE966AD934982A71B9FCE9E9B14F6
                                                                                      Malicious:false
                                                                                      Preview: zL.... ................e.f.3...w........................).....86...z../3...zc.h.(.....86...z....)..............3...w...........................................................................................................B...........@...................................................................................................... .......................................................................................................................................................................................................................................................86...z......................86...z..........................................................................................................................................................................................................................................................................................................................................................................................
                                                                                      C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
                                                                                      Process:C:\Windows\System32\svchost.exe
                                                                                      File Type:data
                                                                                      Category:dropped
                                                                                      Size (bytes):16384
                                                                                      Entropy (8bit):0.07522292829480651
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:PY7vKW68NkfUrlXDrWUrdvWUrkfdTYlwsRrTrlXall3Vkttlmlnl:PYrKWzkfUsUhWUw1MBv03
                                                                                      MD5:205D325AC1F46E66A9DE7B8E779F3C9B
                                                                                      SHA1:F783E1D4FDFF3148D3280EA06540BBC81ABDB4DF
                                                                                      SHA-256:F98AC8E0902251EFE71F7DA500DD9376E468F03A48DD5138D2DF6E7E8374F980
                                                                                      SHA-512:2DEF0D43F09101B4DF16E4DFA5B2CB9A8485B23E571E668C95D66E9994D9851CD39F1222A0063A2F9286375887DA5F3932A0BF72935400D6739381EE3DC3F89E
                                                                                      Malicious:false
                                                                                      Preview: 3........................................3...w../3...zc.86...z..........86...z..86...z...L.#86...z_.....................86...z..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                      C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
                                                                                      Process:C:\Windows\SysWOW64\rundll32.exe
                                                                                      File Type:Microsoft Cabinet archive data, 61414 bytes, 1 file
                                                                                      Category:dropped
                                                                                      Size (bytes):61414
                                                                                      Entropy (8bit):7.995245868798237
                                                                                      Encrypted:true
                                                                                      SSDEEP:1536:EysgU6qmzixT64jYMZ8HbVPGfVDwm/xLZ9rP:wF6qmeo4eH1m9wmLvrP
                                                                                      MD5:ACAEDA60C79C6BCAC925EEB3653F45E0
                                                                                      SHA1:2AAAE490BCDACCC6172240FF1697753B37AC5578
                                                                                      SHA-256:6B0CECCF0103AFD89844761417C1D23ACC41F8AEBF3B7230765209B61EEE5658
                                                                                      SHA-512:FEAA6E7ED7DDA1583739B3E531AB5C562A222EE6ECD042690AE7DCFF966717C6E968469A7797265A11F6E899479AE0F3031E8CF5BEBE1492D5205E9C59690900
                                                                                      Malicious:false
                                                                                      Preview: MSCF............,...................I.......;w........RSNj .authroot.stl..>.(.5..CK..8T....c_.d...A.K...+.d.H..*i.RJJ.IQIR..$t)Kd.-[..T\{..ne......<.w......A..B........c...wi......D....c.0D,L........fy....Rg...=........i,3.3..Z....~^ve<...TF.*...f.zy.,...m.@.0.0...m.3..I(..+..v#...(.2....e...L..*y..V.......~U...."<ke.....l.X:Dt..R<7.5\A7L0=..T.V...IDr..8<....r&...I-.^..b.b.".Af....E.._..r.>.`;,.Hob..S.....7'..\.R$.".g..+..64..@nP.....k3...B.`.G..@D.....L.....`^...#OpW.....!....`.....rf:.}.R.@....gR.#7....l..H.#...d.Qh..3..fCX....==#..M.l..~&....[.J9.\..Ww.....Tx.%....]..a4E...q.+...#.*a..x..O..V.t..Y1!.T..`U...-...< _@...|(.....0..3.`.LU...E0.Gu.4KN....5...?.....I.p..'..........N<.d.O..dH@c1t...[w/...T....cYK.X>.0..Z.....O>..9.3.#9X.%.b...5.YK.E.V.....`./.3.._..nN]..=..M.o.F.._..z....._...gY..!Z..?l....vp.l.:.d.Z..W.....~...N.._.k...&.....$......i.F.d.....D!e.....Y..,.E..m.;.1... $.F..O.F.o_}.uG....,.%.>,.Zx.......o....c../.;....g&.....
                                                                                      C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
                                                                                      Process:C:\Windows\SysWOW64\rundll32.exe
                                                                                      File Type:data
                                                                                      Category:modified
                                                                                      Size (bytes):328
                                                                                      Entropy (8bit):3.0977650710616285
                                                                                      Encrypted:false
                                                                                      SSDEEP:6:kK8k8SN+SkQlPlEGYRMY9z+4KlDA3RUeYlUmlUR/t:E9kPlE99SNxAhUeYlUSA/t
                                                                                      MD5:92EA2BF893C01FECAF88971729F04467
                                                                                      SHA1:BA9515C108D2C4B101CD8217CD30E2DBFA557CC6
                                                                                      SHA-256:6804AA30DEFE7C14FE33501BA5A76C27DD0ED9633C6DDBC5B7004B37E43D1BE3
                                                                                      SHA-512:5763CCE079687D1E512F74C67E5BDA1E8B9365865548406DBDB09DE00718660A2F614494CC0468408365782063E0032FA808E679E50346A1AB39DFE9CE325FEA
                                                                                      Malicious:false
                                                                                      Preview: p...... ........h. .w...(....................................................... ........q.\].......&...............h.t.t.p.:././.c.t.l.d.l...w.i.n.d.o.w.s.u.p.d.a.t.e...c.o.m./.m.s.d.o.w.n.l.o.a.d./.u.p.d.a.t.e./.v.3./.s.t.a.t.i.c./.t.r.u.s.t.e.d.r./.e.n./.a.u.t.h.r.o.o.t.s.t.l...c.a.b...".0.7.1.e.1.5.c.5.d.c.4.d.7.1.:.0."...
                                                                                      C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
                                                                                      Process:C:\Windows\System32\svchost.exe
                                                                                      File Type:ASCII text, with no line terminators
                                                                                      Category:dropped
                                                                                      Size (bytes):55
                                                                                      Entropy (8bit):4.306461250274409
                                                                                      Encrypted:false
                                                                                      SSDEEP:3:YDQRWu83XfAw2fHbY:YMRl83Xt2f7Y
                                                                                      MD5:DCA83F08D448911A14C22EBCACC5AD57
                                                                                      SHA1:91270525521B7FE0D986DB19747F47D34B6318AD
                                                                                      SHA-256:2B4B2D4A06044AD0BD2AE3287CFCBECD90B959FEB2F503AC258D7C0A235D6FE9
                                                                                      SHA-512:96F3A02DC4AE302A30A376FC7082002065C7A35ECB74573DE66254EFD701E8FD9E9D867A2C8ABEB4C482738291B715D4965A0D2412663FDF1EE6CBC0BA9FBACA
                                                                                      Malicious:false
                                                                                      Preview: {"fontSetUri":"fontset-2017-04.json","baseUri":"fonts"}
                                                                                      C:\Windows\ServiceProfiles\LocalService\AppData\Local\Temp\MpCmdRun.log
                                                                                      Process:C:\Program Files\Windows Defender\MpCmdRun.exe
                                                                                      File Type:Little-endian UTF-16 Unicode text, with CRLF, CR line terminators
                                                                                      Category:modified
                                                                                      Size (bytes):7250
                                                                                      Entropy (8bit):3.1658683248753263
                                                                                      Encrypted:false
                                                                                      SSDEEP:96:cEj+AbCEH+AbuEAc+AbhGEA+AbNEe+Ab/Ee+AbPE6w9+Ab1wTE5+Abg:cY+38+DJc+iGr+MZ+65+6tg+ECO+5
                                                                                      MD5:EF4A738F9534F21AD28054EBE4A48DFE
                                                                                      SHA1:EB61A050285D3D7F0C9D7B12AB89393B79726AF5
                                                                                      SHA-256:6AA3D787A7545C8162781DCB025E23C280B3D37B7FD62438C17B624E5088D1E1
                                                                                      SHA-512:D28E52070FB69539D49F08E65D7D1E44159ED924DFC8DA0FAF8281CE551B17A2A24316072341E8212F79916E351B85F318DB9C0E72174A450276C51417BFD584
                                                                                      Malicious:false
                                                                                      Preview: ..........-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.....M.p.C.m.d.R.u.n.:. .C.o.m.m.a.n.d. .L.i.n.e.:. .".C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.W.i.n.d.o.w.s. .D.e.f.e.n.d.e.r.\.m.p.c.m.d.r.u.n...e.x.e.". .-.w.d.e.n.a.b.l.e..... .S.t.a.r.t. .T.i.m.e.:. .. T.h.u. .. J.u.n. .. 2.7. .. 2.0.1.9. .0.1.:.2.9.:.4.9.........M.p.E.n.s.u.r.e.P.r.o.c.e.s.s.M.i.t.i.g.a.t.i.o.n.P.o.l.i.c.y.:. .h.r. .=. .0.x.1.....W.D.E.n.a.b.l.e.....E.R.R.O.R.:. .M.p.W.D.E.n.a.b.l.e.(.T.R.U.E.). .f.a.i.l.e.d. .(.8.0.0.7.0.4.E.C.).....M.p.C.m.d.R.u.n.:. .E.n.d. .T.i.m.e.:. .. T.h.u. .. J.u.n. .. 2.7. .. 2.0.1.9. .0.1.:.2.9.:.4.9.....-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.............-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.
                                                                                      C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Windows\DeliveryOptimization\Logs\dosvc.20220114_185158_945.etl
                                                                                      Process:C:\Windows\System32\svchost.exe
                                                                                      File Type:data
                                                                                      Category:dropped
                                                                                      Size (bytes):12288
                                                                                      Entropy (8bit):3.7696639382117034
                                                                                      Encrypted:false
                                                                                      SSDEEP:96:bQCn6CKbo+yh5Kt9A/YNbCBkI2lgRkni4swT22jFz4NMCldJRfuKj5QNMCZY5XU5:PI1mvx2gvOC5FCeC0CTCECo
                                                                                      MD5:960DC335D5874DEED58AED46351578D7
                                                                                      SHA1:8A91C73DE78B0277871C742A93F527DE746B248E
                                                                                      SHA-256:129E447D9FD9333FF2177EE47F697A1975898712C51A510FFE901DA5599FAE39
                                                                                      SHA-512:7F5A7743699EDC81BCA5E498EC5483ABF29E25DD612B2AB892C1F54DA0A5272C99492C43688B9A5B6978538D98CF9133D5B1EF9D81FC5B57AA7856682DFB1542
                                                                                      Malicious:false
                                                                                      Preview: .... ... ....................................... ...!...........................\...|............................B..............Zb... ... ..........................................@.t.z.r.e.s...d.l.l.,.-.2.1.2.......................................................@.t.z.r.e.s...d.l.l.,.-.2.1.1............................................................./_8..... .......5.w...........8.6.9.6.E.A.C.4.-.1.2.8.8.-.4.2.8.8.-.A.4.E.E.-.4.9.E.E.4.3.1.B.0.A.D.9...C.:.\.W.i.n.d.o.w.s.\.S.e.r.v.i.c.e.P.r.o.f.i.l.e.s.\.N.e.t.w.o.r.k.S.e.r.v.i.c.e.\.A.p.p.D.a.t.a.\.L.o.c.a.l.\.M.i.c.r.o.s.o.f.t.\.W.i.n.d.o.w.s.\.D.e.l.i.v.e.r.y.O.p.t.i.m.i.z.a.t.i.o.n.\.L.o.g.s.\.d.o.s.v.c...2.0.2.2.0.1.1.4._.1.8.5.1.5.8._.9.4.5...e.t.l.........P.P.\...|...........................................................................................................................................................................................................................................................................

                                                                                      Static File Info

                                                                                      General

                                                                                      File type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                      Entropy (8bit):7.08795155067448
                                                                                      TrID:
                                                                                      • Win32 Dynamic Link Library (generic) (1002004/3) 95.65%
                                                                                      • Win32 EXE PECompact compressed (generic) (41571/9) 3.97%
                                                                                      • Generic Win/DOS Executable (2004/3) 0.19%
                                                                                      • DOS Executable Generic (2002/1) 0.19%
                                                                                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                                      File name:M2hsMd9hTq.dll
                                                                                      File size:417792
                                                                                      MD5:707ec8851adeff69bdb3204692c340a8
                                                                                      SHA1:b51315290d9b490c55663a572bd85999f3267b7a
                                                                                      SHA256:a6d1ed377e3de0ae885c14ca65c2eafba01207e058ac353289182800a95b5fea
                                                                                      SHA512:fb147536a13895d60fd3fdf50507a7115a910ac6c9e7e8e36d602f5e51e8b56cec67b201003053ec5ad79cd3d342a7e62c455eef00ac067a119f7bdc6fd6ef5d
                                                                                      SSDEEP:6144:o1ju3jPam65ucnNgDoDUhuGGwKveu04VKYjHyCAJOhrmBlDxqms9ujAJKedmL/:yMjcuDaUImuStJorohvsMjmKe
                                                                                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......Z'...F...F...F...I...F...I...F...F...D..9....F..9....F..9....F..9....F..9....F..9....F..Rich.F..................PE..L...k+.a...

                                                                                      File Icon

                                                                                      Icon Hash:71b018ccc6577131

                                                                                      Static PE Info

                                                                                      General

                                                                                      Entrypoint:0x10017b85
                                                                                      Entrypoint Section:.text
                                                                                      Digitally signed:false
                                                                                      Imagebase:0x10000000
                                                                                      Subsystem:windows gui
                                                                                      Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE, DLL
                                                                                      DLL Characteristics:
                                                                                      Time Stamp:0x61E02B6B [Thu Jan 13 13:38:51 2022 UTC]
                                                                                      TLS Callbacks:
                                                                                      CLR (.Net) Version:
                                                                                      OS Version Major:4
                                                                                      OS Version Minor:0
                                                                                      File Version Major:4
                                                                                      File Version Minor:0
                                                                                      Subsystem Version Major:4
                                                                                      Subsystem Version Minor:0
                                                                                      Import Hash:90add561a8bf6976696c056c199a41b8

                                                                                      Entrypoint Preview

                                                                                      Instruction
                                                                                      cmp dword ptr [esp+08h], 01h
                                                                                      jne 00007EFE78D08F37h
                                                                                      call 00007EFE78D10CB8h
                                                                                      push dword ptr [esp+04h]
                                                                                      mov ecx, dword ptr [esp+10h]
                                                                                      mov edx, dword ptr [esp+0Ch]
                                                                                      call 00007EFE78D08E22h
                                                                                      pop ecx
                                                                                      retn 000Ch
                                                                                      push 00000000h
                                                                                      push dword ptr [esp+14h]
                                                                                      push dword ptr [esp+14h]
                                                                                      push dword ptr [esp+14h]
                                                                                      push dword ptr [esp+14h]
                                                                                      call 00007EFE78D10D20h
                                                                                      add esp, 14h
                                                                                      ret
                                                                                      push eax
                                                                                      push dword ptr fs:[00000000h]
                                                                                      lea eax, dword ptr [esp+0Ch]
                                                                                      sub esp, dword ptr [esp+0Ch]
                                                                                      push ebx
                                                                                      push esi
                                                                                      push edi
                                                                                      mov dword ptr [eax], ebp
                                                                                      mov ebp, eax
                                                                                      mov eax, dword ptr [10057A08h]
                                                                                      xor eax, ebp
                                                                                      push eax
                                                                                      push dword ptr [ebp-04h]
                                                                                      mov dword ptr [ebp-04h], FFFFFFFFh
                                                                                      lea eax, dword ptr [ebp-0Ch]
                                                                                      mov dword ptr fs:[00000000h], eax
                                                                                      ret
                                                                                      push eax
                                                                                      push dword ptr fs:[00000000h]
                                                                                      lea eax, dword ptr [esp+0Ch]
                                                                                      sub esp, dword ptr [esp+0Ch]
                                                                                      push ebx
                                                                                      push esi
                                                                                      push edi
                                                                                      mov dword ptr [eax], ebp
                                                                                      mov ebp, eax
                                                                                      mov eax, dword ptr [10057A08h]
                                                                                      xor eax, ebp
                                                                                      push eax
                                                                                      mov dword ptr [ebp-10h], esp
                                                                                      push dword ptr [ebp-04h]
                                                                                      mov dword ptr [ebp-04h], FFFFFFFFh
                                                                                      lea eax, dword ptr [ebp-0Ch]
                                                                                      mov dword ptr fs:[00000000h], eax
                                                                                      ret
                                                                                      push eax
                                                                                      push dword ptr fs:[00000000h]
                                                                                      lea eax, dword ptr [esp+0Ch]
                                                                                      sub esp, dword ptr [esp+0Ch]
                                                                                      push ebx
                                                                                      push esi
                                                                                      push edi
                                                                                      mov dword ptr [eax], ebp
                                                                                      mov ebp, eax
                                                                                      mov eax, dword ptr [10057A08h]
                                                                                      xor eax, ebp
                                                                                      push eax
                                                                                      mov dword ptr [ebp-10h], eax

                                                                                      Rich Headers

                                                                                      Programming Language:
                                                                                      • [RES] VS2005 build 50727
                                                                                      • [ C ] VS2005 build 50727
                                                                                      • [EXP] VS2005 build 50727
                                                                                      • [C++] VS2005 build 50727
                                                                                      • [ASM] VS2005 build 50727
                                                                                      • [LNK] VS2005 build 50727

                                                                                      Data Directories

                                                                                      NameVirtual AddressVirtual Size Is in Section
                                                                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x313c00x50.rdata
                                                                                      IMAGE_DIRECTORY_ENTRY_IMPORT0x2fdcc0xb4.rdata
                                                                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x5d0000x3664.rsrc
                                                                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x610000x3df4.reloc
                                                                                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x2cd600x40.rdata
                                                                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                      IMAGE_DIRECTORY_ENTRY_IAT0x290000x440.rdata
                                                                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x2fd440x40.rdata
                                                                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                                                                      Sections

                                                                                      NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                      .text0x10000x27f5e0x28000False0.514996337891data6.66251942868IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                                                                      .rdata0x290000x84100x9000False0.308865017361data4.82995734739IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                      .data0x320000x2a9a00x27000False0.963572966747data7.93281036967IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                                                                                      .rsrc0x5d0000x36640x4000False0.274780273438data4.49622273105IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                      .reloc0x610000x82840x9000False0.33251953125data3.82081999119IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                                                                                      Resources

                                                                                      NameRVASizeTypeLanguageCountry
                                                                                      RT_CURSOR0x5db080x134dataChineseChina
                                                                                      RT_CURSOR0x5dc3c0xb4dataChineseChina
                                                                                      RT_CURSOR0x5dcf00x134AmigaOS bitmap fontChineseChina
                                                                                      RT_CURSOR0x5de240x134dataChineseChina
                                                                                      RT_CURSOR0x5df580x134dataChineseChina
                                                                                      RT_CURSOR0x5e08c0x134dataChineseChina
                                                                                      RT_CURSOR0x5e1c00x134dataChineseChina
                                                                                      RT_CURSOR0x5e2f40x134dataChineseChina
                                                                                      RT_CURSOR0x5e4280x134dataChineseChina
                                                                                      RT_CURSOR0x5e55c0x134dataChineseChina
                                                                                      RT_CURSOR0x5e6900x134dataChineseChina
                                                                                      RT_CURSOR0x5e7c40x134dataChineseChina
                                                                                      RT_CURSOR0x5e8f80x134AmigaOS bitmap fontChineseChina
                                                                                      RT_CURSOR0x5ea2c0x134dataChineseChina
                                                                                      RT_CURSOR0x5eb600x134dataChineseChina
                                                                                      RT_CURSOR0x5ec940x134dataChineseChina
                                                                                      RT_BITMAP0x5edc80xb8dataChineseChina
                                                                                      RT_BITMAP0x5ee800x144dataChineseChina
                                                                                      RT_ICON0x5efc40x2e8dBase IV DBT of @.DBF, block length 512, next free block index 40, next free block 67108992, next used block 3293332676ChineseChina
                                                                                      RT_ICON0x5f2ac0x128GLS_BINARY_LSB_FIRSTChineseChina
                                                                                      RT_DIALOG0x5f3d40x33cdataChineseChina
                                                                                      RT_DIALOG0x5f7100xe2dataChineseChina
                                                                                      RT_DIALOG0x5f7f40x34dataChineseChina
                                                                                      RT_STRING0x5f8280x54dataChineseChina
                                                                                      RT_STRING0x5f87c0x2cdataChineseChina
                                                                                      RT_STRING0x5f8a80x82dataChineseChina
                                                                                      RT_STRING0x5f92c0x1d0dataChineseChina
                                                                                      RT_STRING0x5fafc0x164dataChineseChina
                                                                                      RT_STRING0x5fc600x132dataChineseChina
                                                                                      RT_STRING0x5fd940x50dataChineseChina
                                                                                      RT_STRING0x5fde40x40dataChineseChina
                                                                                      RT_STRING0x5fe240x6adataChineseChina
                                                                                      RT_STRING0x5fe900x1d6dataChineseChina
                                                                                      RT_STRING0x600680x110dataChineseChina
                                                                                      RT_STRING0x601780x24dataChineseChina
                                                                                      RT_STRING0x6019c0x30dataChineseChina
                                                                                      RT_GROUP_CURSOR0x601cc0x22Lotus unknown worksheet or configuration, revision 0x2ChineseChina
                                                                                      RT_GROUP_CURSOR0x601f00x14Lotus unknown worksheet or configuration, revision 0x1ChineseChina
                                                                                      RT_GROUP_CURSOR0x602040x14Lotus unknown worksheet or configuration, revision 0x1ChineseChina
                                                                                      RT_GROUP_CURSOR0x602180x14Lotus unknown worksheet or configuration, revision 0x1ChineseChina
                                                                                      RT_GROUP_CURSOR0x6022c0x14Lotus unknown worksheet or configuration, revision 0x1ChineseChina
                                                                                      RT_GROUP_CURSOR0x602400x14Lotus unknown worksheet or configuration, revision 0x1ChineseChina
                                                                                      RT_GROUP_CURSOR0x602540x14Lotus unknown worksheet or configuration, revision 0x1ChineseChina
                                                                                      RT_GROUP_CURSOR0x602680x14Lotus unknown worksheet or configuration, revision 0x1ChineseChina
                                                                                      RT_GROUP_CURSOR0x6027c0x14Lotus unknown worksheet or configuration, revision 0x1ChineseChina
                                                                                      RT_GROUP_CURSOR0x602900x14Lotus unknown worksheet or configuration, revision 0x1ChineseChina
                                                                                      RT_GROUP_CURSOR0x602a40x14Lotus unknown worksheet or configuration, revision 0x1ChineseChina
                                                                                      RT_GROUP_CURSOR0x602b80x14Lotus unknown worksheet or configuration, revision 0x1ChineseChina
                                                                                      RT_GROUP_CURSOR0x602cc0x14Lotus unknown worksheet or configuration, revision 0x1ChineseChina
                                                                                      RT_GROUP_CURSOR0x602e00x14Lotus unknown worksheet or configuration, revision 0x1ChineseChina
                                                                                      RT_GROUP_CURSOR0x602f40x14Lotus unknown worksheet or configuration, revision 0x1ChineseChina
                                                                                      RT_GROUP_ICON0x603080x22dataChineseChina
                                                                                      RT_VERSION0x6032c0x2e0dataChineseChina
                                                                                      RT_MANIFEST0x6060c0x56ASCII text, with CRLF line terminatorsEnglishUnited States

                                                                                      Imports

                                                                                      DLLImport
                                                                                      KERNEL32.dllCreateFileA, GetCPInfo, GetOEMCP, RtlUnwind, HeapReAlloc, GetCommandLineA, RaiseException, ExitProcess, HeapSize, HeapDestroy, HeapCreate, TerminateProcess, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsDebuggerPresent, GetACP, LCMapStringW, GetStdHandle, SetHandleCount, GetFileType, GetStartupInfoA, FreeEnvironmentStringsA, GetEnvironmentStrings, FreeEnvironmentStringsW, GetEnvironmentStringsW, QueryPerformanceCounter, GetTickCount, GetSystemTimeAsFileTime, GetConsoleCP, GetConsoleMode, GetStringTypeA, GetStringTypeW, SetStdHandle, WriteConsoleA, GetConsoleOutputCP, WriteConsoleW, GetCurrentProcess, GetThreadLocale, FlushFileBuffers, SetFilePointer, WriteFile, ReadFile, GlobalFlags, WritePrivateProfileStringA, TlsFree, DeleteCriticalSection, LocalReAlloc, TlsSetValue, TlsAlloc, InitializeCriticalSection, GlobalHandle, GlobalReAlloc, EnterCriticalSection, TlsGetValue, LeaveCriticalSection, LocalAlloc, InterlockedIncrement, GlobalGetAtomNameA, GlobalFindAtomA, lstrcmpW, GetVersionExA, InterlockedDecrement, FreeResource, GetCurrentProcessId, GlobalAddAtomA, GetCurrentThread, GetCurrentThreadId, ConvertDefaultLocale, GetModuleFileNameA, EnumResourceLanguagesA, GetLocaleInfoA, lstrcmpA, GlobalDeleteAtom, GetModuleHandleA, GlobalFree, GlobalAlloc, GlobalLock, GlobalUnlock, FormatMessageA, LocalFree, FindResourceA, LoadResource, LockResource, SizeofResource, MulDiv, CreateThread, CloseHandle, HeapFree, GetNativeSystemInfo, GetProcessHeap, HeapAlloc, FreeLibrary, GetProcAddress, LoadLibraryA, IsBadReadPtr, VirtualProtect, SetLastError, VirtualAlloc, VirtualFree, VirtualQuery, Sleep, GetLastError, lstrlenA, WideCharToMultiByte, CompareStringA, MultiByteToWideChar, GetVersion, LCMapStringA, InterlockedExchange
                                                                                      USER32.dllLoadCursorA, GetSysColorBrush, EndPaint, BeginPaint, ReleaseDC, GetDC, ClientToScreen, GrayStringA, DrawTextExA, DrawTextA, TabbedTextOutA, SetWindowTextA, IsDialogMessageA, SetDlgItemTextA, GetDlgItemTextA, RegisterWindowMessageA, SendDlgItemMessageA, WinHelpA, GetCapture, GetClassLongA, GetClassNameA, SetPropA, GetPropA, RemovePropA, SetFocus, GetWindowTextLengthA, GetWindowTextA, GetForegroundWindow, GetTopWindow, GetMessageTime, MapWindowPoints, SetForegroundWindow, UpdateWindow, GetMenu, CreateWindowExA, GetClassInfoExA, GetClassInfoA, RegisterClassA, GetSysColor, CopyRect, PtInRect, GetDlgCtrlID, DefWindowProcA, CallWindowProcA, SetWindowLongA, SetWindowPos, SystemParametersInfoA, GetWindowPlacement, GetWindowRect, GetWindow, UnhookWindowsHookEx, GetDesktopWindow, SetActiveWindow, CreateDialogIndirectParamA, DestroyWindow, IsWindow, GetDlgItem, GetNextDlgTabItem, EndDialog, GetWindowThreadProcessId, GetWindowLongA, GetLastActivePopup, IsWindowEnabled, MessageBoxA, SetCursor, SetWindowsHookExA, CallNextHookEx, GetMessageA, TranslateMessage, DispatchMessageA, GetActiveWindow, IsWindowVisible, GetKeyState, PeekMessageA, GetCursorPos, ValidateRect, SetMenuItemBitmaps, DestroyMenu, UnregisterClassA, GetMessagePos, GetMenuCheckMarkDimensions, LoadBitmapA, GetFocus, GetParent, ModifyMenuA, EnableMenuItem, CheckMenuItem, PostQuitMessage, GetMenuState, GetMenuItemID, GetMenuItemCount, GetSubMenu, SetTimer, KillTimer, IsIconic, GetSystemMetrics, GetClientRect, DrawIcon, SendMessageA, ShowWindow, EnableWindow, LoadIconA, PostMessageA, AdjustWindowRectEx
                                                                                      GDI32.dllSetWindowExtEx, ScaleWindowExtEx, DeleteDC, GetStockObject, ScaleViewportExtEx, SetViewportExtEx, OffsetViewportOrgEx, SetViewportOrgEx, SelectObject, Escape, ExtTextOutA, TextOutA, RectVisible, PtVisible, GetDeviceCaps, DeleteObject, SetMapMode, RestoreDC, SaveDC, GetObjectA, SetBkColor, SetTextColor, GetClipBox, CreateBitmap
                                                                                      WINSPOOL.DRVDocumentPropertiesA, ClosePrinter, OpenPrinterA
                                                                                      ADVAPI32.dllRegSetValueExA, RegCreateKeyExA, RegQueryValueA, RegEnumKeyA, RegDeleteKeyA, RegOpenKeyExA, RegQueryValueExA, RegOpenKeyA, RegCloseKey
                                                                                      SHLWAPI.dllPathFindExtensionA
                                                                                      OLEAUT32.dllVariantClear, VariantChangeType, VariantInit
                                                                                      WS2_32.dllsendto, recvfrom, WSAStartup, inet_addr, htons, socket, bind, setsockopt, WSACleanup, closesocket, htonl

                                                                                      Exports

                                                                                      NameOrdinalAddress
                                                                                      DllRegisterServer10x10008af0

                                                                                      Version Infos

                                                                                      DescriptionData
                                                                                      LegalCopyright (C) 2014
                                                                                      InternalNameUDPTool
                                                                                      FileVersion1, 0, 0, 1
                                                                                      CompanyName
                                                                                      LegalTrademarks
                                                                                      ProductNameUDPTool
                                                                                      ProductVersion1, 0, 0, 1
                                                                                      FileDescriptionUDPTool Microsoft
                                                                                      OriginalFilenameUDPTool.EXE
                                                                                      Translation0x0804 0x04b0

                                                                                      Possible Origin

                                                                                      Language of compilation systemCountry where language is spokenMap
                                                                                      ChineseChina
                                                                                      EnglishUnited States

                                                                                      Network Behavior

                                                                                      Snort IDS Alerts

                                                                                      TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                                                                      01/14/22-10:51:56.333232TCP2404332ET CNC Feodo Tracker Reported CnC Server TCP group 174975880192.168.2.545.138.98.34
                                                                                      01/14/22-10:51:57.530904TCP2404338ET CNC Feodo Tracker Reported CnC Server TCP group 20497598080192.168.2.569.16.218.101

                                                                                      Network Port Distribution

                                                                                      TCP Packets

                                                                                      TimestampSource PortDest PortSource IPDest IP
                                                                                      Jan 14, 2022 10:51:56.333231926 CET4975880192.168.2.545.138.98.34
                                                                                      Jan 14, 2022 10:51:56.352993011 CET804975845.138.98.34192.168.2.5
                                                                                      Jan 14, 2022 10:51:56.892113924 CET4975880192.168.2.545.138.98.34
                                                                                      Jan 14, 2022 10:51:56.909033060 CET804975845.138.98.34192.168.2.5
                                                                                      Jan 14, 2022 10:51:57.501562119 CET4975880192.168.2.545.138.98.34
                                                                                      Jan 14, 2022 10:51:57.520227909 CET804975845.138.98.34192.168.2.5
                                                                                      Jan 14, 2022 10:51:57.530904055 CET497598080192.168.2.569.16.218.101
                                                                                      Jan 14, 2022 10:51:57.659617901 CET80804975969.16.218.101192.168.2.5
                                                                                      Jan 14, 2022 10:51:57.659778118 CET497598080192.168.2.569.16.218.101
                                                                                      Jan 14, 2022 10:51:57.688545942 CET497598080192.168.2.569.16.218.101
                                                                                      Jan 14, 2022 10:51:57.817223072 CET80804975969.16.218.101192.168.2.5
                                                                                      Jan 14, 2022 10:51:57.830322981 CET80804975969.16.218.101192.168.2.5
                                                                                      Jan 14, 2022 10:51:57.830349922 CET80804975969.16.218.101192.168.2.5
                                                                                      Jan 14, 2022 10:51:57.830404043 CET497598080192.168.2.569.16.218.101
                                                                                      Jan 14, 2022 10:51:57.830427885 CET497598080192.168.2.569.16.218.101
                                                                                      Jan 14, 2022 10:52:00.718591928 CET497598080192.168.2.569.16.218.101
                                                                                      Jan 14, 2022 10:52:00.847300053 CET80804975969.16.218.101192.168.2.5
                                                                                      Jan 14, 2022 10:52:00.848001957 CET80804975969.16.218.101192.168.2.5
                                                                                      Jan 14, 2022 10:52:00.848105907 CET497598080192.168.2.569.16.218.101
                                                                                      Jan 14, 2022 10:52:00.855631113 CET497598080192.168.2.569.16.218.101
                                                                                      Jan 14, 2022 10:52:00.984343052 CET80804975969.16.218.101192.168.2.5
                                                                                      Jan 14, 2022 10:52:01.490227938 CET80804975969.16.218.101192.168.2.5
                                                                                      Jan 14, 2022 10:52:01.490308046 CET497598080192.168.2.569.16.218.101
                                                                                      Jan 14, 2022 10:52:04.489005089 CET80804975969.16.218.101192.168.2.5
                                                                                      Jan 14, 2022 10:52:04.489027977 CET80804975969.16.218.101192.168.2.5
                                                                                      Jan 14, 2022 10:52:04.489170074 CET497598080192.168.2.569.16.218.101
                                                                                      Jan 14, 2022 10:52:04.489233017 CET497598080192.168.2.569.16.218.101
                                                                                      Jan 14, 2022 10:53:46.642934084 CET497598080192.168.2.569.16.218.101
                                                                                      Jan 14, 2022 10:53:46.642968893 CET497598080192.168.2.569.16.218.101

                                                                                      Code Manipulations

                                                                                      Statistics

                                                                                      Behavior

                                                                                      Click to jump to process

                                                                                      System Behavior

                                                                                      General

                                                                                      Start time:10:51:37
                                                                                      Start date:14/01/2022
                                                                                      Path:C:\Windows\System32\loaddll32.exe
                                                                                      Wow64 process (32bit):true
                                                                                      Commandline:loaddll32.exe "C:\Users\user\Desktop\M2hsMd9hTq.dll"
                                                                                      Imagebase:0xe10000
                                                                                      File size:116736 bytes
                                                                                      MD5 hash:7DEB5DB86C0AC789123DEC286286B938
                                                                                      Has elevated privileges:true
                                                                                      Has administrator privileges:true
                                                                                      Programmed in:C, C++ or other language
                                                                                      Reputation:moderate

                                                                                      General

                                                                                      Start time:10:51:37
                                                                                      Start date:14/01/2022
                                                                                      Path:C:\Windows\SysWOW64\cmd.exe
                                                                                      Wow64 process (32bit):true
                                                                                      Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\M2hsMd9hTq.dll",#1
                                                                                      Imagebase:0x150000
                                                                                      File size:232960 bytes
                                                                                      MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                                                                                      Has elevated privileges:true
                                                                                      Has administrator privileges:true
                                                                                      Programmed in:C, C++ or other language
                                                                                      Reputation:high

                                                                                      General

                                                                                      Start time:10:51:38
                                                                                      Start date:14/01/2022
                                                                                      Path:C:\Windows\SysWOW64\regsvr32.exe
                                                                                      Wow64 process (32bit):true
                                                                                      Commandline:regsvr32.exe /s C:\Users\user\Desktop\M2hsMd9hTq.dll
                                                                                      Imagebase:0x200000
                                                                                      File size:20992 bytes
                                                                                      MD5 hash:426E7499F6A7346F0410DEAD0805586B
                                                                                      Has elevated privileges:true
                                                                                      Has administrator privileges:true
                                                                                      Programmed in:C, C++ or other language
                                                                                      Yara matches:
                                                                                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000003.00000002.247153008.00000000026D0000.00000040.00000001.sdmp, Author: Joe Security
                                                                                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000003.00000002.247650152.00000000040D1000.00000020.00000001.sdmp, Author: Joe Security
                                                                                      Reputation:high

                                                                                      General

                                                                                      Start time:10:51:38
                                                                                      Start date:14/01/2022
                                                                                      Path:C:\Windows\SysWOW64\rundll32.exe
                                                                                      Wow64 process (32bit):true
                                                                                      Commandline:rundll32.exe "C:\Users\user\Desktop\M2hsMd9hTq.dll",#1
                                                                                      Imagebase:0x280000
                                                                                      File size:61952 bytes
                                                                                      MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                                                                                      Has elevated privileges:true
                                                                                      Has administrator privileges:true
                                                                                      Programmed in:C, C++ or other language
                                                                                      Yara matches:
                                                                                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000004.00000002.247708165.0000000004ED0000.00000040.00000001.sdmp, Author: Joe Security
                                                                                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000004.00000002.247759843.0000000005001000.00000020.00000001.sdmp, Author: Joe Security
                                                                                      Reputation:high

                                                                                      General

                                                                                      Start time:10:51:38
                                                                                      Start date:14/01/2022
                                                                                      Path:C:\Windows\SysWOW64\rundll32.exe
                                                                                      Wow64 process (32bit):true
                                                                                      Commandline:rundll32.exe C:\Users\user\Desktop\M2hsMd9hTq.dll,DllRegisterServer
                                                                                      Imagebase:0x280000
                                                                                      File size:61952 bytes
                                                                                      MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                                                                                      Has elevated privileges:true
                                                                                      Has administrator privileges:true
                                                                                      Programmed in:C, C++ or other language
                                                                                      Yara matches:
                                                                                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000005.00000002.251269260.0000000004DB1000.00000020.00000001.sdmp, Author: Joe Security
                                                                                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000005.00000002.251317536.0000000004E60000.00000040.00000001.sdmp, Author: Joe Security
                                                                                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000005.00000002.251018853.0000000004851000.00000020.00000001.sdmp, Author: Joe Security
                                                                                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000005.00000002.251440561.0000000004FC0000.00000040.00000001.sdmp, Author: Joe Security
                                                                                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000005.00000002.250842742.0000000003070000.00000040.00000001.sdmp, Author: Joe Security
                                                                                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000005.00000002.251474105.0000000004FF1000.00000020.00000001.sdmp, Author: Joe Security
                                                                                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000005.00000002.251540171.0000000005051000.00000020.00000001.sdmp, Author: Joe Security
                                                                                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000005.00000002.251612529.00000000051D1000.00000020.00000001.sdmp, Author: Joe Security
                                                                                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000005.00000002.251214045.0000000004D60000.00000040.00000001.sdmp, Author: Joe Security
                                                                                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000005.00000002.251508844.0000000005020000.00000040.00000001.sdmp, Author: Joe Security
                                                                                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000005.00000002.251355041.0000000004E91000.00000020.00000001.sdmp, Author: Joe Security
                                                                                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000005.00000002.251578591.00000000051A0000.00000040.00000001.sdmp, Author: Joe Security
                                                                                      Reputation:high

                                                                                      General

                                                                                      Start time:10:51:39
                                                                                      Start date:14/01/2022
                                                                                      Path:C:\Windows\SysWOW64\rundll32.exe
                                                                                      Wow64 process (32bit):true
                                                                                      Commandline:C:\Windows\SysWOW64\rundll32.exe "C:\Users\user\Desktop\M2hsMd9hTq.dll",DllRegisterServer
                                                                                      Imagebase:0x280000
                                                                                      File size:61952 bytes
                                                                                      MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                                                                                      Has elevated privileges:true
                                                                                      Has administrator privileges:true
                                                                                      Programmed in:C, C++ or other language
                                                                                      Reputation:high

                                                                                      General

                                                                                      Start time:10:51:39
                                                                                      Start date:14/01/2022
                                                                                      Path:C:\Windows\SysWOW64\rundll32.exe
                                                                                      Wow64 process (32bit):true
                                                                                      Commandline:C:\Windows\SysWOW64\rundll32.exe "C:\Users\user\Desktop\M2hsMd9hTq.dll",DllRegisterServer
                                                                                      Imagebase:0x7ff797770000
                                                                                      File size:61952 bytes
                                                                                      MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                                                                                      Has elevated privileges:true
                                                                                      Has administrator privileges:true
                                                                                      Programmed in:C, C++ or other language
                                                                                      Yara matches:
                                                                                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000008.00000002.250801502.0000000004CC0000.00000040.00000001.sdmp, Author: Joe Security
                                                                                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000008.00000002.251543763.0000000005450000.00000040.00000001.sdmp, Author: Joe Security
                                                                                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000008.00000002.251348106.0000000005341000.00000020.00000001.sdmp, Author: Joe Security
                                                                                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000008.00000002.251435374.00000000053F0000.00000040.00000001.sdmp, Author: Joe Security
                                                                                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000008.00000002.251287174.0000000005310000.00000040.00000001.sdmp, Author: Joe Security
                                                                                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000008.00000002.251607526.0000000005481000.00000020.00000001.sdmp, Author: Joe Security
                                                                                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000008.00000002.250952211.0000000004DF1000.00000020.00000001.sdmp, Author: Joe Security
                                                                                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000008.00000002.251487303.0000000005421000.00000020.00000001.sdmp, Author: Joe Security
                                                                                      Reputation:high

                                                                                      General

                                                                                      Start time:10:51:42
                                                                                      Start date:14/01/2022
                                                                                      Path:C:\Windows\SysWOW64\rundll32.exe
                                                                                      Wow64 process (32bit):true
                                                                                      Commandline:C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Zxfif\dcctxlgarqbqh.hrz",JFJwcZZNDUCWxQ
                                                                                      Imagebase:0x280000
                                                                                      File size:61952 bytes
                                                                                      MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                                                                                      Has elevated privileges:true
                                                                                      Has administrator privileges:true
                                                                                      Programmed in:C, C++ or other language
                                                                                      Yara matches:
                                                                                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000009.00000002.254580749.0000000002791000.00000020.00000001.sdmp, Author: Joe Security
                                                                                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000009.00000002.254179155.00000000023D0000.00000040.00000001.sdmp, Author: Joe Security
                                                                                      Reputation:high

                                                                                      General

                                                                                      Start time:10:51:43
                                                                                      Start date:14/01/2022
                                                                                      Path:C:\Windows\SysWOW64\rundll32.exe
                                                                                      Wow64 process (32bit):true
                                                                                      Commandline:C:\Windows\SysWOW64\rundll32.exe "C:\Windows\System32\Zxfif\dcctxlgarqbqh.hrz",DllRegisterServer
                                                                                      Imagebase:0x280000
                                                                                      File size:61952 bytes
                                                                                      MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                                                                                      Has elevated privileges:true
                                                                                      Has administrator privileges:true
                                                                                      Programmed in:C, C++ or other language
                                                                                      Yara matches:
                                                                                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000A.00000002.764384798.0000000005D70000.00000040.00000001.sdmp, Author: Joe Security
                                                                                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000A.00000002.764593172.0000000005FD0000.00000040.00000001.sdmp, Author: Joe Security
                                                                                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000A.00000002.763160491.00000000054F0000.00000040.00000001.sdmp, Author: Joe Security
                                                                                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000A.00000002.763467558.0000000005790000.00000040.00000001.sdmp, Author: Joe Security
                                                                                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000A.00000002.764153228.0000000005C70000.00000040.00000001.sdmp, Author: Joe Security
                                                                                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000A.00000002.763888533.0000000005AA1000.00000020.00000001.sdmp, Author: Joe Security
                                                                                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000A.00000002.763578627.0000000005870000.00000040.00000001.sdmp, Author: Joe Security
                                                                                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000A.00000002.763623141.00000000058A1000.00000020.00000001.sdmp, Author: Joe Security
                                                                                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000A.00000002.761812038.0000000003361000.00000020.00000010.sdmp, Author: Joe Security
                                                                                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000A.00000002.763204211.0000000005521000.00000020.00000001.sdmp, Author: Joe Security
                                                                                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000A.00000002.763293110.0000000005601000.00000020.00000001.sdmp, Author: Joe Security
                                                                                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000A.00000002.762842466.00000000036E1000.00000020.00000001.sdmp, Author: Joe Security
                                                                                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000A.00000002.764675936.0000000006001000.00000020.00000001.sdmp, Author: Joe Security
                                                                                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000A.00000002.764435934.0000000005DA1000.00000020.00000001.sdmp, Author: Joe Security
                                                                                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000A.00000002.763511347.00000000057C1000.00000020.00000001.sdmp, Author: Joe Security
                                                                                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000A.00000002.763831341.0000000005A70000.00000040.00000001.sdmp, Author: Joe Security
                                                                                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000A.00000002.764277951.0000000005CA1000.00000020.00000001.sdmp, Author: Joe Security
                                                                                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000A.00000002.761623893.0000000003330000.00000040.00000010.sdmp, Author: Joe Security
                                                                                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000A.00000002.763416711.0000000005761000.00000020.00000001.sdmp, Author: Joe Security
                                                                                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000A.00000002.762037427.0000000003480000.00000040.00000001.sdmp, Author: Joe Security
                                                                                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000A.00000002.763764045.00000000059C1000.00000020.00000001.sdmp, Author: Joe Security
                                                                                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000A.00000002.763708229.0000000005990000.00000040.00000001.sdmp, Author: Joe Security
                                                                                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000A.00000002.763252082.00000000055D0000.00000040.00000001.sdmp, Author: Joe Security
                                                                                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000A.00000002.763375282.0000000005730000.00000040.00000001.sdmp, Author: Joe Security
                                                                                      Reputation:high

                                                                                      General

                                                                                      Start time:10:51:47
                                                                                      Start date:14/01/2022
                                                                                      Path:C:\Windows\System32\svchost.exe
                                                                                      Wow64 process (32bit):false
                                                                                      Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
                                                                                      Imagebase:0x7ff797770000
                                                                                      File size:51288 bytes
                                                                                      MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                                      Has elevated privileges:true
                                                                                      Has administrator privileges:true
                                                                                      Programmed in:C, C++ or other language
                                                                                      Reputation:high

                                                                                      General

                                                                                      Start time:10:51:56
                                                                                      Start date:14/01/2022
                                                                                      Path:C:\Windows\System32\svchost.exe
                                                                                      Wow64 process (32bit):false
                                                                                      Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p
                                                                                      Imagebase:0x7ff797770000
                                                                                      File size:51288 bytes
                                                                                      MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                                      Has elevated privileges:true
                                                                                      Has administrator privileges:true
                                                                                      Programmed in:C, C++ or other language
                                                                                      Reputation:high

                                                                                      General

                                                                                      Start time:10:51:57
                                                                                      Start date:14/01/2022
                                                                                      Path:C:\Windows\System32\svchost.exe
                                                                                      Wow64 process (32bit):false
                                                                                      Commandline:c:\windows\system32\svchost.exe -k localservice -p -s CDPSvc
                                                                                      Imagebase:0x7ff797770000
                                                                                      File size:51288 bytes
                                                                                      MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                                      Has elevated privileges:true
                                                                                      Has administrator privileges:false
                                                                                      Programmed in:C, C++ or other language

                                                                                      General

                                                                                      Start time:10:51:58
                                                                                      Start date:14/01/2022
                                                                                      Path:C:\Windows\System32\svchost.exe
                                                                                      Wow64 process (32bit):false
                                                                                      Commandline:c:\windows\system32\svchost.exe -k networkservice -p -s DoSvc
                                                                                      Imagebase:0x7ff797770000
                                                                                      File size:51288 bytes
                                                                                      MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                                      Has elevated privileges:true
                                                                                      Has administrator privileges:false
                                                                                      Programmed in:C, C++ or other language

                                                                                      General

                                                                                      Start time:10:51:59
                                                                                      Start date:14/01/2022
                                                                                      Path:C:\Windows\System32\svchost.exe
                                                                                      Wow64 process (32bit):false
                                                                                      Commandline:C:\Windows\System32\svchost.exe -k NetworkService -p
                                                                                      Imagebase:0x7ff797770000
                                                                                      File size:51288 bytes
                                                                                      MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                                      Has elevated privileges:true
                                                                                      Has administrator privileges:false
                                                                                      Programmed in:C, C++ or other language

                                                                                      General

                                                                                      Start time:10:52:00
                                                                                      Start date:14/01/2022
                                                                                      Path:C:\Windows\System32\SgrmBroker.exe
                                                                                      Wow64 process (32bit):false
                                                                                      Commandline:C:\Windows\system32\SgrmBroker.exe
                                                                                      Imagebase:0x7ff7c5e70000
                                                                                      File size:163336 bytes
                                                                                      MD5 hash:D3170A3F3A9626597EEE1888686E3EA6
                                                                                      Has elevated privileges:true
                                                                                      Has administrator privileges:true
                                                                                      Programmed in:C, C++ or other language

                                                                                      General

                                                                                      Start time:10:52:00
                                                                                      Start date:14/01/2022
                                                                                      Path:C:\Windows\System32\svchost.exe
                                                                                      Wow64 process (32bit):false
                                                                                      Commandline:c:\windows\system32\svchost.exe -k localservicenetworkrestricted -p -s wscsvc
                                                                                      Imagebase:0x7ff797770000
                                                                                      File size:51288 bytes
                                                                                      MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                                      Has elevated privileges:true
                                                                                      Has administrator privileges:false
                                                                                      Programmed in:C, C++ or other language

                                                                                      General

                                                                                      Start time:10:52:05
                                                                                      Start date:14/01/2022
                                                                                      Path:C:\Windows\System32\svchost.exe
                                                                                      Wow64 process (32bit):false
                                                                                      Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p
                                                                                      Imagebase:0x7ff797770000
                                                                                      File size:51288 bytes
                                                                                      MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                                      Has elevated privileges:true
                                                                                      Has administrator privileges:true
                                                                                      Programmed in:C, C++ or other language

                                                                                      General

                                                                                      Start time:10:52:22
                                                                                      Start date:14/01/2022
                                                                                      Path:C:\Windows\System32\svchost.exe
                                                                                      Wow64 process (32bit):false
                                                                                      Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p
                                                                                      Imagebase:0x7ff797770000
                                                                                      File size:51288 bytes
                                                                                      MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                                      Has elevated privileges:true
                                                                                      Has administrator privileges:true
                                                                                      Programmed in:C, C++ or other language

                                                                                      General

                                                                                      Start time:10:53:01
                                                                                      Start date:14/01/2022
                                                                                      Path:C:\Program Files\Windows Defender\MpCmdRun.exe
                                                                                      Wow64 process (32bit):false
                                                                                      Commandline:"C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable
                                                                                      Imagebase:0x7ff6dbfe0000
                                                                                      File size:455656 bytes
                                                                                      MD5 hash:A267555174BFA53844371226F482B86B
                                                                                      Has elevated privileges:true
                                                                                      Has administrator privileges:false
                                                                                      Programmed in:C, C++ or other language

                                                                                      General

                                                                                      Start time:10:53:01
                                                                                      Start date:14/01/2022
                                                                                      Path:C:\Windows\System32\conhost.exe
                                                                                      Wow64 process (32bit):false
                                                                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                      Imagebase:0x7ff7ecfc0000
                                                                                      File size:625664 bytes
                                                                                      MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                                      Has elevated privileges:true
                                                                                      Has administrator privileges:false
                                                                                      Programmed in:C, C++ or other language

                                                                                      General

                                                                                      Start time:10:54:09
                                                                                      Start date:14/01/2022
                                                                                      Path:C:\Windows\System32\svchost.exe
                                                                                      Wow64 process (32bit):false
                                                                                      Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p
                                                                                      Imagebase:0x7ff797770000
                                                                                      File size:51288 bytes
                                                                                      MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                                      Has elevated privileges:true
                                                                                      Has administrator privileges:true
                                                                                      Programmed in:C, C++ or other language

                                                                                      General

                                                                                      Start time:10:54:27
                                                                                      Start date:14/01/2022
                                                                                      Path:C:\Windows\System32\svchost.exe
                                                                                      Wow64 process (32bit):false
                                                                                      Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p
                                                                                      Imagebase:0x7ff797770000
                                                                                      File size:51288 bytes
                                                                                      MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                                      Has elevated privileges:true
                                                                                      Has administrator privileges:true
                                                                                      Programmed in:C, C++ or other language

                                                                                      Disassembly

                                                                                      Code Analysis

                                                                                      Reset < >