Loading ...

Play interactive tourEdit tour

Windows Analysis Report 7MhGa3iotM

Overview

General Information

Sample Name:7MhGa3iotM (renamed file extension from none to dll)
Analysis ID:553129
MD5:752a2613b2b71fc1b99eb611024cc312
SHA1:7d59cf93d7b7644119b4f2b3742a40f9960c7ca5
SHA256:2df1bd696a635b1dd0c2aec6a20b12148ccc17023be88a6fa1701896a99e2db0
Tags:32dllexetrojan
Infos:

Most interesting Screenshot:

Detection

Emotet
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Multi AV Scanner detection for submitted file
Yara detected Emotet
System process connects to network (likely due to code injection or exploit)
Changes security center settings (notifications, updates, antivirus, firewall)
Machine Learning detection for sample
Sigma detected: Suspicious Call by Ordinal
C2 URLs / IPs found in malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query locales information (e.g. system language)
Deletes files inside the Windows folder
May sleep (evasive loops) to hinder dynamic analysis
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Uses code obfuscation techniques (call, push, ret)
Creates files inside the system directory
Internet Provider seen in connection with other malware
Detected potential crypto function
Contains functionality to query CPU information (cpuid)
Found potential string decryption / allocating functions
Sample execution stops while process was sleeping (likely an evasion)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to dynamically determine API calls
Contains functionality which may be used to detect a debugger (GetProcessHeap)
IP address seen in connection with other malware
Creates a DirectInput object (often for capturing keystrokes)
AV process strings found (often used to terminate AV products)
Sample file is different than original file name gathered from version info
PE file contains an invalid checksum
PE file contains strange resources
Tries to load missing DLLs
Contains functionality to read the PEB
Drops PE files to the windows directory (C:\Windows)
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Detected TCP or UDP traffic on non-standard ports
Checks if the current process is being debugged
Connects to several IPs in different countries
Potential key logger detected (key state polling based)
Registers a DLL
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Found large amount of non-executed APIs
Creates a process in suspended mode (likely to inject code)

Classification

Process Tree

  • System is w10x64
  • SgrmBroker.exe (PID: 7124 cmdline: C:\Windows\system32\SgrmBroker.exe MD5: D3170A3F3A9626597EEE1888686E3EA6)
  • svchost.exe (PID: 7152 cmdline: c:\windows\system32\svchost.exe -k unistacksvcgroup MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • loaddll32.exe (PID: 6180 cmdline: loaddll32.exe "C:\Users\user\Desktop\7MhGa3iotM.dll" MD5: 7DEB5DB86C0AC789123DEC286286B938)
    • cmd.exe (PID: 1496 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\7MhGa3iotM.dll",#1 MD5: F3BDBE3BB6F734E357235F4D5898582D)
      • rundll32.exe (PID: 5732 cmdline: rundll32.exe "C:\Users\user\Desktop\7MhGa3iotM.dll",#1 MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
        • rundll32.exe (PID: 3360 cmdline: C:\Windows\SysWOW64\rundll32.exe "C:\Users\user\Desktop\7MhGa3iotM.dll",DllRegisterServer MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
    • regsvr32.exe (PID: 3348 cmdline: regsvr32.exe /s C:\Users\user\Desktop\7MhGa3iotM.dll MD5: 426E7499F6A7346F0410DEAD0805586B)
      • rundll32.exe (PID: 5388 cmdline: C:\Windows\SysWOW64\rundll32.exe "C:\Users\user\Desktop\7MhGa3iotM.dll",DllRegisterServer MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
    • rundll32.exe (PID: 6388 cmdline: rundll32.exe C:\Users\user\Desktop\7MhGa3iotM.dll,DllRegisterServer MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
      • rundll32.exe (PID: 2172 cmdline: C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Kgiezrb\edgitxrppqaf.tym",JFlwYpDQ MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
        • rundll32.exe (PID: 6512 cmdline: C:\Windows\SysWOW64\rundll32.exe "C:\Windows\System32\Kgiezrb\edgitxrppqaf.tym",DllRegisterServer MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
  • svchost.exe (PID: 5808 cmdline: c:\windows\system32\svchost.exe -k localservicenetworkrestricted -p -s wscsvc MD5: 32569E403279B3FD2EDB7EBD036273FA)
    • MpCmdRun.exe (PID: 6456 cmdline: "C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable MD5: A267555174BFA53844371226F482B86B)
      • conhost.exe (PID: 5952 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • svchost.exe (PID: 3396 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 6640 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 1496 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 1460 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • cleanup

Malware Configuration

Threatname: Emotet

{"C2 list": ["45.138.98.34:80", "69.16.218.101:8080", "51.210.242.234:8080", "185.148.168.220:8080", "142.4.219.173:8080", "54.38.242.185:443", "191.252.103.16:80", "104.131.62.48:8080", "62.171.178.147:8080", "217.182.143.207:443", "168.197.250.14:80", "37.44.244.177:8080", "66.42.57.149:443", "210.57.209.142:8080", "159.69.237.188:443", "116.124.128.206:8080", "128.199.192.135:8080", "195.154.146.35:443", "185.148.168.15:8080", "195.77.239.39:8080", "207.148.81.119:8080", "85.214.67.203:8080", "190.90.233.66:443", "78.46.73.125:443", "78.47.204.80:443", "37.59.209.141:8080", "54.37.228.122:443"], "Public Key": ["RUNLMSAAAADYNZPXY4tQxd/N4Wn5sTYAm5tUOxY2ol1ELrI4MNhHNi640vSLasjYTHpFRBoG+o84vtr7AJachCzOHjaAJFCW", "RUNTMSAAAAD0LxqDNhonUYwk8sqo7IWuUllRdUiUBnACc6romsQoe1YJD7wIe4AheqYofpZFucPDXCZ0z9i+ooUffqeoLZU0"]}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000008.00000002.298606993.00000000056B0000.00000040.00000001.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
    00000005.00000002.294428773.0000000004E31000.00000020.00000001.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
      0000000D.00000002.815959143.0000000004E91000.00000020.00000001.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
        00000008.00000002.298670924.00000000056E1000.00000020.00000001.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
          0000000D.00000002.816961696.00000000050F1000.00000020.00000001.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
            Click to see the 43 entries

            Unpacked PEs

            SourceRuleDescriptionAuthorStrings
            13.2.rundll32.exe.53a0000.18.raw.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
              13.2.rundll32.exe.4ec0000.10.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
                8.2.rundll32.exe.54f0000.6.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
                  13.2.rundll32.exe.2d50000.0.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
                    13.2.rundll32.exe.4ef0000.11.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
                      Click to see the 67 entries

                      Sigma Overview

                      System Summary:

                      barindex
                      Sigma detected: Suspicious Call by OrdinalShow sources
                      Source: Process startedAuthor: Florian Roth: Data: Command: rundll32.exe "C:\Users\user\Desktop\7MhGa3iotM.dll",#1, CommandLine: rundll32.exe "C:\Users\user\Desktop\7MhGa3iotM.dll",#1, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\rundll32.exe, NewProcessName: C:\Windows\SysWOW64\rundll32.exe, OriginalFileName: C:\Windows\SysWOW64\rundll32.exe, ParentCommandLine: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\7MhGa3iotM.dll",#1, ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 1496, ProcessCommandLine: rundll32.exe "C:\Users\user\Desktop\7MhGa3iotM.dll",#1, ProcessId: 5732

                      Jbx Signature Overview

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection:

                      barindex
                      Found malware configurationShow sources
                      Source: 13.2.rundll32.exe.4fa0000.12.raw.unpackMalware Configuration Extractor: Emotet {"C2 list": ["45.138.98.34:80", "69.16.218.101:8080", "51.210.242.234:8080", "185.148.168.220:8080", "142.4.219.173:8080", "54.38.242.185:443", "191.252.103.16:80", "104.131.62.48:8080", "62.171.178.147:8080", "217.182.143.207:443", "168.197.250.14:80", "37.44.244.177:8080", "66.42.57.149:443", "210.57.209.142:8080", "159.69.237.188:443", "116.124.128.206:8080", "128.199.192.135:8080", "195.154.146.35:443", "185.148.168.15:8080", "195.77.239.39:8080", "207.148.81.119:8080", "85.214.67.203:8080", "190.90.233.66:443", "78.46.73.125:443", "78.47.204.80:443", "37.59.209.141:8080", "54.37.228.122:443"], "Public Key": ["RUNLMSAAAADYNZPXY4tQxd/N4Wn5sTYAm5tUOxY2ol1ELrI4MNhHNi640vSLasjYTHpFRBoG+o84vtr7AJachCzOHjaAJFCW", "RUNTMSAAAAD0LxqDNhonUYwk8sqo7IWuUllRdUiUBnACc6romsQoe1YJD7wIe4AheqYofpZFucPDXCZ0z9i+ooUffqeoLZU0"]}
                      Multi AV Scanner detection for submitted fileShow sources
                      Source: 7MhGa3iotM.dllVirustotal: Detection: 29%Perma Link
                      Source: 7MhGa3iotM.dllReversingLabs: Detection: 41%
                      Machine Learning detection for sampleShow sources
                      Source: 7MhGa3iotM.dllJoe Sandbox ML: detected
                      Source: 7MhGa3iotM.dllStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE, DLL

                      Networking:

                      barindex
                      Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)Show sources
                      Source: TrafficSnort IDS: 2404332 ET CNC Feodo Tracker Reported CnC Server TCP group 17 192.168.2.3:49746 -> 45.138.98.34:80
                      Source: TrafficSnort IDS: 2404338 ET CNC Feodo Tracker Reported CnC Server TCP group 20 192.168.2.3:49747 -> 69.16.218.101:8080
                      System process connects to network (likely due to code injection or exploit)Show sources
                      Source: C:\Windows\SysWOW64\rundll32.exeNetwork Connect: 69.16.218.101 144
                      Source: C:\Windows\SysWOW64\rundll32.exeNetwork Connect: 45.138.98.34 80
                      C2 URLs / IPs found in malware configurationShow sources
                      Source: Malware configuration extractorIPs: 45.138.98.34:80
                      Source: Malware configuration extractorIPs: 69.16.218.101:8080
                      Source: Malware configuration extractorIPs: 51.210.242.234:8080
                      Source: Malware configuration extractorIPs: 185.148.168.220:8080
                      Source: Malware configuration extractorIPs: 142.4.219.173:8080
                      Source: Malware configuration extractorIPs: 54.38.242.185:443
                      Source: Malware configuration extractorIPs: 191.252.103.16:80
                      Source: Malware configuration extractorIPs: 104.131.62.48:8080
                      Source: Malware configuration extractorIPs: 62.171.178.147:8080
                      Source: Malware configuration extractorIPs: 217.182.143.207:443
                      Source: Malware configuration extractorIPs: 168.197.250.14:80
                      Source: Malware configuration extractorIPs: 37.44.244.177:8080
                      Source: Malware configuration extractorIPs: 66.42.57.149:443
                      Source: Malware configuration extractorIPs: 210.57.209.142:8080
                      Source: Malware configuration extractorIPs: 159.69.237.188:443
                      Source: Malware configuration extractorIPs: 116.124.128.206:8080
                      Source: Malware configuration extractorIPs: 128.199.192.135:8080
                      Source: Malware configuration extractorIPs: 195.154.146.35:443
                      Source: Malware configuration extractorIPs: 185.148.168.15:8080
                      Source: Malware configuration extractorIPs: 195.77.239.39:8080
                      Source: Malware configuration extractorIPs: 207.148.81.119:8080
                      Source: Malware configuration extractorIPs: 85.214.67.203:8080
                      Source: Malware configuration extractorIPs: 190.90.233.66:443
                      Source: Malware configuration extractorIPs: 78.46.73.125:443
                      Source: Malware configuration extractorIPs: 78.47.204.80:443
                      Source: Malware configuration extractorIPs: 37.59.209.141:8080
                      Source: Malware configuration extractorIPs: 54.37.228.122:443
                      Source: Joe Sandbox ViewASN Name: AS-CHOOPAUS AS-CHOOPAUS
                      Source: Joe Sandbox ViewASN Name: DIGITALOCEAN-ASNUS DIGITALOCEAN-ASNUS
                      Source: Joe Sandbox ViewIP Address: 207.148.81.119 207.148.81.119
                      Source: Joe Sandbox ViewIP Address: 104.131.62.48 104.131.62.48
                      Source: global trafficTCP traffic: 192.168.2.3:49747 -> 69.16.218.101:8080
                      Source: unknownNetwork traffic detected: IP country count 12
                      Source: unknownTCP traffic detected without corresponding DNS query: 45.138.98.34
                      Source: unknownTCP traffic detected without corresponding DNS query: 45.138.98.34
                      Source: unknownTCP traffic detected without corresponding DNS query: 45.138.98.34
                      Source: unknownTCP traffic detected without corresponding DNS query: 69.16.218.101
                      Source: unknownTCP traffic detected without corresponding DNS query: 69.16.218.101
                      Source: unknownTCP traffic detected without corresponding DNS query: 69.16.218.101
                      Source: unknownTCP traffic detected without corresponding DNS query: 69.16.218.101
                      Source: unknownTCP traffic detected without corresponding DNS query: 69.16.218.101
                      Source: unknownTCP traffic detected without corresponding DNS query: 69.16.218.101
                      Source: unknownTCP traffic detected without corresponding DNS query: 69.16.218.101
                      Source: unknownTCP traffic detected without corresponding DNS query: 69.16.218.101
                      Source: unknownTCP traffic detected without corresponding DNS query: 69.16.218.101
                      Source: unknownTCP traffic detected without corresponding DNS query: 69.16.218.101
                      Source: unknownTCP traffic detected without corresponding DNS query: 69.16.218.101
                      Source: unknownTCP traffic detected without corresponding DNS query: 69.16.218.101
                      Source: unknownTCP traffic detected without corresponding DNS query: 69.16.218.101
                      Source: unknownTCP traffic detected without corresponding DNS query: 69.16.218.101
                      Source: svchost.exe, 00000014.00000003.394252617.000001B9FBF8C000.00000004.00000001.sdmpString found in binary or memory: Try it free for 30 days, no strings attached\r\n\r\nLike us on Facebook: http://www.facebook.com/spotify \r\nFollow us on Twitter: http://twitter.com/spotify","ProductTitle":"Spotify - Music and Podcasts","SearchTitles":[{"SearchTitleString":"Spotify","SearchTitleType":"SearchHint"},{"SearchTitleString":"Music","SearchTitleType":"SearchHint"},{"SearchTitleString":"music apps","SearchTitleType":"SearchHint"},{"SearchTitleString":"free music","SearchTitleType":"SearchHint"},{"SearchTitleString":"podcasts","SearchTitleType":"SearchHint"},{"SearchTitleString":"streaming","SearchTitleType":"SearchHint"},{"SearchTitleString":"soundcloud","SearchTitleType":"SearchHint"}],"Language":"en-us","Markets":["US","DZ","AR","AU","AT","BH","BD","BE","BR","BG","CA","CL","CN","CO","CR","HR","CY","CZ","DK","EG","EE","FI","FR","DE","GR","GT","HK","HU","IS","IN","ID","IQ","IE","IL","IT","JP","JO","KZ","KE","KW","LV","LB","LI","LT","LU","MY","MT","MR","MX","MA","NL","NZ","NG","N equals www.facebook.com (Facebook)
                      Source: svchost.exe, 00000014.00000003.394252617.000001B9FBF8C000.00000004.00000001.sdmpString found in binary or memory: Try it free for 30 days, no strings attached\r\n\r\nLike us on Facebook: http://www.facebook.com/spotify \r\nFollow us on Twitter: http://twitter.com/spotify","ProductTitle":"Spotify - Music and Podcasts","SearchTitles":[{"SearchTitleString":"Spotify","SearchTitleType":"SearchHint"},{"SearchTitleString":"Music","SearchTitleType":"SearchHint"},{"SearchTitleString":"music apps","SearchTitleType":"SearchHint"},{"SearchTitleString":"free music","SearchTitleType":"SearchHint"},{"SearchTitleString":"podcasts","SearchTitleType":"SearchHint"},{"SearchTitleString":"streaming","SearchTitleType":"SearchHint"},{"SearchTitleString":"soundcloud","SearchTitleType":"SearchHint"}],"Language":"en-us","Markets":["US","DZ","AR","AU","AT","BH","BD","BE","BR","BG","CA","CL","CN","CO","CR","HR","CY","CZ","DK","EG","EE","FI","FR","DE","GR","GT","HK","HU","IS","IN","ID","IQ","IE","IL","IT","JP","JO","KZ","KE","KW","LV","LB","LI","LT","LU","MY","MT","MR","MX","MA","NL","NZ","NG","N equals www.twitter.com (Twitter)
                      Source: svchost.exe, 00000014.00000003.394269231.000001B9FBF9D000.00000004.00000001.sdmp, svchost.exe, 00000014.00000003.394252617.000001B9FBF8C000.00000004.00000001.sdmpString found in binary or memory: Try it free for 30 days, no strings attached\r\n\r\nLike us on Facebook: http://www.facebook.com/spotify \r\nFollow us on Twitter: http://twitter.com/spotify","ProductTitle":"Spotify - Music and Podcasts","SearchTitles":[{"SearchTitleString":"Spotify","SearchTitleType":"SearchHint"},{"SearchTitleString":"Music","SearchTitleType":"SearchHint"},{"SearchTitleString":"music apps","SearchTitleType":"SearchHint"},{"SearchTitleString":"free music","SearchTitleType":"SearchHint"},{"SearchTitleString":"podcasts","SearchTitleType":"SearchHint"},{"SearchTitleString":"streaming","SearchTitleType":"SearchHint"},{"SearchTitleString":"soundcloud","SearchTitleType":"SearchHint"}],"Language":"en-us","Markets":["US","DZ","AR","AU","AT","BH","BD","BE","BR","BG","CA","CL","CN","CO","CR","HR","CY","CZ","DK","EG","EE","FI","FR","DE","GR","GT","HK","HU","IS","IN","ID","IQ","IE","IL","IT","JP","JO","KZ","KE","KW","LV","LB","LI","LT","LU","MY","MT","MR","MX","MA","NL","NZ","NG","NO","OM","PK","PE","PH","PL","PT","QA","RO","RU","SA","RS","SG","SK","SI","ZA","KR","ES","SE","CH","TW","TH","TT","TN","TR","UA","AE","GB","VN","YE","LY","LK","UY","VE","AF","AX","AL","AS","AO","AI","AQ","AG","AM","AW","BO","BQ","BA","BW","BV","IO","BN","BF","BI","KH","CM","CV","KY","CF","TD","TL","DJ","DM","DO","EC","SV","GQ","ER","ET","FK","FO","FJ","GF","PF","TF","GA","GM","GE","GH","GI","GL","GD","GP","GU","GG","GN","GW","GY","HT","HM","HN","AZ","BS","BB","BY","BZ","BJ","BM","BT","KM","CG","CD","CK","CX","CC","CI","CW","JM","SJ","JE","KI","KG","LA","LS","LR","MO","MK","MG","MW","IM","MH","MQ","MU","YT","FM","MD","MN","MS","MZ","MM","NA","NR","NP","MV","ML","NC","NI","NE","NU","NF","PW","PS","PA","PG","PY","RE","RW","BL","MF","WS","ST","SN","MP","PN","SX","SB","SO","SC","SL","GS","SH","KN","LC","PM","VC","TJ","TZ","TG","TK","TO","TM","TC","TV","UM","UG","VI","VG","WF","EH","ZM","ZW","UZ","VU","SR","SZ","AD","MC","SM","ME","VA","NEUTRAL"]}],"MarketProperties":[{"RelatedProducts":[],"Markets":["US"]}],"ProductASchema":"Product;3","ProductBSchema":"ProductUnifiedApp;3","ProductId":"9NCBCSZSJRSB","Properties":{"PackageFamilyName":"SpotifyAB.SpotifyMusic_zpdnekdrzrea0","PackageIdentityName":"SpotifyAB.SpotifyMusic","PublisherCertificateName":"CN=453637B3-4E12-4CDF-B0D3-2A3C863BF6EF","XboxCrossGenSetId":null,"XboxConsoleGenOptimized":null,"XboxConsoleGenCompatible":null},"AlternateIds":[{"IdType":"LegacyWindowsStoreProductId","Value":"ceac5d3f-8a4f-40e1-9a67-76d9108c7cb5"},{"IdType":"LegacyWindowsPhoneProductId","Value":"caac1b9d-621b-4f96-b143-e10e1397740a"},{"IdType":"XboxTitleId","Value":"1681279293"}],"IngestionSource":"DCE","IsMicrosoftProduct":false,"PreferredSkuId":"0010","ProductType":"Application","ValidationData":{"PassedValidation":false,"RevisionId":"2022-01-07T11:33:20.1626869Z||.||d5cdcec3-04df-404e-ba07-3240047c89f9||1152921505694348672||Null||fullrelease","ValidationResultUri":""},"MerchandizingTags":[],"PartD":"","ProductFamily":"Apps","ProductKind":"Application","DisplaySkuAvailab
                      Source: svchost.exe, 00000014.00000003.394269231.000001B9FBF9D000.00000004.00000001.sdmp, svchost.exe, 00000014.00000003.394252617.000001B9FBF8C000.00000004.00000001.sdmpString found in binary or memory: Try it free for 30 days, no strings attached\r\n\r\nLike us on Facebook: http://www.facebook.com/spotify \r\nFollow us on Twitter: http://twitter.com/spotify","ProductTitle":"Spotify - Music and Podcasts","SearchTitles":[{"SearchTitleString":"Spotify","SearchTitleType":"SearchHint"},{"SearchTitleString":"Music","SearchTitleType":"SearchHint"},{"SearchTitleString":"music apps","SearchTitleType":"SearchHint"},{"SearchTitleString":"free music","SearchTitleType":"SearchHint"},{"SearchTitleString":"podcasts","SearchTitleType":"SearchHint"},{"SearchTitleString":"streaming","SearchTitleType":"SearchHint"},{"SearchTitleString":"soundcloud","SearchTitleType":"SearchHint"}],"Language":"en-us","Markets":["US","DZ","AR","AU","AT","BH","BD","BE","BR","BG","CA","CL","CN","CO","CR","HR","CY","CZ","DK","EG","EE","FI","FR","DE","GR","GT","HK","HU","IS","IN","ID","IQ","IE","IL","IT","JP","JO","KZ","KE","KW","LV","LB","LI","LT","LU","MY","MT","MR","MX","MA","NL","NZ","NG","NO","OM","PK","PE","PH","PL","PT","QA","RO","RU","SA","RS","SG","SK","SI","ZA","KR","ES","SE","CH","TW","TH","TT","TN","TR","UA","AE","GB","VN","YE","LY","LK","UY","VE","AF","AX","AL","AS","AO","AI","AQ","AG","AM","AW","BO","BQ","BA","BW","BV","IO","BN","BF","BI","KH","CM","CV","KY","CF","TD","TL","DJ","DM","DO","EC","SV","GQ","ER","ET","FK","FO","FJ","GF","PF","TF","GA","GM","GE","GH","GI","GL","GD","GP","GU","GG","GN","GW","GY","HT","HM","HN","AZ","BS","BB","BY","BZ","BJ","BM","BT","KM","CG","CD","CK","CX","CC","CI","CW","JM","SJ","JE","KI","KG","LA","LS","LR","MO","MK","MG","MW","IM","MH","MQ","MU","YT","FM","MD","MN","MS","MZ","MM","NA","NR","NP","MV","ML","NC","NI","NE","NU","NF","PW","PS","PA","PG","PY","RE","RW","BL","MF","WS","ST","SN","MP","PN","SX","SB","SO","SC","SL","GS","SH","KN","LC","PM","VC","TJ","TZ","TG","TK","TO","TM","TC","TV","UM","UG","VI","VG","WF","EH","ZM","ZW","UZ","VU","SR","SZ","AD","MC","SM","ME","VA","NEUTRAL"]}],"MarketProperties":[{"RelatedProducts":[],"Markets":["US"]}],"ProductASchema":"Product;3","ProductBSchema":"ProductUnifiedApp;3","ProductId":"9NCBCSZSJRSB","Properties":{"PackageFamilyName":"SpotifyAB.SpotifyMusic_zpdnekdrzrea0","PackageIdentityName":"SpotifyAB.SpotifyMusic","PublisherCertificateName":"CN=453637B3-4E12-4CDF-B0D3-2A3C863BF6EF","XboxCrossGenSetId":null,"XboxConsoleGenOptimized":null,"XboxConsoleGenCompatible":null},"AlternateIds":[{"IdType":"LegacyWindowsStoreProductId","Value":"ceac5d3f-8a4f-40e1-9a67-76d9108c7cb5"},{"IdType":"LegacyWindowsPhoneProductId","Value":"caac1b9d-621b-4f96-b143-e10e1397740a"},{"IdType":"XboxTitleId","Value":"1681279293"}],"IngestionSource":"DCE","IsMicrosoftProduct":false,"PreferredSkuId":"0010","ProductType":"Application","ValidationData":{"PassedValidation":false,"RevisionId":"2022-01-07T11:33:20.1626869Z||.||d5cdcec3-04df-404e-ba07-3240047c89f9||1152921505694348672||Null||fullrelease","ValidationResultUri":""},"MerchandizingTags":[],"PartD":"","ProductFamily":"Apps","ProductKind":"Application","DisplaySkuAvailab
                      Source: svchost.exe, 00000014.00000003.394252617.000001B9FBF8C000.00000004.00000001.sdmpString found in binary or memory: rings attached\r\n\r\nLike us on Facebook: http://www.facebook.com/spotify \r\nFollow us on Twitter: http://twitter.com/spotify","SkuTitle":"Spotify - Music and Podcasts","Language":"en-us","Markets":["US","DZ","AR","AU","AT","BH","BD","BE","BR","BG","CA","CL","CN","CO","CR","HR","CY","CZ","DK","EG","EE","FI","FR","DE","GR","GT","HK","HU","IS","IN","ID","IQ","IE","IL","IT","JP","JO","KZ","KE","KW","LV","LB","LI","LT","LU","MY","MT","MR","MX","MA","NL","NZ","NG","NO","OM","PK","PE","PH","PL","PT","QA","RO","RU","SA","RS","SG","SK","SI","ZA","KR","ES","SE","CH","TW","TH","TT","TN","TR","UA","AE","GB","VN","YE","LY","LK","UY","VE","AF","AX","AL","AS","AO","AI","AQ","AG","AM","AW","BO","BQ","BA","BW","BV","IO","BN","BF","BI","KH","CM","CV","KY","CF","TD","TL","DJ","DM","DO","EC","SV","GQ","ER","ET","FK","FO","FJ","GF","PF","TF","GA","GM","GE","GH","GI","GL","GD","GP","GU","GG","GN","GW","GY","HT","HM","HN","AZ","BS","BB","BY","BZ","BJ","BM","BT","KM","CG","CD","CK","CX","CC","CI","CW","JM","SJ","JE","KI","KG","LA","LS","LR","MO","MK","MG","MW","IM","MH","MQ","MU","YT","FM","MD","MN","MS","MZ","MM","NA","NR","NP","MV","ML","NC","NI","NE","NU","NF","PW","PS","PA","PG","PY","RE","RW","BL","MF","WS","ST","SN","MP","PN","SX","SB","SO","SC","SL","GS","SH","KN","LC","PM","VC","TJ","TZ","TG","TK","TO","TM","TC","TV","UM","UG","VI","VG","WF","EH","ZM","ZW","UZ","VU","SR","SZ","AD","MC","SM","ME","VA","NEUTRAL"]}],"ProductId":"9NCBCSZSJRSB","Properties":{"FulfillmentData":{"ProductId":"9NCBCSZSJRSB","WuCategoryId":"5c353b9c-7ac7-4d27-af07-923e7d9aa2e2","PackageFamilyName":"SpotifyAB.SpotifyMusic_zpdnekdrzrea0","SkuId":"0011"},"FulfillmentType":"WindowsUpdate","FulfillmentPluginId":null,"Packages":[{"Applications":[{"ApplicationId":"Spotify"}],"Architectures":["x86"],"Capabilities":["internetClient","runFullTrust","Microsoft.storeFilter.core.notSupported_8wekyb3d8bbwe"],"ExperienceIds":[],"MaxDownloadSizeInBytes":104380919,"MaxInstallSizeInBytes":203345920,"PackageFormat":"Appx","PackageFamilyName":"SpotifyAB.SpotifyMusic_zpdnekdrzrea0","MainPackageFamilyNameForDlc":null,"PackageFullName":"SpotifyAB.SpotifyMusic_1.176.447.0_x86__zpdnekdrzrea0","PackageId":"3fbafb47-f476-4c26-4445-49acb9a726e6-X86","PackageRank":30001,"PlatformDependencies":[{"MaxTested":2814750754275328,"MinVersion":2814750710366559,"PlatformName":"Windows.Desktop"}],"PlatformDependencyXmlBlob":"{\"blob.version\":1688867040526336,\"content.isMain\":false,\"content.packageId\":\"SpotifyAB.SpotifyMusic_1.176.447.0_x86__zpdnekdrzrea0\",\"content.productId\":\"caac1b9d-621b-4f96-b143-e10e1397740a\",\"content.targetPlatforms\":[{\"platform.maxVersionTested\":2814750754275328,\"platform.minVersion\":2814750710366559,\"platform.target\":3}],\"content.type\":7,\"policy\":{\"category.first\":\"app\",\"category.second\":\"Music\",\"optOut.backupRestore\":true,\"optOut.removeableMedia\":false},\"policy2\":{\"ageRating\":3,\"optOut.DVR\":false,\"thirdPartyAppRatings\":[{\"level\":9,\"systemId\":3},{\"level
                      Source: svchost.exe, 00000014.00000003.394252617.000001B9FBF8C000.00000004.00000001.sdmpString found in binary or memory: rings attached\r\n\r\nLike us on Facebook: http://www.facebook.com/spotify \r\nFollow us on Twitter: http://twitter.com/spotify","SkuTitle":"Spotify - Music and Podcasts","Language":"en-us","Markets":["US","DZ","AR","AU","AT","BH","BD","BE","BR","BG","CA","CL","CN","CO","CR","HR","CY","CZ","DK","EG","EE","FI","FR","DE","GR","GT","HK","HU","IS","IN","ID","IQ","IE","IL","IT","JP","JO","KZ","KE","KW","LV","LB","LI","LT","LU","MY","MT","MR","MX","MA","NL","NZ","NG","NO","OM","PK","PE","PH","PL","PT","QA","RO","RU","SA","RS","SG","SK","SI","ZA","KR","ES","SE","CH","TW","TH","TT","TN","TR","UA","AE","GB","VN","YE","LY","LK","UY","VE","AF","AX","AL","AS","AO","AI","AQ","AG","AM","AW","BO","BQ","BA","BW","BV","IO","BN","BF","BI","KH","CM","CV","KY","CF","TD","TL","DJ","DM","DO","EC","SV","GQ","ER","ET","FK","FO","FJ","GF","PF","TF","GA","GM","GE","GH","GI","GL","GD","GP","GU","GG","GN","GW","GY","HT","HM","HN","AZ","BS","BB","BY","BZ","BJ","BM","BT","KM","CG","CD","CK","CX","CC","CI","CW","JM","SJ","JE","KI","KG","LA","LS","LR","MO","MK","MG","MW","IM","MH","MQ","MU","YT","FM","MD","MN","MS","MZ","MM","NA","NR","NP","MV","ML","NC","NI","NE","NU","NF","PW","PS","PA","PG","PY","RE","RW","BL","MF","WS","ST","SN","MP","PN","SX","SB","SO","SC","SL","GS","SH","KN","LC","PM","VC","TJ","TZ","TG","TK","TO","TM","TC","TV","UM","UG","VI","VG","WF","EH","ZM","ZW","UZ","VU","SR","SZ","AD","MC","SM","ME","VA","NEUTRAL"]}],"ProductId":"9NCBCSZSJRSB","Properties":{"FulfillmentData":{"ProductId":"9NCBCSZSJRSB","WuCategoryId":"5c353b9c-7ac7-4d27-af07-923e7d9aa2e2","PackageFamilyName":"SpotifyAB.SpotifyMusic_zpdnekdrzrea0","SkuId":"0011"},"FulfillmentType":"WindowsUpdate","FulfillmentPluginId":null,"Packages":[{"Applications":[{"ApplicationId":"Spotify"}],"Architectures":["x86"],"Capabilities":["internetClient","runFullTrust","Microsoft.storeFilter.core.notSupported_8wekyb3d8bbwe"],"ExperienceIds":[],"MaxDownloadSizeInBytes":104380919,"MaxInstallSizeInBytes":203345920,"PackageFormat":"Appx","PackageFamilyName":"SpotifyAB.SpotifyMusic_zpdnekdrzrea0","MainPackageFamilyNameForDlc":null,"PackageFullName":"SpotifyAB.SpotifyMusic_1.176.447.0_x86__zpdnekdrzrea0","PackageId":"3fbafb47-f476-4c26-4445-49acb9a726e6-X86","PackageRank":30001,"PlatformDependencies":[{"MaxTested":2814750754275328,"MinVersion":2814750710366559,"PlatformName":"Windows.Desktop"}],"PlatformDependencyXmlBlob":"{\"blob.version\":1688867040526336,\"content.isMain\":false,\"content.packageId\":\"SpotifyAB.SpotifyMusic_1.176.447.0_x86__zpdnekdrzrea0\",\"content.productId\":\"caac1b9d-621b-4f96-b143-e10e1397740a\",\"content.targetPlatforms\":[{\"platform.maxVersionTested\":2814750754275328,\"platform.minVersion\":2814750710366559,\"platform.target\":3}],\"content.type\":7,\"policy\":{\"category.first\":\"app\",\"category.second\":\"Music\",\"optOut.backupRestore\":true,\"optOut.removeableMedia\":false},\"policy2\":{\"ageRating\":3,\"optOut.DVR\":false,\"thirdPartyAppRatings\":[{\"level\":9,\"systemId\":3},{\"level
                      Source: svchost.exe, 00000014.00000002.409679137.000001B9FB6E9000.00000004.00000001.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
                      Source: svchost.exe, 00000014.00000002.409679137.000001B9FB6E9000.00000004.00000001.sdmpString found in binary or memory: http://crl.ver)
                      Source: rundll32.exe, 0000000D.00000003.326561339.0000000005262000.00000004.00000001.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/
                      Source: rundll32.exe, 0000000D.00000003.326561339.0000000005262000.00000004.00000001.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/.1
                      Source: 77EC63BDA74BD0D0E0426DC8F80085060.13.drString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
                      Source: svchost.exe, 00000014.00000003.390495752.000001B9FBF7F000.00000004.00000001.sdmp, svchost.exe, 00000014.00000003.390514239.000001B9FBFC0000.00000004.00000001.sdmp, svchost.exe, 00000014.00000003.390575463.000001B9FBFA0000.00000004.00000001.sdmp, svchost.exe, 00000014.00000003.390534738.000001B9FBFC0000.00000004.00000001.sdmp, svchost.exe, 00000014.00000003.390606876.000001B9FBF5D000.00000004.00000001.sdmpString found in binary or memory: http://help.disneyplus.com.
                      Source: svchost.exe, 00000014.00000003.390495752.000001B9FBF7F000.00000004.00000001.sdmp, svchost.exe, 00000014.00000003.390514239.000001B9FBFC0000.00000004.00000001.sdmp, svchost.exe, 00000014.00000003.390575463.000001B9FBFA0000.00000004.00000001.sdmp, svchost.exe, 00000014.00000003.390534738.000001B9FBFC0000.00000004.00000001.sdmp, svchost.exe, 00000014.00000003.390606876.000001B9FBF5D000.00000004.00000001.sdmpString found in binary or memory: https://disneyplus.com/legal.
                      Source: svchost.exe, 00000014.00000003.390495752.000001B9FBF7F000.00000004.00000001.sdmp, svchost.exe, 00000014.00000003.390514239.000001B9FBFC0000.00000004.00000001.sdmp, svchost.exe, 00000014.00000003.390575463.000001B9FBFA0000.00000004.00000001.sdmp, svchost.exe, 00000014.00000003.390534738.000001B9FBFC0000.00000004.00000001.sdmp, svchost.exe, 00000014.00000003.390606876.000001B9FBF5D000.00000004.00000001.sdmpString found in binary or memory: https://www.disneyplus.com/legal/privacy-policy
                      Source: svchost.exe, 00000014.00000003.390495752.000001B9FBF7F000.00000004.00000001.sdmp, svchost.exe, 00000014.00000003.390514239.000001B9FBFC0000.00000004.00000001.sdmp, svchost.exe, 00000014.00000003.390575463.000001B9FBFA0000.00000004.00000001.sdmp, svchost.exe, 00000014.00000003.390534738.000001B9FBFC0000.00000004.00000001.sdmp, svchost.exe, 00000014.00000003.390606876.000001B9FBF5D000.00000004.00000001.sdmpString found in binary or memory: https://www.disneyplus.com/legal/your-california-privacy-rights
                      Source: svchost.exe, 00000014.00000003.391292817.000001B9FBF7B000.00000004.00000001.sdmp, svchost.exe, 00000014.00000003.391452171.000001B9FBF7B000.00000004.00000001.sdmpString found in binary or memory: https://www.tiktok.com/legal/report/feedback
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_100012D0 recvfrom,
                      Source: loaddll32.exe, 00000002.00000002.294900679.00000000010EB000.00000004.00000020.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_1000FF59 GetKeyState,GetKeyState,GetKeyState,GetKeyState,SendMessageA,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_1000FF59 GetKeyState,GetKeyState,GetKeyState,GetKeyState,SendMessageA,

                      E-Banking Fraud:

                      barindex
                      Yara detected EmotetShow sources
                      Source: Yara matchFile source: 13.2.rundll32.exe.53a0000.18.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 13.2.rundll32.exe.4ec0000.10.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.rundll32.exe.54f0000.6.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 13.2.rundll32.exe.2d50000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 13.2.rundll32.exe.4ef0000.11.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.rundll32.exe.5390000.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.rundll32.exe.5520000.7.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 13.2.rundll32.exe.4e90000.9.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.rundll32.exe.4ac0000.5.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.2.rundll32.exe.2990000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.2.rundll32.exe.43d0000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.rundll32.exe.4a90000.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.rundll32.exe.5580000.9.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 13.2.rundll32.exe.4fa0000.12.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 13.2.rundll32.exe.5620000.20.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 13.2.rundll32.exe.4c50000.5.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 13.2.rundll32.exe.51a0000.16.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 13.2.rundll32.exe.4d30000.7.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.rundll32.exe.4d90000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.rundll32.exe.5280000.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.rundll32.exe.56b0000.10.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 13.2.rundll32.exe.4fa0000.12.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.rundll32.exe.5280000.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.rundll32.exe.5550000.8.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.rundll32.exe.56b0000.10.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 13.2.rundll32.exe.4fd0000.13.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 13.2.rundll32.exe.2d50000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.rundll32.exe.4af0000.6.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 13.2.rundll32.exe.53a0000.18.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 13.2.rundll32.exe.4480000.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 12.2.rundll32.exe.4a40000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.rundll32.exe.3430000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 13.2.rundll32.exe.50f0000.15.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 13.2.rundll32.exe.4e60000.8.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 13.2.rundll32.exe.53d0000.19.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.rundll32.exe.52e0000.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 13.2.rundll32.exe.51a0000.16.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 13.2.rundll32.exe.5620000.20.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 13.2.rundll32.exe.43c0000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 13.2.rundll32.exe.4d00000.6.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.rundll32.exe.4af0000.6.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.2.rundll32.exe.2990000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 13.2.rundll32.exe.50c0000.14.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.rundll32.exe.5550000.8.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 12.2.rundll32.exe.4a70000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 13.2.rundll32.exe.4480000.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.regsvr32.exe.4e00000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.rundll32.exe.3430000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.rundll32.exe.54f0000.6.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 13.2.rundll32.exe.50c0000.14.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.regsvr32.exe.4e30000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.regsvr32.exe.4e00000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 13.2.rundll32.exe.51d0000.17.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.rundll32.exe.850000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.rundll32.exe.53c0000.5.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.rundll32.exe.4a90000.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 13.2.rundll32.exe.4d00000.6.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 13.2.rundll32.exe.4e60000.8.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 13.2.rundll32.exe.4c20000.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 13.2.rundll32.exe.45d0000.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 13.2.rundll32.exe.4c20000.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.rundll32.exe.56e0000.11.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.rundll32.exe.880000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.rundll32.exe.4990000.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.rundll32.exe.5390000.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 13.2.rundll32.exe.4ec0000.10.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.rundll32.exe.49c0000.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 12.2.rundll32.exe.4a40000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.rundll32.exe.850000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.rundll32.exe.4b20000.7.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.rundll32.exe.4990000.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 13.2.rundll32.exe.5650000.21.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000008.00000002.298606993.00000000056B0000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.294428773.0000000004E31000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000D.00000002.815959143.0000000004E91000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000008.00000002.298670924.00000000056E1000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000D.00000002.816961696.00000000050F1000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000008.00000002.297938888.00000000052E1000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000D.00000002.814399683.0000000002D50000.00000040.00000010.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000D.00000002.815700731.0000000004D00000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000D.00000002.815587816.0000000004C51000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000D.00000002.817960495.0000000005651000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000008.00000002.298239999.00000000054F0000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.297817521.0000000004AF0000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.297755557.0000000004AC1000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000D.00000002.815509685.0000000004C20000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.297710814.0000000004A90000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.295787483.0000000000850000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000C.00000002.301385832.0000000004A71000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000D.00000002.815776896.0000000004D31000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000D.00000002.817419709.00000000051D1000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000008.00000002.297893846.0000000005280000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000008.00000002.298028546.0000000005390000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000008.00000002.298441375.0000000005550000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000008.00000002.297464641.0000000003430000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000006.00000002.294757561.00000000043D1000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000D.00000002.816312049.0000000004FD1000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.297638381.00000000049C1000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000008.00000002.298510030.0000000005581000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000D.00000002.816141431.0000000004EF1000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000D.00000002.814627918.00000000043C1000.00000020.00000010.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.297863633.0000000004B21000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000D.00000002.816054659.0000000004EC0000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000D.00000002.814701416.0000000004480000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.294337664.0000000004E00000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.297583118.0000000004990000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000D.00000002.816243405.0000000004FA0000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000C.00000002.301361900.0000000004A40000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000008.00000002.297668150.0000000004D91000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000006.00000002.294482062.0000000002990000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000D.00000002.817244449.00000000051A0000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000008.00000002.298093850.00000000053C1000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.295818674.0000000000881000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000D.00000002.815880931.0000000004E60000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000D.00000002.817694741.00000000053A0000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000D.00000002.817922483.0000000005620000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000D.00000002.816664369.00000000050C0000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000D.00000002.815012363.00000000045D1000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000D.00000002.817778819.00000000053D1000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000008.00000002.298383199.0000000005521000.00000020.00000001.sdmp, type: MEMORY

                      System Summary:

                      barindex
                      Source: 7MhGa3iotM.dllStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE, DLL
                      Source: C:\Windows\SysWOW64\rundll32.exeFile deleted: C:\Windows\SysWOW64\Kgiezrb\edgitxrppqaf.tym:Zone.IdentifierJump to behavior
                      Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Windows\SysWOW64\Kgiezrb\Jump to behavior
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_10020011
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_100181CA
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_1001929D
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_1002542D
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_100274AE
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_10026575
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_1001869D
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_1001178A
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_10016860
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_1002596F
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_10022A5C
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_10018A71
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_1001AAB7
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_1001CB16
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_10018E7D
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_10025EB1
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_04E485FF
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_04E4EFDD
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_04E4E4E5
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_04E4CCD9
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_04E31CA1
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_04E4A474
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_04E4DC71
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_04E37442
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_04E3A445
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_04E33431
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_04E49DF5
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_04E355FF
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_04E4C5D5
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_04E3C5D8
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_04E43D85
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_04E4654A
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_04E52D53
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_04E47D5B
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_04E48D3D
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_04E4AD08
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_04E45515
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_04E53EE9
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_04E4BEFD
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_04E43EAA
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_04E536AA
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_04E40EBC
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_04E546BD
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_04E3C6B8
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_04E3DE74
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_04E37E79
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_04E4567B
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_04E3E640
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_04E42E5D
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_04E38636
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_04E467E6
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_04E3E7DE
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_04E377A3
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_04E48FAE
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_04E507AA
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_04E517BD
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_04E357B8
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_04E3BFBE
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_04E40F86
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_04E44F74
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_04E49774
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_04E45779
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_04E4FF58
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_04E31F38
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_04E3670B
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_04E3EF0C
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_04E3F0E9
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_04E500EF
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_04E380C0
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_04E4D8DB
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_04E3A871
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_04E37078
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_04E4F840
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_04E3B820
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_04E48806
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_04E52009
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_04E4E1F8
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_04E4D1BC
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_04E46187
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_04E32194
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_04E4017B
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_04E42142
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_04E3D14C
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_04E4E955
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_04E4CAD5
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_04E4A2A5
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_04E3BAA9
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_04E40ABA
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_04E50A64
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_04E44A66
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_04E53263
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_04E44244
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_04E4B257
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_04E49A01
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_04E47A0F
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_04E34BFC
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_04E3FB8E
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_04E3238C
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_04E3F369
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_04E36B7A
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_04E45333
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_04E52B09
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_10020011
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_100181CA
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_1001929D
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_1002542D
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_100274AE
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_10026575
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_1001869D
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_1001178A
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_10016860
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_1002596F
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_10022A5C
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_10018A71
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_1001AAB7
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_1001CB16
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_10018E7D
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_10025EB1
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_043E85FF
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_043EEFDD
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_043D3431
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_043EA474
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_043EDC71
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_043DA445
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_043D7442
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_043D1CA1
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_043EE4E5
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_043ECCD9
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_043E8D3D
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_043E5515
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_043EAD08
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_043E7D5B
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_043F2D53
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_043E654A
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_043E3D85
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_043D55FF
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_043E9DF5
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_043DC5D8
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_043EC5D5
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_043D8636
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_043D7E79
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_043E567B
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_043DDE74
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_043E2E5D
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_043DE640
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_043E0EBC
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_043F46BD
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_043DC6B8
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_043E3EAA
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_043F36AA
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_043EBEFD
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_043F3EE9
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_043D1F38
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_043DEF0C
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_043D670B
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_043E5779
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_043E4F74
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_043E9774
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_043EFF58
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_043F17BD
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_043DBFBE
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_043D57B8
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_043E8FAE
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_043F07AA
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_043D77A3
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_043E0F86
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_043E67E6
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_043DE7DE
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_043DB820
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_043F2009
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_043E8806
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_043D7078
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_043DA871
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_043EF840
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_043F00EF
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_043DF0E9
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_043ED8DB
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_043D80C0
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_043E017B
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_043EE955
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_043DD14C
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_043E2142
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_043ED1BC
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_043D2194
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_043E6187
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_043EE1F8
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_043E7A0F
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_043E9A01
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_043E4A66
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_043F0A64
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_043F3263
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_043EB257
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_043E4244
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_043E0ABA
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_043DBAA9
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_043EA2A5
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_043ECAD5
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_043E5333
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_043F2B09
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_043D6B7A
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_043DF369
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_043D238C
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_043DFB8E
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_043D4BFC
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04DAB257
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04D9DE74
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04DA4A66
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04DB2009
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04DA7A0F
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04D98636
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04D9C5D8
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04DAEFDD
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04DA85FF
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04DB17BD
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04DAFF58
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04DAE955
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04DA654A
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04DA2142
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04D9670B
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04DAAD08
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04DAD8DB
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04DACCD9
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04DACAD5
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04D980C0
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04DABEFD
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04D9F0E9
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04DB3EE9
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04DB00EF
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04DAE4E5
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04DA0ABA
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04D9C6B8
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04DB46BD
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04DA0EBC
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04DA3EAA
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04D9BAA9
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04DB36AA
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04D91CA1
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04DAA2A5
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04DA2E5D
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04D9E640
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04DAF840
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04D97442
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04D9A445
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04DA4244
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04D97E79
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04D97078
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04DA567B
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04D9A871
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04DADC71
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04DAA474
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04DB3263
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04DB0A64
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04DA9A01
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04DA8806
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04D93431
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04D9B820
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04DAFBDE
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04D9E7DE
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04DAC5D5
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04DAE1F8
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04DA27F9
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04D94BFC
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04D955FF
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04DA07F4
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04DA9DF5
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04DA67E6
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04D92194
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04D9238C
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04D9FB8E
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04DA0F86
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04DA6187
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04DA3D85
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04D957B8
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04DAD1BC
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04D9BFBE
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04DB07AA
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04DA8FAE
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04D977A3
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04DA7D5B
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04DB2D53
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04D9D14C
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04DA437A
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04DA017B
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04DA5779
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04D96B7A
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04DA4F74
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04DA9774
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04D9F369
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04DA5515
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04DB2B09
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04D9EF0C
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04D91F38
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04DA8D3D
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04DA5333
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_008A2009
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_00897A0F
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_00888636
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_0088A445
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_00894A66
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_0088DE74
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_0088C5D8
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_0089EFDD
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_0089AD08
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_0088670B
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_0089654A
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_00892142
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_0089FF58
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_008A36AA
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_0088BAA9
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_00893EAA
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_00881CA1
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_0089A2A5
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_0088C6B8
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_00890ABA
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_00890EBC
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_008A46BD
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_008880C0
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_0089CCD9
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_0089D8DB
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_0089CAD5
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_0088F0E9
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_008A3EE9
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_008A00EF
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_0089E4E5
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_0089BEFD
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_00899A01
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_00898806
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_0088B820
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_00883431
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_0088E640
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_0089F840
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_00887442
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_00894244
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_00892E5D
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_0089B257
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_008A3263
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_008A0A64
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_00887078
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_00887E79
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_0089567B
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_0089DC71
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_0088A871
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_0089A474
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_0088238C
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_0088FB8E
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_00893D85
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_00896187
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_00890F86
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_00882194
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_008A07AA
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_00898FAE
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_008877A3
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_008857B8
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_0089D1BC
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_0088BFBE
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_008A17BD
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_0088E7DE
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_0089FBDE
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_0089C5D5
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_008967E6
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_008927F9
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_0089E1F8
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_00884BFC
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_008985FF
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_008855FF
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_00899DF5
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_008907F4
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_008A2B09
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_0088EF0C
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_00895515
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_00881F38
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_00898D3D
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_00895333
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_0088D14C
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_00897D5B
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_008A2D53
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_0089E955
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_0088F369
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_00895779
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_00886B7A
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_0089017B
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_0089437A
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_00894F74
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_00899774
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_04A885FF
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_04A8EFDD
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_04A83EAA
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_04A936AA
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_04A71CA1
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_04A8A2A5
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_04A7BAA9
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_04A80ABA
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_04A946BD
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_04A80EBC
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_04A7C6B8
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_04A93EE9
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_04A900EF
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_04A8E4E5
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_04A7F0E9
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_04A8BEFD
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_04A780C0
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_04A8CCD9
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_04A8D8DB
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_04A8CAD5
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_04A7B820
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_04A78636
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_04A73431
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_04A92009
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_04A87A0F
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_04A89A01
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_04A88806
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_04A93263
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_04A90A64
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_04A84A66
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_04A8567B
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_04A7DE74
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_04A7A871
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_04A8DC71
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_04A8A474
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_04A77E79
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_04A77078
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_04A7A445
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_04A77442
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_04A7E640
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_04A8F840
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_04A84244
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_04A82E5D
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_04A8B257
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_04A907AA
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_04A777A3
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_04A88FAE
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_04A8D1BC
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_04A917BD
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_04A7BFBE
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_04A757B8
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_04A7FB8E
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_04A7238C
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_04A83D85
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_04A80F86
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_04A86187
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_04A72194
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_04A867E6
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_04A8E1F8
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_04A755FF
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_04A74BFC
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_04A89DF5
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_04A7E7DE
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_04A8C5D5
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_04A7C5D8
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_04A88D3D
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_04A85333
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_04A71F38
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_04A92B09
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_04A8AD08
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_04A7EF0C
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_04A7670B
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_04A85515
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_04A7F369
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_04A85779
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_04A8017B
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_04A84F74
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_04A89774
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_04A76B7A
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_04A8654A
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_04A82142
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_04A7D14C
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_04A8FF58
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_04A87D5B
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_04A92D53
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_04A8E955
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: String function: 10017BC1 appears 68 times
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: String function: 1001984C appears 48 times
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: String function: 10017BC1 appears 68 times
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: String function: 1001984C appears 48 times
                      Source: 7MhGa3iotM.dllBinary or memory string: OriginalFilenameUDPTool.EXE: vs 7MhGa3iotM.dll
                      Source: 7MhGa3iotM.dllStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                      Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: sfc.dll
                      Source: 7MhGa3iotM.dllVirustotal: Detection: 29%
                      Source: 7MhGa3iotM.dllReversingLabs: Detection: 41%
                      Source: 7MhGa3iotM.dllStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                      Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                      Source: unknownProcess created: C:\Windows\System32\SgrmBroker.exe C:\Windows\system32\SgrmBroker.exe
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe c:\windows\system32\svchost.exe -k unistacksvcgroup
                      Source: unknownProcess created: C:\Windows\System32\loaddll32.exe loaddll32.exe "C:\Users\user\Desktop\7MhGa3iotM.dll"
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe c:\windows\system32\svchost.exe -k localservicenetworkrestricted -p -s wscsvc
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\7MhGa3iotM.dll",#1
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\7MhGa3iotM.dll
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\7MhGa3iotM.dll",#1
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\7MhGa3iotM.dll,DllRegisterServer
                      Source: C:\Windows\SysWOW64\regsvr32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\rundll32.exe "C:\Users\user\Desktop\7MhGa3iotM.dll",DllRegisterServer
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\rundll32.exe "C:\Users\user\Desktop\7MhGa3iotM.dll",DllRegisterServer
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Kgiezrb\edgitxrppqaf.tym",JFlwYpDQ
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\rundll32.exe "C:\Windows\System32\Kgiezrb\edgitxrppqaf.tym",DllRegisterServer
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p
                      Source: C:\Windows\System32\svchost.exeProcess created: C:\Program Files\Windows Defender\MpCmdRun.exe "C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable
                      Source: C:\Program Files\Windows Defender\MpCmdRun.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\7MhGa3iotM.dll",#1
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\7MhGa3iotM.dll
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\7MhGa3iotM.dll,DllRegisterServer
                      Source: C:\Windows\System32\svchost.exeProcess created: C:\Program Files\Windows Defender\MpCmdRun.exe "C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\7MhGa3iotM.dll",#1
                      Source: C:\Windows\SysWOW64\regsvr32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\rundll32.exe "C:\Users\user\Desktop\7MhGa3iotM.dll",DllRegisterServer
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\rundll32.exe "C:\Users\user\Desktop\7MhGa3iotM.dll",DllRegisterServer
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Kgiezrb\edgitxrppqaf.tym",JFlwYpDQ
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\rundll32.exe "C:\Windows\System32\Kgiezrb\edgitxrppqaf.tym",DllRegisterServer
                      Source: C:\Windows\SysWOW64\rundll32.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32
                      Source: C:\Windows\System32\svchost.exeFile created: C:\Users\user\AppData\Local\packages\ActiveSync\LocalState\DiagOutputDir\UnistackCritical.etlJump to behavior
                      Source: classification engineClassification label: mal100.troj.evad.winDLL@27/9@0/28
                      Source: C:\Windows\SysWOW64\rundll32.exeFile read: C:\Users\desktop.iniJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\7MhGa3iotM.dll",#1
                      Source: C:\Windows\System32\SgrmBroker.exeMutant created: \BaseNamedObjects\Local\SM0:7124:304:WilStaging_02
                      Source: C:\Windows\System32\conhost.exeMutant created: \BaseNamedObjects\Local\SM0:5952:120:WilError_01
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_100126F9 FindResourceA,LoadResource,LockResource,FreeResource,
                      Source: C:\Windows\SysWOW64\rundll32.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: 7MhGa3iotM.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                      Source: 7MhGa3iotM.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                      Source: 7MhGa3iotM.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                      Source: 7MhGa3iotM.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                      Source: 7MhGa3iotM.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_10019891 push ecx; ret
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_10017C60 push ecx; ret
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_04E408E0 push esp; iretd
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_04E31195 push cs; iretd
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_10019891 push ecx; ret
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_10017C60 push ecx; ret
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_043E08E0 push esp; iretd
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_043D1195 push cs; iretd
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04D91195 push cs; iretd
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_00881195 push cs; iretd
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_04A808E0 push esp; iretd
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_04A71195 push cs; iretd
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_10023A79 LoadLibraryA,GetProcAddress,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,__invoke_watson,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,__decode_pointer,__decode_pointer,__invoke_watson,__decode_pointer,__decode_pointer,__decode_pointer,
                      Source: 7MhGa3iotM.dllStatic PE information: real checksum: 0x66354 should be: 0x6f58d
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\7MhGa3iotM.dll
                      Source: C:\Windows\SysWOW64\rundll32.exePE file moved: C:\Windows\SysWOW64\Kgiezrb\edgitxrppqaf.tymJump to behavior

                      Hooking and other Techniques for Hiding and Protection:

                      barindex
                      Hides that the sample has been downloaded from the Internet (zone.identifier)Show sources
                      Source: C:\Windows\SysWOW64\rundll32.exeFile opened: C:\Windows\SysWOW64\Kgiezrb\edgitxrppqaf.tym:Zone.Identifier read attributes | delete
                      Source: C:\Windows\SysWOW64\rundll32.exeFile opened: C:\Windows\SysWOW64\Fackxudzoi\jiileh.ane:Zone.Identifier read attributes | delete
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_1000D804 IsIconic,GetWindowPlacement,GetWindowRect,
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_10008B90 IsIconic,SendMessageA,GetSystemMetrics,GetSystemMetrics,GetClientRect,DrawIcon,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_1000D804 IsIconic,GetWindowPlacement,GetWindowRect,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_10008B90 IsIconic,SendMessageA,GetSystemMetrics,GetSystemMetrics,GetClientRect,DrawIcon,
                      Source: C:\Windows\System32\svchost.exeRegistry key monitored for changes: HKEY_CURRENT_USER_Classes
                      Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\svchost.exe TID: 6436Thread sleep time: -150000s >= -30000s
                      Source: C:\Windows\System32\loaddll32.exeLast function: Thread delayed
                      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                      Source: C:\Windows\SysWOW64\regsvr32.exeAPI coverage: 4.6 %
                      Source: C:\Windows\SysWOW64\rundll32.exeAPI coverage: 4.9 %
                      Source: C:\Windows\SysWOW64\regsvr32.exeAPI call chain: ExitProcess graph end node
                      Source: C:\Windows\SysWOW64\rundll32.exeAPI call chain: ExitProcess graph end node
                      Source: C:\Windows\SysWOW64\rundll32.exeFile Volume queried: C:\ FullSizeInformation
                      Source: svchost.exe, 00000014.00000002.409679137.000001B9FB6E9000.00000004.00000001.sdmp, svchost.exe, 00000014.00000003.409043034.000001B9FB681000.00000004.00000001.sdmp, svchost.exe, 00000014.00000002.409605085.000001B9FB681000.00000004.00000001.sdmpBinary or memory string: Hyper-V RAW
                      Source: svchost.exe, 00000014.00000002.409626860.000001B9FB6A4000.00000004.00000001.sdmpBinary or memory string: Hyper-V RAW #h
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_1001C49A _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_10023A79 LoadLibraryA,GetProcAddress,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,__invoke_watson,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,__decode_pointer,__decode_pointer,__invoke_watson,__decode_pointer,__decode_pointer,__decode_pointer,
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_100178B6 GetProcessHeap,GetProcessHeap,HeapAlloc,GetVersionExA,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,__heap_term,__RTC_Initialize,GetCommandLineA,___crtGetEnvironmentStringsA,__ioinit,__mtterm,__setargv,__setenvp,__cinit,__ioterm,__ioterm,__mtterm,__heap_term,___set_flsgetvalue,__calloc_crt,__decode_pointer,__initptd,GetCurrentThreadId,__freeptd,
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_04E3F7F7 mov eax, dword ptr fs:[00000030h]
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_043DF7F7 mov eax, dword ptr fs:[00000030h]
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04D9F7F7 mov eax, dword ptr fs:[00000030h]
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_0088F7F7 mov eax, dword ptr fs:[00000030h]
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_04A7F7F7 mov eax, dword ptr fs:[00000030h]
                      Source: C:\Windows\System32\loaddll32.exeProcess queried: DebugPort
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_1001C49A _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_10021743 __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_100167D5 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_1001FC21 SetUnhandledExceptionFilter,__encode_pointer,
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_1001FC43 __decode_pointer,SetUnhandledExceptionFilter,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_1001C49A _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_10021743 __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_100167D5 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_1001FC21 SetUnhandledExceptionFilter,__encode_pointer,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_1001FC43 __decode_pointer,SetUnhandledExceptionFilter,

                      HIPS / PFW / Operating System Protection Evasion:

                      barindex
                      System process connects to network (likely due to code injection or exploit)Show sources
                      Source: C:\Windows\SysWOW64\rundll32.exeNetwork Connect: 69.16.218.101 144
                      Source: C:\Windows\SysWOW64\rundll32.exeNetwork Connect: 45.138.98.34 80
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\7MhGa3iotM.dll",#1
                      Source: svchost.exe, 00000001.00000002.813903951.0000017F37B90000.00000002.00020000.sdmp, rundll32.exe, 0000000D.00000002.814472998.0000000002FB0000.00000002.00020000.sdmpBinary or memory string: Program Manager
                      Source: svchost.exe, 00000001.00000002.813903951.0000017F37B90000.00000002.00020000.sdmp, rundll32.exe, 0000000D.00000002.814472998.0000000002FB0000.00000002.00020000.sdmpBinary or memory string: Shell_TrayWnd
                      Source: svchost.exe, 00000001.00000002.813903951.0000017F37B90000.00000002.00020000.sdmp, rundll32.exe, 0000000D.00000002.814472998.0000000002FB0000.00000002.00020000.sdmpBinary or memory string: Progman
                      Source: svchost.exe, 00000001.00000002.813903951.0000017F37B90000.00000002.00020000.sdmp, rundll32.exe, 0000000D.00000002.814472998.0000000002FB0000.00000002.00020000.sdmpBinary or memory string: Progmanlock
                      Source: C:\Windows\SysWOW64\rundll32.exeQueries volume information: C:\ VolumeInformation
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: GetThreadLocale,GetLocaleInfoA,GetACP,
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: _strcpy_s,__snprintf_s,GetLocaleInfoA,LoadLibraryA,
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: GetLocaleInfoA,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetThreadLocale,GetLocaleInfoA,GetACP,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: _strcpy_s,__snprintf_s,GetLocaleInfoA,LoadLibraryA,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetLocaleInfoA,
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_10022853 cpuid
                      Source: C:\Windows\SysWOW64\rundll32.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_1001F914 GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter,
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_100178B6 GetProcessHeap,GetProcessHeap,HeapAlloc,GetVersionExA,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,__heap_term,__RTC_Initialize,GetCommandLineA,___crtGetEnvironmentStringsA,__ioinit,__mtterm,__setargv,__setenvp,__cinit,__ioterm,__ioterm,__mtterm,__heap_term,___set_flsgetvalue,__calloc_crt,__decode_pointer,__initptd,GetCurrentThreadId,__freeptd,

                      Lowering of HIPS / PFW / Operating System Security Settings:

                      barindex
                      Changes security center settings (notifications, updates, antivirus, firewall)Show sources
                      Source: C:\Windows\System32\svchost.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center cvalJump to behavior
                      Source: C:\Windows\System32\svchost.exeWMI Queries: IWbemServices::ExecNotificationQuery - ROOT\SecurityCenter : SELECT * FROM __InstanceOperationEvent WHERE TargetInstance ISA &apos;AntiVirusProduct&apos; OR TargetInstance ISA &apos;FirewallProduct&apos; OR TargetInstance ISA &apos;AntiSpywareProduct&apos;
                      Source: C:\Windows\System32\svchost.exeWMI Queries: IWbemServices::CreateInstanceEnum - ROOT\SecurityCenter2 : FirewallProduct
                      Source: C:\Windows\System32\svchost.exeWMI Queries: IWbemServices::CreateInstanceEnum - ROOT\SecurityCenter2 : AntiVirusProduct
                      Source: C:\Windows\System32\svchost.exeWMI Queries: IWbemServices::CreateInstanceEnum - ROOT\SecurityCenter2 : AntiSpywareProduct
                      Source: svchost.exe, 00000003.00000002.813310517.00000187EE63D000.00000004.00000001.sdmpBinary or memory string: (@V%ProgramFiles%\Windows Defender\MsMpeng.exe
                      Source: svchost.exe, 00000003.00000002.813369976.00000187EE702000.00000004.00000001.sdmpBinary or memory string: Files%\Windows Defender\MsMpeng.exe
                      Source: svchost.exe, 00000003.00000002.813228713.00000187EE613000.00000004.00000001.sdmp, svchost.exe, 00000003.00000002.813369976.00000187EE702000.00000004.00000001.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe

                      Stealing of Sensitive Information:

                      barindex
                      Yara detected EmotetShow sources
                      Source: Yara matchFile source: 13.2.rundll32.exe.53a0000.18.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 13.2.rundll32.exe.4ec0000.10.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.rundll32.exe.54f0000.6.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 13.2.rundll32.exe.2d50000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 13.2.rundll32.exe.4ef0000.11.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.rundll32.exe.5390000.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.rundll32.exe.5520000.7.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 13.2.rundll32.exe.4e90000.9.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.rundll32.exe.4ac0000.5.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.2.rundll32.exe.2990000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.2.rundll32.exe.43d0000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.rundll32.exe.4a90000.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.rundll32.exe.5580000.9.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 13.2.rundll32.exe.4fa0000.12.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 13.2.rundll32.exe.5620000.20.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 13.2.rundll32.exe.4c50000.5.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 13.2.rundll32.exe.51a0000.16.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 13.2.rundll32.exe.4d30000.7.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.rundll32.exe.4d90000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.rundll32.exe.5280000.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.rundll32.exe.56b0000.10.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 13.2.rundll32.exe.4fa0000.12.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.rundll32.exe.5280000.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.rundll32.exe.5550000.8.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.rundll32.exe.56b0000.10.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 13.2.rundll32.exe.4fd0000.13.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 13.2.rundll32.exe.2d50000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.rundll32.exe.4af0000.6.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 13.2.rundll32.exe.53a0000.18.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 13.2.rundll32.exe.4480000.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 12.2.rundll32.exe.4a40000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.rundll32.exe.3430000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 13.2.rundll32.exe.50f0000.15.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 13.2.rundll32.exe.4e60000.8.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 13.2.rundll32.exe.53d0000.19.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.rundll32.exe.52e0000.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 13.2.rundll32.exe.51a0000.16.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 13.2.rundll32.exe.5620000.20.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 13.2.rundll32.exe.43c0000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 13.2.rundll32.exe.4d00000.6.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.rundll32.exe.4af0000.6.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.2.rundll32.exe.2990000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 13.2.rundll32.exe.50c0000.14.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.rundll32.exe.5550000.8.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 12.2.rundll32.exe.4a70000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 13.2.rundll32.exe.4480000.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.regsvr32.exe.4e00000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.rundll32.exe.3430000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.rundll32.exe.54f0000.6.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 13.2.rundll32.exe.50c0000.14.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.regsvr32.exe.4e30000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.regsvr32.exe.4e00000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 13.2.rundll32.exe.51d0000.17.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.rundll32.exe.850000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.rundll32.exe.53c0000.5.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.rundll32.exe.4a90000.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 13.2.rundll32.exe.4d00000.6.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 13.2.rundll32.exe.4e60000.8.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 13.2.rundll32.exe.4c20000.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 13.2.rundll32.exe.45d0000.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 13.2.rundll32.exe.4c20000.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.rundll32.exe.56e0000.11.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.rundll32.exe.880000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.rundll32.exe.4990000.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.rundll32.exe.5390000.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 13.2.rundll32.exe.4ec0000.10.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.rundll32.exe.49c0000.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 12.2.rundll32.exe.4a40000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.rundll32.exe.850000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.rundll32.exe.4b20000.7.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.rundll32.exe.4990000.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 13.2.rundll32.exe.5650000.21.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000008.00000002.298606993.00000000056B0000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.294428773.0000000004E31000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000D.00000002.815959143.0000000004E91000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000008.00000002.298670924.00000000056E1000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000D.00000002.816961696.00000000050F1000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000008.00000002.297938888.00000000052E1000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000D.00000002.814399683.0000000002D50000.00000040.00000010.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000D.00000002.815700731.0000000004D00000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000D.00000002.815587816.0000000004C51000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000D.00000002.817960495.0000000005651000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000008.00000002.298239999.00000000054F0000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.297817521.0000000004AF0000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.297755557.0000000004AC1000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000D.00000002.815509685.0000000004C20000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.297710814.0000000004A90000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.295787483.0000000000850000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000C.00000002.301385832.0000000004A71000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000D.00000002.815776896.0000000004D31000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000D.00000002.817419709.00000000051D1000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000008.00000002.297893846.0000000005280000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000008.00000002.298028546.0000000005390000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000008.00000002.298441375.0000000005550000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000008.00000002.297464641.0000000003430000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000006.00000002.294757561.00000000043D1000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000D.00000002.816312049.0000000004FD1000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.297638381.00000000049C1000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000008.00000002.298510030.0000000005581000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000D.00000002.816141431.0000000004EF1000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000D.00000002.814627918.00000000043C1000.00000020.00000010.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.297863633.0000000004B21000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000D.00000002.816054659.0000000004EC0000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000D.00000002.814701416.0000000004480000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.294337664.0000000004E00000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.297583118.0000000004990000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000D.00000002.816243405.0000000004FA0000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000C.00000002.301361900.0000000004A40000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000008.00000002.297668150.0000000004D91000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000006.00000002.294482062.0000000002990000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000D.00000002.817244449.00000000051A0000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000008.00000002.298093850.00000000053C1000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.295818674.0000000000881000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000D.00000002.815880931.0000000004E60000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000D.00000002.817694741.00000000053A0000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000D.00000002.817922483.0000000005620000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000D.00000002.816664369.00000000050C0000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000D.00000002.815012363.00000000045D1000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000D.00000002.817778819.00000000053D1000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000008.00000002.298383199.0000000005521000.00000020.00000001.sdmp, type: MEMORY
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 5_2_100011C0 WSAStartup,_memset,htonl,htons,socket,bind,setsockopt,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_100011C0 WSAStartup,_memset,htonl,htons,socket,bind,setsockopt,

                      Mitre Att&ck Matrix

                      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                      Valid AccountsWindows Management Instrumentation1DLL Side-Loading1DLL Side-Loading1Disable or Modify Tools1Input Capture2System Time Discovery1Remote ServicesArchive Collected Data1Exfiltration Over Other Network MediumIngress Tool Transfer1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                      Default AccountsNative API1Boot or Logon Initialization ScriptsProcess Injection112Deobfuscate/Decode Files or Information1LSASS MemoryFile and Directory Discovery1Remote Desktop ProtocolInput Capture2Exfiltration Over BluetoothEncrypted Channel1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                      Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Obfuscated Files or Information2Security Account ManagerSystem Information Discovery35SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationNon-Standard Port1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                      Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)DLL Side-Loading1NTDSQuery Registry1Distributed Component Object ModelInput CaptureScheduled TransferApplication Layer Protocol1SIM Card SwapCarrier Billing Fraud
                      Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptFile Deletion1LSA SecretsSecurity Software Discovery51SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                      Replication Through Removable MediaLaunchdRc.commonRc.commonMasquerading21Cached Domain CredentialsVirtualization/Sandbox Evasion2VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                      External Remote ServicesScheduled TaskStartup ItemsStartup ItemsVirtualization/Sandbox Evasion2DCSyncProcess Discovery1Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                      Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobProcess Injection112Proc FilesystemApplication Window Discovery1Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
                      Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)Hidden Files and Directories1/etc/passwd and /etc/shadowRemote System Discovery1Software Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
                      Supply Chain CompromiseAppleScriptAt (Windows)At (Windows)Regsvr321Network SniffingProcess DiscoveryTaint Shared ContentLocal Data StagingExfiltration Over Unencrypted/Obfuscated Non-C2 ProtocolFile Transfer ProtocolsData Encrypted for Impact
                      Compromise Software Dependencies and Development ToolsWindows Command ShellCronCronRundll321Input CapturePermission Groups DiscoveryReplication Through Removable MediaRemote Data StagingExfiltration Over Physical MediumMail ProtocolsService Stop

                      Behavior Graph

                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet
                      behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 553129 Sample: 7MhGa3iotM Startdate: 14/01/2022 Architecture: WINDOWS Score: 100 42 210.57.209.142 UNAIR-AS-IDUniversitasAirlanggaID Indonesia 2->42 44 85.214.67.203 STRATOSTRATOAGDE Germany 2->44 46 23 other IPs or domains 2->46 54 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->54 56 Found malware configuration 2->56 58 Multi AV Scanner detection for submitted file 2->58 60 4 other signatures 2->60 9 loaddll32.exe 1 2->9         started        11 svchost.exe 2->11         started        14 svchost.exe 1 2->14         started        17 5 other processes 2->17 signatures3 process4 dnsIp5 19 rundll32.exe 2 9->19         started        22 cmd.exe 1 9->22         started        24 regsvr32.exe 9->24         started        68 Changes security center settings (notifications, updates, antivirus, firewall) 11->68 26 MpCmdRun.exe 1 11->26         started        52 192.168.2.1 unknown unknown 14->52 signatures6 process7 signatures8 62 Hides that the sample has been downloaded from the Internet (zone.identifier) 19->62 28 rundll32.exe 19->28         started        30 rundll32.exe 22->30         started        32 rundll32.exe 24->32         started        34 conhost.exe 26->34         started        process9 process10 36 rundll32.exe 28->36         started        40 rundll32.exe 2 30->40         started        dnsIp11 48 45.138.98.34, 49746, 80 M247GB Germany 36->48 50 69.16.218.101, 49747, 8080 LIQUIDWEBUS United States 36->50 64 System process connects to network (likely due to code injection or exploit) 36->64 66 Hides that the sample has been downloaded from the Internet (zone.identifier) 40->66 signatures12

                      Screenshots

                      Thumbnails

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.

                      windows-stand

                      Antivirus, Machine Learning and Genetic Malware Detection

                      Initial Sample

                      SourceDetectionScannerLabelLink
                      7MhGa3iotM.dll30%VirustotalBrowse
                      7MhGa3iotM.dll42%ReversingLabsWin32.Trojan.Emotet
                      7MhGa3iotM.dll100%Joe Sandbox ML

                      Dropped Files

                      No Antivirus matches

                      Unpacked PE Files

                      SourceDetectionScannerLabelLinkDownload
                      13.2.rundll32.exe.4d30000.7.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      13.2.rundll32.exe.4ef0000.11.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      10.2.rundll32.exe.4ac0000.5.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      8.2.rundll32.exe.54f0000.6.unpack100%AviraHEUR/AGEN.1145233Download File
                      13.2.rundll32.exe.4ec0000.10.unpack100%AviraHEUR/AGEN.1145233Download File
                      8.2.rundll32.exe.5580000.9.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      8.2.rundll32.exe.52e0000.3.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      6.2.rundll32.exe.43d0000.1.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      8.2.rundll32.exe.5280000.2.unpack100%AviraHEUR/AGEN.1145233Download File
                      13.2.rundll32.exe.4c50000.5.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      13.2.rundll32.exe.4e90000.9.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      8.2.rundll32.exe.5520000.7.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      13.2.rundll32.exe.2d50000.0.unpack100%AviraHEUR/AGEN.1145233Download File
                      8.2.rundll32.exe.4d90000.1.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      13.2.rundll32.exe.4fa0000.12.unpack100%AviraHEUR/AGEN.1145233Download File
                      8.2.rundll32.exe.56b0000.10.unpack100%AviraHEUR/AGEN.1145233Download File
                      13.2.rundll32.exe.4fd0000.13.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      13.2.rundll32.exe.5620000.20.unpack100%AviraHEUR/AGEN.1145233Download File
                      13.2.rundll32.exe.53a0000.18.unpack100%AviraHEUR/AGEN.1145233Download File
                      12.2.rundll32.exe.4a40000.0.unpack100%AviraHEUR/AGEN.1145233Download File
                      13.2.rundll32.exe.4480000.2.unpack100%AviraHEUR/AGEN.1145233Download File
                      8.2.rundll32.exe.3430000.0.unpack100%AviraHEUR/AGEN.1145233Download File
                      13.2.rundll32.exe.50f0000.15.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      10.2.rundll32.exe.4af0000.6.unpack100%AviraHEUR/AGEN.1145233Download File
                      13.2.rundll32.exe.53d0000.19.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      13.2.rundll32.exe.51a0000.16.unpack100%AviraHEUR/AGEN.1145233Download File
                      13.2.rundll32.exe.43c0000.1.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      5.2.regsvr32.exe.4e30000.1.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      6.2.rundll32.exe.2990000.0.unpack100%AviraHEUR/AGEN.1145233Download File
                      8.2.rundll32.exe.5550000.8.unpack100%AviraHEUR/AGEN.1145233Download File
                      13.2.rundll32.exe.50c0000.14.unpack100%AviraHEUR/AGEN.1145233Download File
                      12.2.rundll32.exe.4a70000.1.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      13.2.rundll32.exe.4d00000.6.unpack100%AviraHEUR/AGEN.1145233Download File
                      5.2.regsvr32.exe.4e00000.0.unpack100%AviraHEUR/AGEN.1145233Download File
                      8.2.rundll32.exe.53c0000.5.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      13.2.rundll32.exe.51d0000.17.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      10.2.rundll32.exe.4a90000.4.unpack100%AviraHEUR/AGEN.1145233Download File
                      10.2.rundll32.exe.850000.0.unpack100%AviraHEUR/AGEN.1145233Download File
                      13.2.rundll32.exe.4e60000.8.unpack100%AviraHEUR/AGEN.1145233Download File
                      13.2.rundll32.exe.4c20000.4.unpack100%AviraHEUR/AGEN.1145233Download File
                      8.2.rundll32.exe.56e0000.11.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      13.2.rundll32.exe.45d0000.3.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      10.2.rundll32.exe.880000.1.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      8.2.rundll32.exe.5390000.4.unpack100%AviraHEUR/AGEN.1145233Download File
                      10.2.rundll32.exe.49c0000.3.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      13.2.rundll32.exe.5650000.21.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      10.2.rundll32.exe.4b20000.7.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      10.2.rundll32.exe.4990000.2.unpack100%AviraHEUR/AGEN.1145233Download File

                      Domains

                      SourceDetectionScannerLabelLink
                      windowsupdate.s.llnwi.net0%VirustotalBrowse

                      URLs

                      SourceDetectionScannerLabelLink
                      https://www.disneyplus.com/legal/your-california-privacy-rights0%URL Reputationsafe
                      http://crl.ver)0%Avira URL Cloudsafe
                      https://www.disneyplus.com/legal/privacy-policy0%URL Reputationsafe
                      https://www.tiktok.com/legal/report/feedback0%URL Reputationsafe
                      http://help.disneyplus.com.0%URL Reputationsafe
                      https://disneyplus.com/legal.0%URL Reputationsafe

                      Domains and IPs

                      Contacted Domains

                      NameIPActiveMaliciousAntivirus DetectionReputation
                      windowsupdate.s.llnwi.net
                      41.63.96.128
                      truefalseunknown

                      URLs from Memory and Binaries

                      NameSourceMaliciousAntivirus DetectionReputation
                      https://www.disneyplus.com/legal/your-california-privacy-rightssvchost.exe, 00000014.00000003.390495752.000001B9FBF7F000.00000004.00000001.sdmp, svchost.exe, 00000014.00000003.390514239.000001B9FBFC0000.00000004.00000001.sdmp, svchost.exe, 00000014.00000003.390575463.000001B9FBFA0000.00000004.00000001.sdmp, svchost.exe, 00000014.00000003.390534738.000001B9FBFC0000.00000004.00000001.sdmp, svchost.exe, 00000014.00000003.390606876.000001B9FBF5D000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://crl.ver)svchost.exe, 00000014.00000002.409679137.000001B9FB6E9000.00000004.00000001.sdmpfalse
                      • Avira URL Cloud: safe
                      low
                      https://www.disneyplus.com/legal/privacy-policysvchost.exe, 00000014.00000003.390495752.000001B9FBF7F000.00000004.00000001.sdmp, svchost.exe, 00000014.00000003.390514239.000001B9FBFC0000.00000004.00000001.sdmp, svchost.exe, 00000014.00000003.390575463.000001B9FBFA0000.00000004.00000001.sdmp, svchost.exe, 00000014.00000003.390534738.000001B9FBFC0000.00000004.00000001.sdmp, svchost.exe, 00000014.00000003.390606876.000001B9FBF5D000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      https://www.tiktok.com/legal/report/feedbacksvchost.exe, 00000014.00000003.391292817.000001B9FBF7B000.00000004.00000001.sdmp, svchost.exe, 00000014.00000003.391452171.000001B9FBF7B000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://help.disneyplus.com.svchost.exe, 00000014.00000003.390495752.000001B9FBF7F000.00000004.00000001.sdmp, svchost.exe, 00000014.00000003.390514239.000001B9FBFC0000.00000004.00000001.sdmp, svchost.exe, 00000014.00000003.390575463.000001B9FBFA0000.00000004.00000001.sdmp, svchost.exe, 00000014.00000003.390534738.000001B9FBFC0000.00000004.00000001.sdmp, svchost.exe, 00000014.00000003.390606876.000001B9FBF5D000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      https://disneyplus.com/legal.svchost.exe, 00000014.00000003.390495752.000001B9FBF7F000.00000004.00000001.sdmp, svchost.exe, 00000014.00000003.390514239.000001B9FBFC0000.00000004.00000001.sdmp, svchost.exe, 00000014.00000003.390575463.000001B9FBFA0000.00000004.00000001.sdmp, svchost.exe, 00000014.00000003.390534738.000001B9FBFC0000.00000004.00000001.sdmp, svchost.exe, 00000014.00000003.390606876.000001B9FBF5D000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      unknown

                      Contacted IPs

                      • No. of IPs < 25%
                      • 25% < No. of IPs < 50%
                      • 50% < No. of IPs < 75%
                      • 75% < No. of IPs

                      Public

                      IPDomainCountryFlagASNASN NameMalicious
                      207.148.81.119
                      unknownUnited States
                      20473AS-CHOOPAUStrue
                      104.131.62.48
                      unknownUnited States
                      14061DIGITALOCEAN-ASNUStrue
                      85.214.67.203
                      unknownGermany
                      6724STRATOSTRATOAGDEtrue
                      191.252.103.16
                      unknownBrazil
                      27715LocawebServicosdeInternetSABRtrue
                      168.197.250.14
                      unknownArgentina
                      264776OmarAnselmoRipollTDCNETARtrue
                      66.42.57.149
                      unknownUnited States
                      20473AS-CHOOPAUStrue
                      185.148.168.15
                      unknownGermany
                      44780EVERSCALE-ASDEtrue
                      51.210.242.234
                      unknownFrance
                      16276OVHFRtrue
                      217.182.143.207
                      unknownFrance
                      16276OVHFRtrue
                      69.16.218.101
                      unknownUnited States
                      32244LIQUIDWEBUStrue
                      159.69.237.188
                      unknownGermany
                      24940HETZNER-ASDEtrue
                      45.138.98.34
                      unknownGermany
                      9009M247GBtrue
                      116.124.128.206
                      unknownKorea Republic of
                      9318SKB-ASSKBroadbandCoLtdKRtrue
                      78.46.73.125
                      unknownGermany
                      24940HETZNER-ASDEtrue
                      37.59.209.141
                      unknownFrance
                      16276OVHFRtrue
                      210.57.209.142
                      unknownIndonesia
                      38142UNAIR-AS-IDUniversitasAirlanggaIDtrue
                      185.148.168.220
                      unknownGermany
                      44780EVERSCALE-ASDEtrue
                      54.37.228.122
                      unknownFrance
                      16276OVHFRtrue
                      190.90.233.66
                      unknownColombia
                      18678INTERNEXASAESPCOtrue
                      142.4.219.173
                      unknownCanada
                      16276OVHFRtrue
                      54.38.242.185
                      unknownFrance
                      16276OVHFRtrue
                      195.154.146.35
                      unknownFrance
                      12876OnlineSASFRtrue
                      195.77.239.39
                      unknownSpain
                      60493FICOSA-ASEStrue
                      78.47.204.80
                      unknownGermany
                      24940HETZNER-ASDEtrue
                      37.44.244.177
                      unknownGermany
                      47583AS-HOSTINGERLTtrue
                      62.171.178.147
                      unknownUnited Kingdom
                      51167CONTABODEtrue
                      128.199.192.135
                      unknownUnited Kingdom
                      14061DIGITALOCEAN-ASNUStrue

                      Private

                      IP
                      192.168.2.1

                      General Information

                      Joe Sandbox Version:34.0.0 Boulder Opal
                      Analysis ID:553129
                      Start date:14.01.2022
                      Start time:11:06:47
                      Joe Sandbox Product:CloudBasic
                      Overall analysis duration:0h 13m 40s
                      Hypervisor based Inspection enabled:false
                      Report type:light
                      Sample file name:7MhGa3iotM (renamed file extension from none to dll)
                      Cookbook file name:default.jbs
                      Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                      Number of analysed new started processes analysed:31
                      Number of new started drivers analysed:0
                      Number of existing processes analysed:0
                      Number of existing drivers analysed:0
                      Number of injected processes analysed:0
                      Technologies:
                      • HCA enabled
                      • EGA enabled
                      • HDC enabled
                      • AMSI enabled
                      Analysis Mode:default
                      Analysis stop reason:Timeout
                      Detection:MAL
                      Classification:mal100.troj.evad.winDLL@27/9@0/28
                      EGA Information:
                      • Successful, ratio: 83.3%
                      HDC Information:
                      • Successful, ratio: 35.7% (good quality ratio 34%)
                      • Quality average: 75%
                      • Quality standard deviation: 26%
                      HCA Information:
                      • Successful, ratio: 100%
                      • Number of executed functions: 0
                      • Number of non-executed functions: 0
                      Cookbook Comments:
                      • Adjust boot time
                      • Enable AMSI
                      • Override analysis time to 240s for rundll32
                      Warnings:
                      Show All
                      • Exclude process from analysis (whitelisted): audiodg.exe, BackgroundTransferHost.exe, WMIADAP.exe, backgroundTaskHost.exe, wuapihost.exe
                      • Excluded IPs from analysis (whitelisted): 41.63.96.128, 173.222.108.210, 173.222.108.226, 20.54.110.249
                      • Excluded domains from analysis (whitelisted): ris.api.iris.microsoft.com, consumer-displaycatalogrp-aks2aks-europe.md.mp.microsoft.com.akadns.net, displaycatalog-rp-europe.md.mp.microsoft.com.akadns.net, wu-shim.trafficmanager.net, neu-displaycatalogrp.frontdoor.bigcatalog.commerce.microsoft.com, ctldl.windowsupdate.com, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, a767.dspw65.akamai.net, arc.msn.com, displaycatalog-rp.md.mp.microsoft.com.akadns.net, download.windowsupdate.com.edgesuite.net
                      • Not all processes where analyzed, report is missing behavior information
                      • Report creation exceeded maximum time and may have missing disassembly code information.
                      • Report size exceeded maximum capacity and may have missing behavior information.
                      • Report size getting too big, too many NtOpenKeyEx calls found.
                      • Report size getting too big, too many NtProtectVirtualMemory calls found.
                      • Report size getting too big, too many NtQueryValueKey calls found.

                      Simulations

                      Behavior and APIs

                      TimeTypeDescription
                      11:08:32API Interceptor7x Sleep call for process: svchost.exe modified
                      11:08:44API Interceptor1x Sleep call for process: MpCmdRun.exe modified

                      Joe Sandbox View / Context

                      IPs

                      No context

                      Domains

                      No context

                      ASN

                      No context

                      JA3 Fingerprints

                      No context

                      Dropped Files

                      No context

                      Created / dropped Files

                      C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
                      Process:C:\Windows\SysWOW64\rundll32.exe
                      File Type:Microsoft Cabinet archive data, 61414 bytes, 1 file
                      Category:dropped
                      Size (bytes):61414
                      Entropy (8bit):7.995245868798237
                      Encrypted:true
                      SSDEEP:1536:EysgU6qmzixT64jYMZ8HbVPGfVDwm/xLZ9rP:wF6qmeo4eH1m9wmLvrP
                      MD5:ACAEDA60C79C6BCAC925EEB3653F45E0
                      SHA1:2AAAE490BCDACCC6172240FF1697753B37AC5578
                      SHA-256:6B0CECCF0103AFD89844761417C1D23ACC41F8AEBF3B7230765209B61EEE5658
                      SHA-512:FEAA6E7ED7DDA1583739B3E531AB5C562A222EE6ECD042690AE7DCFF966717C6E968469A7797265A11F6E899479AE0F3031E8CF5BEBE1492D5205E9C59690900
                      Malicious:false
                      Preview: MSCF............,...................I.......;w........RSNj .authroot.stl..>.(.5..CK..8T....c_.d...A.K...+.d.H..*i.RJJ.IQIR..$t)Kd.-[..T\{..ne......<.w......A..B........c...wi......D....c.0D,L........fy....Rg...=........i,3.3..Z....~^ve<...TF.*...f.zy.,...m.@.0.0...m.3..I(..+..v#...(.2....e...L..*y..V.......~U...."<ke.....l.X:Dt..R<7.5\A7L0=..T.V...IDr..8<....r&...I-.^..b.b.".Af....E.._..r.>.`;,.Hob..S.....7'..\.R$.".g..+..64..@nP.....k3...B.`.G..@D.....L.....`^...#OpW.....!....`.....rf:.}.R.@....gR.#7....l..H.#...d.Qh..3..fCX....==#..M.l..~&....[.J9.\..Ww.....Tx.%....]..a4E...q.+...#.*a..x..O..V.t..Y1!.T..`U...-...< _@...|(.....0..3.`.LU...E0.Gu.4KN....5...?.....I.p..'..........N<.d.O..dH@c1t...[w/...T....cYK.X>.0..Z.....O>..9.3.#9X.%.b...5.YK.E.V.....`./.3.._..nN]..=..M.o.F.._..z....._...gY..!Z..?l....vp.l.:.d.Z..W.....~...N.._.k...&.....$......i.F.d.....D!e.....Y..,.E..m.;.1... $.F..O.F.o_}.uG....,.%.>,.Zx.......o....c../.;....g&.....
                      C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
                      Process:C:\Windows\SysWOW64\rundll32.exe
                      File Type:data
                      Category:modified
                      Size (bytes):290
                      Entropy (8bit):2.968077906394976
                      Encrypted:false
                      SSDEEP:6:kKhg05SN+SkQlPlEGYRMY9z+4KlDA3RUe/:LHkPlE99SNxAhUe/
                      MD5:73A83B68EEC56F6FCE5D94AFE5DA3754
                      SHA1:C890FCF934893E2C207F0AC9F515F939F961B2CB
                      SHA-256:BA6B5262B6379BFDB13F8FB878C85EE73D2E7EA8901D062B30787C074408B8BE
                      SHA-512:2BAC200648638F8C83B583CC8AE4FE9F4F319A523F9D862476BCEDBCB7F4B13F393C95AEA4EC360C9DC275FC186AEC7E4ECEE32D28D72ACD312607D4944E1349
                      Malicious:false
                      Preview: p...... .........%..z...(....................................................... ........q.\].......................h.t.t.p.:././.c.t.l.d.l...w.i.n.d.o.w.s.u.p.d.a.t.e...c.o.m./.m.s.d.o.w.n.l.o.a.d./.u.p.d.a.t.e./.v.3./.s.t.a.t.i.c./.t.r.u.s.t.e.d.r./.e.n./.a.u.t.h.r.o.o.t.s.t.l...c.a.b...
                      C:\Users\user\AppData\Local\Packages\ActiveSync\LocalState\DiagOutputDir\SyncVerbose.etl
                      Process:C:\Windows\System32\svchost.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):65536
                      Entropy (8bit):0.1101672685363626
                      Encrypted:false
                      SSDEEP:12:26WlXm/Ey6q9995lq3qQ10nMCldimE8eawHjcMN:26WIl68WLyMCldzE9BHjcMN
                      MD5:75C2DE0C97DD15E5AC9CF377585FA04E
                      SHA1:BD1A00C70BA04402662C30704E52F724E1EDFE23
                      SHA-256:E6726753A68B67804E82A85CA857C472E73A8C6F544908A26D72C421CD4CEF8B
                      SHA-512:98DC8FB57398E8BB10A16B046E8E9E56CF13D4D6A4C614558387746E3449A5253BE1C50C587AD4E781A4041F88C318D0FCC8C88EA7E29EB8446784F91280C807
                      Malicious:false
                      Preview: ..........................................................................................{j.....................B..............Zb..................................................@.t.z.r.e.s...d.l.l.,.-.2.1.2.......................................................@.t.z.r.e.s...d.l.l.,.-.2.1.1...........................................................c)un}..... .....@-7.z...........S.y.n.c.V.e.r.b.o.s.e...C.:.\.U.s.e.r.s.\.h.a.r.d.z.\.A.p.p.D.a.t.a.\.L.o.c.a.l.\.p.a.c.k.a.g.e.s.\.A.c.t.i.v.e.S.y.n.c.\.L.o.c.a.l.S.t.a.t.e.\.D.i.a.g.O.u.t.p.u.t.D.i.r.\.S.y.n.c.V.e.r.b.o.s.e...e.t.l...........P.P.........G({j....................................................................................................................................................................................................................................................................................................................................................................................................
                      C:\Users\user\AppData\Local\Packages\ActiveSync\LocalState\DiagOutputDir\UnistackCircular.etl
                      Process:C:\Windows\System32\svchost.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):65536
                      Entropy (8bit):0.11270787281031859
                      Encrypted:false
                      SSDEEP:12:ikXm/Ey6q9995Q1miM3qQ10nMCldimE8eawHza1miIPxp:itl68S1tMLyMCldzE9BHza1tIPv
                      MD5:C2B7134EDA03414935D4BEA1CB0ABB11
                      SHA1:8F30DEA4ACDD8349EE72592EB08C80FDD66903C0
                      SHA-256:8A359453C99992A0DB2003A515696AB1EF23D9269609F79ED1F72D25D8B2F56A
                      SHA-512:4A76F32772F84ADAEC5A2806A67C22120CB7E7B78F9AADD94841340C3DF3DF459923FC8C091BBFA377265F41496FFB85BB59C50B235B77E6C41CA5CE0E690E42
                      Malicious:false
                      Preview: .........................................................................................yyj.....................B..............Zb..................................................@.t.z.r.e.s...d.l.l.,.-.2.1.2.......................................................@.t.z.r.e.s...d.l.l.,.-.2.1.1...........................................................c)un}..... .....%.0.z...........U.n.i.s.t.a.c.k.C.i.r.c.u.l.a.r...C.:.\.U.s.e.r.s.\.h.a.r.d.z.\.A.p.p.D.a.t.a.\.L.o.c.a.l.\.p.a.c.k.a.g.e.s.\.A.c.t.i.v.e.S.y.n.c.\.L.o.c.a.l.S.t.a.t.e.\.D.i.a.g.O.u.t.p.u.t.D.i.r.\.U.n.i.s.t.a.c.k.C.i.r.c.u.l.a.r...e.t.l.......P.P...........yj....................................................................................................................................................................................................................................................................................................................................................................................
                      C:\Users\user\AppData\Local\Packages\ActiveSync\LocalState\DiagOutputDir\UnistackCritical.etl
                      Process:C:\Windows\System32\svchost.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):65536
                      Entropy (8bit):0.1126590871725233
                      Encrypted:false
                      SSDEEP:12:iRVXm/Ey6q9995Q1mK2P3qQ10nMCldimE8eawHza1mK63oN:iR4l68S1iPLyMCldzE9BHza123oN
                      MD5:E7A6CAE1C5F91225F13E66DE1D75FFCF
                      SHA1:23AC2F55B12BEF143E76D1B8E8AC89CB8099C26D
                      SHA-256:65A61535E5289512E2DE344CD19EE17E79ECFD3618AEB32927EFA320203C16AD
                      SHA-512:CC3FDC6B3CF426A252B39E049B72D49B48BAA13FFC73A4E2A8727175BFF7AC75FEEC0EC95087FE121932E872A206EBF1E41CD190D1CCE13D7F89D1EE0178F9B2
                      Malicious:false
                      Preview: .........................................................................................Cxj.....................B..............Zb..................................................@.t.z.r.e.s...d.l.l.,.-.2.1.2.......................................................@.t.z.r.e.s...d.l.l.,.-.2.1.1...........................................................c)un}..... .....%.0.z...........U.n.i.s.t.a.c.k.C.r.i.t.i.c.a.l...C.:.\.U.s.e.r.s.\.h.a.r.d.z.\.A.p.p.D.a.t.a.\.L.o.c.a.l.\.p.a.c.k.a.g.e.s.\.A.c.t.i.v.e.S.y.n.c.\.L.o.c.a.l.S.t.a.t.e.\.D.i.a.g.O.u.t.p.u.t.D.i.r.\.U.n.i.s.t.a.c.k.C.r.i.t.i.c.a.l...e.t.l.......P.P..........Sxj....................................................................................................................................................................................................................................................................................................................................................................................
                      C:\Users\user\AppData\Local\packages\ActiveSync\LocalState\DiagOutputDir\SyncVerbose.etl.0001@` (copy)
                      Process:C:\Windows\System32\svchost.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):65536
                      Entropy (8bit):0.1101672685363626
                      Encrypted:false
                      SSDEEP:12:26WlXm/Ey6q9995lq3qQ10nMCldimE8eawHjcMN:26WIl68WLyMCldzE9BHjcMN
                      MD5:75C2DE0C97DD15E5AC9CF377585FA04E
                      SHA1:BD1A00C70BA04402662C30704E52F724E1EDFE23
                      SHA-256:E6726753A68B67804E82A85CA857C472E73A8C6F544908A26D72C421CD4CEF8B
                      SHA-512:98DC8FB57398E8BB10A16B046E8E9E56CF13D4D6A4C614558387746E3449A5253BE1C50C587AD4E781A4041F88C318D0FCC8C88EA7E29EB8446784F91280C807
                      Malicious:false
                      Preview: ..........................................................................................{j.....................B..............Zb..................................................@.t.z.r.e.s...d.l.l.,.-.2.1.2.......................................................@.t.z.r.e.s...d.l.l.,.-.2.1.1...........................................................c)un}..... .....@-7.z...........S.y.n.c.V.e.r.b.o.s.e...C.:.\.U.s.e.r.s.\.h.a.r.d.z.\.A.p.p.D.a.t.a.\.L.o.c.a.l.\.p.a.c.k.a.g.e.s.\.A.c.t.i.v.e.S.y.n.c.\.L.o.c.a.l.S.t.a.t.e.\.D.i.a.g.O.u.t.p.u.t.D.i.r.\.S.y.n.c.V.e.r.b.o.s.e...e.t.l...........P.P.........G({j....................................................................................................................................................................................................................................................................................................................................................................................................
                      C:\Users\user\AppData\Local\packages\ActiveSync\LocalState\DiagOutputDir\UnistackCircular.etl.0001 (copy)
                      Process:C:\Windows\System32\svchost.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):65536
                      Entropy (8bit):0.11270787281031859
                      Encrypted:false
                      SSDEEP:12:ikXm/Ey6q9995Q1miM3qQ10nMCldimE8eawHza1miIPxp:itl68S1tMLyMCldzE9BHza1tIPv
                      MD5:C2B7134EDA03414935D4BEA1CB0ABB11
                      SHA1:8F30DEA4ACDD8349EE72592EB08C80FDD66903C0
                      SHA-256:8A359453C99992A0DB2003A515696AB1EF23D9269609F79ED1F72D25D8B2F56A
                      SHA-512:4A76F32772F84ADAEC5A2806A67C22120CB7E7B78F9AADD94841340C3DF3DF459923FC8C091BBFA377265F41496FFB85BB59C50B235B77E6C41CA5CE0E690E42
                      Malicious:false
                      Preview: .........................................................................................yyj.....................B..............Zb..................................................@.t.z.r.e.s...d.l.l.,.-.2.1.2.......................................................@.t.z.r.e.s...d.l.l.,.-.2.1.1...........................................................c)un}..... .....%.0.z...........U.n.i.s.t.a.c.k.C.i.r.c.u.l.a.r...C.:.\.U.s.e.r.s.\.h.a.r.d.z.\.A.p.p.D.a.t.a.\.L.o.c.a.l.\.p.a.c.k.a.g.e.s.\.A.c.t.i.v.e.S.y.n.c.\.L.o.c.a.l.S.t.a.t.e.\.D.i.a.g.O.u.t.p.u.t.D.i.r.\.U.n.i.s.t.a.c.k.C.i.r.c.u.l.a.r...e.t.l.......P.P...........yj....................................................................................................................................................................................................................................................................................................................................................................................
                      C:\Users\user\AppData\Local\packages\ActiveSync\LocalState\DiagOutputDir\UnistackCritical.etl.0001C8 (copy)
                      Process:C:\Windows\System32\svchost.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):65536
                      Entropy (8bit):0.1126590871725233
                      Encrypted:false
                      SSDEEP:12:iRVXm/Ey6q9995Q1mK2P3qQ10nMCldimE8eawHza1mK63oN:iR4l68S1iPLyMCldzE9BHza123oN
                      MD5:E7A6CAE1C5F91225F13E66DE1D75FFCF
                      SHA1:23AC2F55B12BEF143E76D1B8E8AC89CB8099C26D
                      SHA-256:65A61535E5289512E2DE344CD19EE17E79ECFD3618AEB32927EFA320203C16AD
                      SHA-512:CC3FDC6B3CF426A252B39E049B72D49B48BAA13FFC73A4E2A8727175BFF7AC75FEEC0EC95087FE121932E872A206EBF1E41CD190D1CCE13D7F89D1EE0178F9B2
                      Malicious:false
                      Preview: .........................................................................................Cxj.....................B..............Zb..................................................@.t.z.r.e.s...d.l.l.,.-.2.1.2.......................................................@.t.z.r.e.s...d.l.l.,.-.2.1.1...........................................................c)un}..... .....%.0.z...........U.n.i.s.t.a.c.k.C.r.i.t.i.c.a.l...C.:.\.U.s.e.r.s.\.h.a.r.d.z.\.A.p.p.D.a.t.a.\.L.o.c.a.l.\.p.a.c.k.a.g.e.s.\.A.c.t.i.v.e.S.y.n.c.\.L.o.c.a.l.S.t.a.t.e.\.D.i.a.g.O.u.t.p.u.t.D.i.r.\.U.n.i.s.t.a.c.k.C.r.i.t.i.c.a.l...e.t.l.......P.P..........Sxj....................................................................................................................................................................................................................................................................................................................................................................................
                      C:\Windows\ServiceProfiles\LocalService\AppData\Local\Temp\MpCmdRun.log
                      Process:C:\Program Files\Windows Defender\MpCmdRun.exe
                      File Type:Little-endian UTF-16 Unicode text, with CRLF, CR line terminators
                      Category:modified
                      Size (bytes):9062
                      Entropy (8bit):3.162897933838449
                      Encrypted:false
                      SSDEEP:192:cY+38+DJl+ibJ6+ioJJ+i3N+WtT+E9tD+Ett3d+E3zl+q:j+s+v+b+P+m+0+Q+q+u+q
                      MD5:593A937962715FDBD857B705A9988F7F
                      SHA1:9AC262E6FD279F69ED37720956C9E545CC6EF56A
                      SHA-256:9B633FC8F9952A7B752D245CD68447D047A72728075ECEDA08A73D96780A94AE
                      SHA-512:690A19B0F33B26893B3E70E61E05B7C31BA9B6FD770381385C78A820DD5875A4F5CF9A37872AE898750D84E5F1F50054B19DD1393E02B6929FE26EA023923DE1
                      Malicious:false
                      Preview: ..........-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.....M.p.C.m.d.R.u.n.:. .C.o.m.m.a.n.d. .L.i.n.e.:. .".C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.W.i.n.d.o.w.s. .D.e.f.e.n.d.e.r.\.m.p.c.m.d.r.u.n...e.x.e.". .-.w.d.e.n.a.b.l.e..... .S.t.a.r.t. .T.i.m.e.:. .. T.h.u. .. J.u.n. .. 2.7. .. 2.0.1.9. .0.1.:.2.9.:.4.9.........M.p.E.n.s.u.r.e.P.r.o.c.e.s.s.M.i.t.i.g.a.t.i.o.n.P.o.l.i.c.y.:. .h.r. .=. .0.x.1.....W.D.E.n.a.b.l.e.....E.R.R.O.R.:. .M.p.W.D.E.n.a.b.l.e.(.T.R.U.E.). .f.a.i.l.e.d. .(.8.0.0.7.0.4.E.C.).....M.p.C.m.d.R.u.n.:. .E.n.d. .T.i.m.e.:. .. T.h.u. .. J.u.n. .. 2.7. .. 2.0.1.9. .0.1.:.2.9.:.4.9.....-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.............-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.

                      Static File Info

                      General

                      File type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                      Entropy (8bit):7.088009857444576
                      TrID:
                      • Win32 Dynamic Link Library (generic) (1002004/3) 95.65%
                      • Win32 EXE PECompact compressed (generic) (41571/9) 3.97%
                      • Generic Win/DOS Executable (2004/3) 0.19%
                      • DOS Executable Generic (2002/1) 0.19%
                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                      File name:7MhGa3iotM.dll
                      File size:417792
                      MD5:752a2613b2b71fc1b99eb611024cc312
                      SHA1:7d59cf93d7b7644119b4f2b3742a40f9960c7ca5
                      SHA256:2df1bd696a635b1dd0c2aec6a20b12148ccc17023be88a6fa1701896a99e2db0
                      SHA512:9a71a8ce212c0afcfc88b7a1bc19b1f3fd61b64f624d2d6d36ecdb6824a03aa8e3cff693d36905bcebdc0eb56c13c66f447f17d2f3213c8165bae0ab13aa5880
                      SSDEEP:6144:o1ju3jPam65ucnNgDoDUhuGGwKveui4VKYjHyCAJOhrmBlDxqms9ujAJKedmL/:yMjcuDaUImcStJorohvsMjmKe
                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......Z'...F...F...F...I...F...I...F...F...D..9....F..9....F..9....F..9....F..9....F..9....F..Rich.F..................PE..L...k+.a...

                      File Icon

                      Icon Hash:71b018ccc6577131

                      Static PE Info

                      General

                      Entrypoint:0x10017b85
                      Entrypoint Section:.text
                      Digitally signed:false
                      Imagebase:0x10000000
                      Subsystem:windows gui
                      Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE, DLL
                      DLL Characteristics:
                      Time Stamp:0x61E02B6B [Thu Jan 13 13:38:51 2022 UTC]
                      TLS Callbacks:
                      CLR (.Net) Version:
                      OS Version Major:4
                      OS Version Minor:0
                      File Version Major:4
                      File Version Minor:0
                      Subsystem Version Major:4
                      Subsystem Version Minor:0
                      Import Hash:90add561a8bf6976696c056c199a41b8

                      Entrypoint Preview

                      Instruction
                      cmp dword ptr [esp+08h], 01h
                      jne 00007FCC00664107h
                      call 00007FCC0066BE88h
                      push dword ptr [esp+04h]
                      mov ecx, dword ptr [esp+10h]
                      mov edx, dword ptr [esp+0Ch]
                      call 00007FCC00663FF2h
                      pop ecx
                      retn 000Ch
                      push 00000000h
                      push dword ptr [esp+14h]
                      push dword ptr [esp+14h]
                      push dword ptr [esp+14h]
                      push dword ptr [esp+14h]
                      call 00007FCC0066BEF0h
                      add esp, 14h
                      ret
                      push eax
                      push dword ptr fs:[00000000h]
                      lea eax, dword ptr [esp+0Ch]
                      sub esp, dword ptr [esp+0Ch]
                      push ebx
                      push esi
                      push edi
                      mov dword ptr [eax], ebp
                      mov ebp, eax
                      mov eax, dword ptr [10057A08h]
                      xor eax, ebp
                      push eax
                      push dword ptr [ebp-04h]
                      mov dword ptr [ebp-04h], FFFFFFFFh
                      lea eax, dword ptr [ebp-0Ch]
                      mov dword ptr fs:[00000000h], eax
                      ret
                      push eax
                      push dword ptr fs:[00000000h]
                      lea eax, dword ptr [esp+0Ch]
                      sub esp, dword ptr [esp+0Ch]
                      push ebx
                      push esi
                      push edi
                      mov dword ptr [eax], ebp
                      mov ebp, eax
                      mov eax, dword ptr [10057A08h]
                      xor eax, ebp
                      push eax
                      mov dword ptr [ebp-10h], esp
                      push dword ptr [ebp-04h]
                      mov dword ptr [ebp-04h], FFFFFFFFh
                      lea eax, dword ptr [ebp-0Ch]
                      mov dword ptr fs:[00000000h], eax
                      ret
                      push eax
                      push dword ptr fs:[00000000h]
                      lea eax, dword ptr [esp+0Ch]
                      sub esp, dword ptr [esp+0Ch]
                      push ebx
                      push esi
                      push edi
                      mov dword ptr [eax], ebp
                      mov ebp, eax
                      mov eax, dword ptr [10057A08h]
                      xor eax, ebp
                      push eax
                      mov dword ptr [ebp-10h], eax

                      Rich Headers

                      Programming Language:
                      • [RES] VS2005 build 50727
                      • [ C ] VS2005 build 50727
                      • [EXP] VS2005 build 50727
                      • [C++] VS2005 build 50727
                      • [ASM] VS2005 build 50727
                      • [LNK] VS2005 build 50727

                      Data Directories

                      NameVirtual AddressVirtual Size Is in Section
                      IMAGE_DIRECTORY_ENTRY_EXPORT0x313c00x50.rdata
                      IMAGE_DIRECTORY_ENTRY_IMPORT0x2fdcc0xb4.rdata
                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x5d0000x3664.rsrc
                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x610000x3df4.reloc
                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x2cd600x40.rdata
                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_IAT0x290000x440.rdata
                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x2fd440x40.rdata
                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                      Sections

                      NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                      .text0x10000x27f5e0x28000False0.514996337891data6.66251942868IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                      .rdata0x290000x84100x9000False0.308946397569data4.83100368645IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .data0x320000x2a9a00x27000False0.963572966747data7.93281036967IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                      .rsrc0x5d0000x36640x4000False0.274780273438data4.49622273105IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .reloc0x610000x82840x9000False0.33251953125data3.82081999119IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                      Resources

                      NameRVASizeTypeLanguageCountry
                      RT_CURSOR0x5db080x134dataChineseChina
                      RT_CURSOR0x5dc3c0xb4dataChineseChina
                      RT_CURSOR0x5dcf00x134AmigaOS bitmap fontChineseChina
                      RT_CURSOR0x5de240x134dataChineseChina
                      RT_CURSOR0x5df580x134dataChineseChina
                      RT_CURSOR0x5e08c0x134dataChineseChina
                      RT_CURSOR0x5e1c00x134dataChineseChina
                      RT_CURSOR0x5e2f40x134dataChineseChina
                      RT_CURSOR0x5e4280x134dataChineseChina
                      RT_CURSOR0x5e55c0x134dataChineseChina
                      RT_CURSOR0x5e6900x134dataChineseChina
                      RT_CURSOR0x5e7c40x134dataChineseChina
                      RT_CURSOR0x5e8f80x134AmigaOS bitmap fontChineseChina
                      RT_CURSOR0x5ea2c0x134dataChineseChina
                      RT_CURSOR0x5eb600x134dataChineseChina
                      RT_CURSOR0x5ec940x134dataChineseChina
                      RT_BITMAP0x5edc80xb8dataChineseChina
                      RT_BITMAP0x5ee800x144dataChineseChina
                      RT_ICON0x5efc40x2e8dBase IV DBT of @.DBF, block length 512, next free block index 40, next free block 67108992, next used block 3293332676ChineseChina
                      RT_ICON0x5f2ac0x128GLS_BINARY_LSB_FIRSTChineseChina
                      RT_DIALOG0x5f3d40x33cdataChineseChina
                      RT_DIALOG0x5f7100xe2dataChineseChina
                      RT_DIALOG0x5f7f40x34dataChineseChina
                      RT_STRING0x5f8280x54dataChineseChina
                      RT_STRING0x5f87c0x2cdataChineseChina
                      RT_STRING0x5f8a80x82dataChineseChina
                      RT_STRING0x5f92c0x1d0dataChineseChina
                      RT_STRING0x5fafc0x164dataChineseChina
                      RT_STRING0x5fc600x132dataChineseChina
                      RT_STRING0x5fd940x50dataChineseChina
                      RT_STRING0x5fde40x40dataChineseChina
                      RT_STRING0x5fe240x6adataChineseChina
                      RT_STRING0x5fe900x1d6dataChineseChina
                      RT_STRING0x600680x110dataChineseChina
                      RT_STRING0x601780x24dataChineseChina
                      RT_STRING0x6019c0x30dataChineseChina
                      RT_GROUP_CURSOR0x601cc0x22Lotus unknown worksheet or configuration, revision 0x2ChineseChina
                      RT_GROUP_CURSOR0x601f00x14Lotus unknown worksheet or configuration, revision 0x1ChineseChina
                      RT_GROUP_CURSOR0x602040x14Lotus unknown worksheet or configuration, revision 0x1ChineseChina
                      RT_GROUP_CURSOR0x602180x14Lotus unknown worksheet or configuration, revision 0x1ChineseChina
                      RT_GROUP_CURSOR0x6022c0x14Lotus unknown worksheet or configuration, revision 0x1ChineseChina
                      RT_GROUP_CURSOR0x602400x14Lotus unknown worksheet or configuration, revision 0x1ChineseChina
                      RT_GROUP_CURSOR0x602540x14Lotus unknown worksheet or configuration, revision 0x1ChineseChina
                      RT_GROUP_CURSOR0x602680x14Lotus unknown worksheet or configuration, revision 0x1ChineseChina
                      RT_GROUP_CURSOR0x6027c0x14Lotus unknown worksheet or configuration, revision 0x1ChineseChina
                      RT_GROUP_CURSOR0x602900x14Lotus unknown worksheet or configuration, revision 0x1ChineseChina
                      RT_GROUP_CURSOR0x602a40x14Lotus unknown worksheet or configuration, revision 0x1ChineseChina
                      RT_GROUP_CURSOR0x602b80x14Lotus unknown worksheet or configuration, revision 0x1ChineseChina
                      RT_GROUP_CURSOR0x602cc0x14Lotus unknown worksheet or configuration, revision 0x1ChineseChina
                      RT_GROUP_CURSOR0x602e00x14Lotus unknown worksheet or configuration, revision 0x1ChineseChina
                      RT_GROUP_CURSOR0x602f40x14Lotus unknown worksheet or configuration, revision 0x1ChineseChina
                      RT_GROUP_ICON0x603080x22dataChineseChina
                      RT_VERSION0x6032c0x2e0dataChineseChina
                      RT_MANIFEST0x6060c0x56ASCII text, with CRLF line terminatorsEnglishUnited States

                      Imports

                      DLLImport
                      KERNEL32.dllCreateFileA, GetCPInfo, GetOEMCP, RtlUnwind, HeapReAlloc, GetCommandLineA, RaiseException, ExitProcess, HeapSize, HeapDestroy, HeapCreate, TerminateProcess, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsDebuggerPresent, GetACP, LCMapStringW, GetStdHandle, SetHandleCount, GetFileType, GetStartupInfoA, FreeEnvironmentStringsA, GetEnvironmentStrings, FreeEnvironmentStringsW, GetEnvironmentStringsW, QueryPerformanceCounter, GetTickCount, GetSystemTimeAsFileTime, GetConsoleCP, GetConsoleMode, GetStringTypeA, GetStringTypeW, SetStdHandle, WriteConsoleA, GetConsoleOutputCP, WriteConsoleW, GetCurrentProcess, GetThreadLocale, FlushFileBuffers, SetFilePointer, WriteFile, ReadFile, GlobalFlags, WritePrivateProfileStringA, TlsFree, DeleteCriticalSection, LocalReAlloc, TlsSetValue, TlsAlloc, InitializeCriticalSection, GlobalHandle, GlobalReAlloc, EnterCriticalSection, TlsGetValue, LeaveCriticalSection, LocalAlloc, InterlockedIncrement, GlobalGetAtomNameA, GlobalFindAtomA, lstrcmpW, GetVersionExA, InterlockedDecrement, FreeResource, GetCurrentProcessId, GlobalAddAtomA, GetCurrentThread, GetCurrentThreadId, ConvertDefaultLocale, GetModuleFileNameA, EnumResourceLanguagesA, GetLocaleInfoA, lstrcmpA, GlobalDeleteAtom, GetModuleHandleA, GlobalFree, GlobalAlloc, GlobalLock, GlobalUnlock, FormatMessageA, LocalFree, FindResourceA, LoadResource, LockResource, SizeofResource, MulDiv, CreateThread, CloseHandle, HeapFree, GetNativeSystemInfo, GetProcessHeap, HeapAlloc, FreeLibrary, GetProcAddress, LoadLibraryA, IsBadReadPtr, VirtualProtect, SetLastError, VirtualAlloc, VirtualFree, VirtualQuery, Sleep, GetLastError, lstrlenA, WideCharToMultiByte, CompareStringA, MultiByteToWideChar, GetVersion, LCMapStringA, InterlockedExchange
                      USER32.dllLoadCursorA, GetSysColorBrush, EndPaint, BeginPaint, ReleaseDC, GetDC, ClientToScreen, GrayStringA, DrawTextExA, DrawTextA, TabbedTextOutA, SetWindowTextA, IsDialogMessageA, SetDlgItemTextA, GetDlgItemTextA, RegisterWindowMessageA, SendDlgItemMessageA, WinHelpA, GetCapture, GetClassLongA, GetClassNameA, SetPropA, GetPropA, RemovePropA, SetFocus, GetWindowTextLengthA, GetWindowTextA, GetForegroundWindow, GetTopWindow, GetMessageTime, MapWindowPoints, SetForegroundWindow, UpdateWindow, GetMenu, CreateWindowExA, GetClassInfoExA, GetClassInfoA, RegisterClassA, GetSysColor, CopyRect, PtInRect, GetDlgCtrlID, DefWindowProcA, CallWindowProcA, SetWindowLongA, SetWindowPos, SystemParametersInfoA, GetWindowPlacement, GetWindowRect, GetWindow, UnhookWindowsHookEx, GetDesktopWindow, SetActiveWindow, CreateDialogIndirectParamA, DestroyWindow, IsWindow, GetDlgItem, GetNextDlgTabItem, EndDialog, GetWindowThreadProcessId, GetWindowLongA, GetLastActivePopup, IsWindowEnabled, MessageBoxA, SetCursor, SetWindowsHookExA, CallNextHookEx, GetMessageA, TranslateMessage, DispatchMessageA, GetActiveWindow, IsWindowVisible, GetKeyState, PeekMessageA, GetCursorPos, ValidateRect, SetMenuItemBitmaps, DestroyMenu, UnregisterClassA, GetMessagePos, GetMenuCheckMarkDimensions, LoadBitmapA, GetFocus, GetParent, ModifyMenuA, EnableMenuItem, CheckMenuItem, PostQuitMessage, GetMenuState, GetMenuItemID, GetMenuItemCount, GetSubMenu, SetTimer, KillTimer, IsIconic, GetSystemMetrics, GetClientRect, DrawIcon, SendMessageA, ShowWindow, EnableWindow, LoadIconA, PostMessageA, AdjustWindowRectEx
                      GDI32.dllSetWindowExtEx, ScaleWindowExtEx, DeleteDC, GetStockObject, ScaleViewportExtEx, SetViewportExtEx, OffsetViewportOrgEx, SetViewportOrgEx, SelectObject, Escape, ExtTextOutA, TextOutA, RectVisible, PtVisible, GetDeviceCaps, DeleteObject, SetMapMode, RestoreDC, SaveDC, GetObjectA, SetBkColor, SetTextColor, GetClipBox, CreateBitmap
                      WINSPOOL.DRVDocumentPropertiesA, ClosePrinter, OpenPrinterA
                      ADVAPI32.dllRegSetValueExA, RegCreateKeyExA, RegQueryValueA, RegEnumKeyA, RegDeleteKeyA, RegOpenKeyExA, RegQueryValueExA, RegOpenKeyA, RegCloseKey
                      SHLWAPI.dllPathFindExtensionA
                      OLEAUT32.dllVariantClear, VariantChangeType, VariantInit
                      WS2_32.dllsendto, recvfrom, WSAStartup, inet_addr, htons, socket, bind, setsockopt, WSACleanup, closesocket, htonl

                      Exports

                      NameOrdinalAddress
                      DllRegisterServer10x10008af0

                      Version Infos

                      DescriptionData
                      LegalCopyright (C) 2014
                      InternalNameUDPTool
                      FileVersion1, 0, 0, 1
                      CompanyName
                      LegalTrademarks
                      ProductNameUDPTool
                      ProductVersion1, 0, 0, 1
                      FileDescriptionUDPTool Microsoft
                      OriginalFilenameUDPTool.EXE
                      Translation0x0804 0x04b0

                      Possible Origin

                      Language of compilation systemCountry where language is spokenMap
                      ChineseChina
                      EnglishUnited States

                      Network Behavior

                      Snort IDS Alerts

                      TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                      01/14/22-11:07:56.625038TCP2404332ET CNC Feodo Tracker Reported CnC Server TCP group 174974680192.168.2.345.138.98.34
                      01/14/22-11:07:57.706065TCP2404338ET CNC Feodo Tracker Reported CnC Server TCP group 20497478080192.168.2.369.16.218.101

                      Network Port Distribution

                      TCP Packets

                      TimestampSource PortDest PortSource IPDest IP
                      Jan 14, 2022 11:07:56.625037909 CET4974680192.168.2.345.138.98.34
                      Jan 14, 2022 11:07:56.641956091 CET804974645.138.98.34192.168.2.3
                      Jan 14, 2022 11:07:57.144354105 CET4974680192.168.2.345.138.98.34
                      Jan 14, 2022 11:07:57.161238909 CET804974645.138.98.34192.168.2.3
                      Jan 14, 2022 11:07:57.675713062 CET4974680192.168.2.345.138.98.34
                      Jan 14, 2022 11:07:57.692599058 CET804974645.138.98.34192.168.2.3
                      Jan 14, 2022 11:07:57.706064939 CET497478080192.168.2.369.16.218.101
                      Jan 14, 2022 11:07:57.836869001 CET80804974769.16.218.101192.168.2.3
                      Jan 14, 2022 11:07:57.837035894 CET497478080192.168.2.369.16.218.101
                      Jan 14, 2022 11:07:58.029316902 CET497478080192.168.2.369.16.218.101
                      Jan 14, 2022 11:07:58.161575079 CET80804974769.16.218.101192.168.2.3
                      Jan 14, 2022 11:07:58.174427986 CET80804974769.16.218.101192.168.2.3
                      Jan 14, 2022 11:07:58.174447060 CET80804974769.16.218.101192.168.2.3
                      Jan 14, 2022 11:07:58.174535990 CET497478080192.168.2.369.16.218.101
                      Jan 14, 2022 11:07:58.174565077 CET497478080192.168.2.369.16.218.101
                      Jan 14, 2022 11:08:02.815704107 CET497478080192.168.2.369.16.218.101
                      Jan 14, 2022 11:08:02.946449041 CET80804974769.16.218.101192.168.2.3
                      Jan 14, 2022 11:08:02.947139025 CET80804974769.16.218.101192.168.2.3
                      Jan 14, 2022 11:08:02.947329998 CET497478080192.168.2.369.16.218.101
                      Jan 14, 2022 11:08:02.957031965 CET497478080192.168.2.369.16.218.101
                      Jan 14, 2022 11:08:03.088649035 CET80804974769.16.218.101192.168.2.3
                      Jan 14, 2022 11:08:03.599564075 CET80804974769.16.218.101192.168.2.3
                      Jan 14, 2022 11:08:03.601670980 CET497478080192.168.2.369.16.218.101
                      Jan 14, 2022 11:08:06.602240086 CET80804974769.16.218.101192.168.2.3
                      Jan 14, 2022 11:08:06.602287054 CET80804974769.16.218.101192.168.2.3
                      Jan 14, 2022 11:08:06.602351904 CET497478080192.168.2.369.16.218.101
                      Jan 14, 2022 11:08:06.602400064 CET497478080192.168.2.369.16.218.101
                      Jan 14, 2022 11:08:06.874569893 CET80804974769.16.218.101192.168.2.3
                      Jan 14, 2022 11:08:06.874675035 CET497478080192.168.2.369.16.218.101
                      Jan 14, 2022 11:09:46.558366060 CET497478080192.168.2.369.16.218.101
                      Jan 14, 2022 11:09:46.558413029 CET497478080192.168.2.369.16.218.101
                      Jan 14, 2022 11:09:46.689791918 CET80804974769.16.218.101192.168.2.3

                      DNS Answers

                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                      Jan 14, 2022 11:08:00.934662104 CET8.8.8.8192.168.2.30x14b3No error (0)windowsupdate.s.llnwi.net41.63.96.128A (IP address)IN (0x0001)
                      Jan 14, 2022 11:08:00.934662104 CET8.8.8.8192.168.2.30x14b3No error (0)windowsupdate.s.llnwi.net41.63.96.0A (IP address)IN (0x0001)

                      Code Manipulations

                      Statistics

                      Behavior

                      Click to jump to process

                      System Behavior

                      General

                      Start time:11:07:42
                      Start date:14/01/2022
                      Path:C:\Windows\System32\SgrmBroker.exe
                      Wow64 process (32bit):false
                      Commandline:C:\Windows\system32\SgrmBroker.exe
                      Imagebase:0x7ff7a43c0000
                      File size:163336 bytes
                      MD5 hash:D3170A3F3A9626597EEE1888686E3EA6
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high

                      General

                      Start time:11:07:42
                      Start date:14/01/2022
                      Path:C:\Windows\System32\svchost.exe
                      Wow64 process (32bit):false
                      Commandline:c:\windows\system32\svchost.exe -k unistacksvcgroup
                      Imagebase:0x7ff70d6e0000
                      File size:51288 bytes
                      MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                      Has elevated privileges:false
                      Has administrator privileges:false
                      Programmed in:C, C++ or other language
                      Reputation:high

                      General

                      Start time:11:07:43
                      Start date:14/01/2022
                      Path:C:\Windows\System32\loaddll32.exe
                      Wow64 process (32bit):true
                      Commandline:loaddll32.exe "C:\Users\user\Desktop\7MhGa3iotM.dll"
                      Imagebase:0x880000
                      File size:116736 bytes
                      MD5 hash:7DEB5DB86C0AC789123DEC286286B938
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:moderate

                      General

                      Start time:11:07:43
                      Start date:14/01/2022
                      Path:C:\Windows\System32\svchost.exe
                      Wow64 process (32bit):false
                      Commandline:c:\windows\system32\svchost.exe -k localservicenetworkrestricted -p -s wscsvc
                      Imagebase:0x7ff70d6e0000
                      File size:51288 bytes
                      MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                      Has elevated privileges:true
                      Has administrator privileges:false
                      Programmed in:C, C++ or other language
                      Reputation:high

                      General

                      Start time:11:07:43
                      Start date:14/01/2022
                      Path:C:\Windows\SysWOW64\cmd.exe
                      Wow64 process (32bit):true
                      Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\7MhGa3iotM.dll",#1
                      Imagebase:0xd80000
                      File size:232960 bytes
                      MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high

                      General

                      Start time:11:07:43
                      Start date:14/01/2022
                      Path:C:\Windows\SysWOW64\regsvr32.exe
                      Wow64 process (32bit):true
                      Commandline:regsvr32.exe /s C:\Users\user\Desktop\7MhGa3iotM.dll
                      Imagebase:0xb70000
                      File size:20992 bytes
                      MD5 hash:426E7499F6A7346F0410DEAD0805586B
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Yara matches:
                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000005.00000002.294428773.0000000004E31000.00000020.00000001.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000005.00000002.294337664.0000000004E00000.00000040.00000001.sdmp, Author: Joe Security
                      Reputation:high

                      General

                      Start time:11:07:43
                      Start date:14/01/2022
                      Path:C:\Windows\SysWOW64\rundll32.exe
                      Wow64 process (32bit):true
                      Commandline:rundll32.exe "C:\Users\user\Desktop\7MhGa3iotM.dll",#1
                      Imagebase:0x8b0000
                      File size:61952 bytes
                      MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Yara matches:
                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000006.00000002.294757561.00000000043D1000.00000020.00000001.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000006.00000002.294482062.0000000002990000.00000040.00000001.sdmp, Author: Joe Security
                      Reputation:high

                      General

                      Start time:11:07:44
                      Start date:14/01/2022
                      Path:C:\Windows\SysWOW64\rundll32.exe
                      Wow64 process (32bit):true
                      Commandline:rundll32.exe C:\Users\user\Desktop\7MhGa3iotM.dll,DllRegisterServer
                      Imagebase:0x8b0000
                      File size:61952 bytes
                      MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Yara matches:
                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000008.00000002.298606993.00000000056B0000.00000040.00000001.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000008.00000002.298670924.00000000056E1000.00000020.00000001.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000008.00000002.297938888.00000000052E1000.00000020.00000001.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000008.00000002.298239999.00000000054F0000.00000040.00000001.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000008.00000002.297893846.0000000005280000.00000040.00000001.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000008.00000002.298028546.0000000005390000.00000040.00000001.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000008.00000002.298441375.0000000005550000.00000040.00000001.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000008.00000002.297464641.0000000003430000.00000040.00000001.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000008.00000002.298510030.0000000005581000.00000020.00000001.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000008.00000002.297668150.0000000004D91000.00000020.00000001.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000008.00000002.298093850.00000000053C1000.00000020.00000001.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000008.00000002.298383199.0000000005521000.00000020.00000001.sdmp, Author: Joe Security
                      Reputation:high

                      General

                      Start time:11:07:44
                      Start date:14/01/2022
                      Path:C:\Windows\SysWOW64\rundll32.exe
                      Wow64 process (32bit):true
                      Commandline:C:\Windows\SysWOW64\rundll32.exe "C:\Users\user\Desktop\7MhGa3iotM.dll",DllRegisterServer
                      Imagebase:0x8b0000
                      File size:61952 bytes
                      MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high

                      General

                      Start time:11:07:44
                      Start date:14/01/2022
                      Path:C:\Windows\SysWOW64\rundll32.exe
                      Wow64 process (32bit):true
                      Commandline:C:\Windows\SysWOW64\rundll32.exe "C:\Users\user\Desktop\7MhGa3iotM.dll",DllRegisterServer
                      Imagebase:0x8b0000
                      File size:61952 bytes
                      MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Yara matches:
                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000A.00000002.297817521.0000000004AF0000.00000040.00000001.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000A.00000002.297755557.0000000004AC1000.00000020.00000001.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000A.00000002.297710814.0000000004A90000.00000040.00000001.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000A.00000002.295787483.0000000000850000.00000040.00000001.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000A.00000002.297638381.00000000049C1000.00000020.00000001.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000A.00000002.297863633.0000000004B21000.00000020.00000001.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000A.00000002.297583118.0000000004990000.00000040.00000001.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000A.00000002.295818674.0000000000881000.00000020.00000001.sdmp, Author: Joe Security
                      Reputation:high

                      General

                      Start time:11:07:47
                      Start date:14/01/2022
                      Path:C:\Windows\SysWOW64\rundll32.exe
                      Wow64 process (32bit):true
                      Commandline:C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Kgiezrb\edgitxrppqaf.tym",JFlwYpDQ
                      Imagebase:0x8b0000
                      File size:61952 bytes
                      MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Yara matches:
                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000C.00000002.301385832.0000000004A71000.00000020.00000001.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000C.00000002.301361900.0000000004A40000.00000040.00000001.sdmp, Author: Joe Security

                      General

                      Start time:11:07:48
                      Start date:14/01/2022
                      Path:C:\Windows\SysWOW64\rundll32.exe
                      Wow64 process (32bit):true
                      Commandline:C:\Windows\SysWOW64\rundll32.exe "C:\Windows\System32\Kgiezrb\edgitxrppqaf.tym",DllRegisterServer
                      Imagebase:0x8b0000
                      File size:61952 bytes
                      MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Yara matches:
                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000D.00000002.815959143.0000000004E91000.00000020.00000001.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000D.00000002.816961696.00000000050F1000.00000020.00000001.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000D.00000002.814399683.0000000002D50000.00000040.00000010.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000D.00000002.815700731.0000000004D00000.00000040.00000001.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000D.00000002.815587816.0000000004C51000.00000020.00000001.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000D.00000002.817960495.0000000005651000.00000020.00000001.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000D.00000002.815509685.0000000004C20000.00000040.00000001.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000D.00000002.815776896.0000000004D31000.00000020.00000001.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000D.00000002.817419709.00000000051D1000.00000020.00000001.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000D.00000002.816312049.0000000004FD1000.00000020.00000001.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000D.00000002.816141431.0000000004EF1000.00000020.00000001.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000D.00000002.814627918.00000000043C1000.00000020.00000010.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000D.00000002.816054659.0000000004EC0000.00000040.00000001.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000D.00000002.814701416.0000000004480000.00000040.00000001.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000D.00000002.816243405.0000000004FA0000.00000040.00000001.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000D.00000002.817244449.00000000051A0000.00000040.00000001.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000D.00000002.815880931.0000000004E60000.00000040.00000001.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000D.00000002.817694741.00000000053A0000.00000040.00000001.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000D.00000002.817922483.0000000005620000.00000040.00000001.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000D.00000002.816664369.00000000050C0000.00000040.00000001.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000D.00000002.815012363.00000000045D1000.00000020.00000001.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000D.00000002.817778819.00000000053D1000.00000020.00000001.sdmp, Author: Joe Security

                      General

                      Start time:11:07:55
                      Start date:14/01/2022
                      Path:C:\Windows\System32\svchost.exe
                      Wow64 process (32bit):false
                      Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p
                      Imagebase:0x7ff70d6e0000
                      File size:51288 bytes
                      MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language

                      General

                      Start time:11:08:06
                      Start date:14/01/2022
                      Path:C:\Windows\System32\svchost.exe
                      Wow64 process (32bit):false
                      Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p
                      Imagebase:0x7ff70d6e0000
                      File size:51288 bytes
                      MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language

                      General

                      Start time:11:08:19
                      Start date:14/01/2022
                      Path:C:\Windows\System32\svchost.exe
                      Wow64 process (32bit):false
                      Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p
                      Imagebase:0x7ff70d6e0000
                      File size:51288 bytes
                      MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language

                      General

                      Start time:11:08:30
                      Start date:14/01/2022
                      Path:C:\Windows\System32\svchost.exe
                      Wow64 process (32bit):false
                      Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p
                      Imagebase:0x7ff70d6e0000
                      File size:51288 bytes
                      MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language

                      General

                      Start time:11:08:43
                      Start date:14/01/2022
                      Path:C:\Program Files\Windows Defender\MpCmdRun.exe
                      Wow64 process (32bit):false
                      Commandline:"C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable
                      Imagebase:0x7ff6b2fd0000
                      File size:455656 bytes
                      MD5 hash:A267555174BFA53844371226F482B86B
                      Has elevated privileges:true
                      Has administrator privileges:false
                      Programmed in:C, C++ or other language

                      General

                      Start time:11:08:44
                      Start date:14/01/2022
                      Path:C:\Windows\System32\conhost.exe
                      Wow64 process (32bit):false
                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Imagebase:0x7ff7f20f0000
                      File size:625664 bytes
                      MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                      Has elevated privileges:true
                      Has administrator privileges:false
                      Programmed in:C, C++ or other language

                      Disassembly

                      Code Analysis

                      Reset < >