Loading ...

Play interactive tourEdit tour

Windows Analysis Report 5o8zdV3GU3

Overview

General Information

Sample Name:5o8zdV3GU3 (renamed file extension from none to dll)
Analysis ID:553143
MD5:189bf4703028e64816a04b4e4ed2767d
SHA1:0b7b0275e4095b367cb9bc54594d67b539b70ff1
SHA256:adadac282d13fd1859a084555e73747d751d27f39059026c08b52f2a316dddc9
Tags:32dllexetrojan
Infos:

Most interesting Screenshot:

Detection

Emotet
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Multi AV Scanner detection for submitted file
Yara detected Emotet
System process connects to network (likely due to code injection or exploit)
Changes security center settings (notifications, updates, antivirus, firewall)
Machine Learning detection for sample
Sigma detected: Suspicious Call by Ordinal
C2 URLs / IPs found in malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query locales information (e.g. system language)
Deletes files inside the Windows folder
May sleep (evasive loops) to hinder dynamic analysis
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Uses code obfuscation techniques (call, push, ret)
Creates files inside the system directory
Internet Provider seen in connection with other malware
Detected potential crypto function
Contains functionality to query CPU information (cpuid)
Found potential string decryption / allocating functions
Sample execution stops while process was sleeping (likely an evasion)
Found evasive API chain (may stop execution after checking a module file name)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to dynamically determine API calls
Contains functionality which may be used to detect a debugger (GetProcessHeap)
IP address seen in connection with other malware
Creates a DirectInput object (often for capturing keystrokes)
AV process strings found (often used to terminate AV products)
Sample file is different than original file name gathered from version info
PE file contains an invalid checksum
PE file contains strange resources
Tries to load missing DLLs
Contains functionality to read the PEB
Drops PE files to the windows directory (C:\Windows)
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Detected TCP or UDP traffic on non-standard ports
Checks if the current process is being debugged
Connects to several IPs in different countries
Potential key logger detected (key state polling based)
Registers a DLL
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Found large amount of non-executed APIs
Creates a process in suspended mode (likely to inject code)

Classification

Process Tree

  • System is w10x64
  • svchost.exe (PID: 6968 cmdline: C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • loaddll32.exe (PID: 7012 cmdline: loaddll32.exe "C:\Users\user\Desktop\5o8zdV3GU3.dll" MD5: 7DEB5DB86C0AC789123DEC286286B938)
    • cmd.exe (PID: 7068 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\5o8zdV3GU3.dll",#1 MD5: F3BDBE3BB6F734E357235F4D5898582D)
      • rundll32.exe (PID: 7156 cmdline: rundll32.exe "C:\Users\user\Desktop\5o8zdV3GU3.dll",#1 MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
        • rundll32.exe (PID: 6428 cmdline: C:\Windows\SysWOW64\rundll32.exe "C:\Users\user\Desktop\5o8zdV3GU3.dll",DllRegisterServer MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
    • regsvr32.exe (PID: 7140 cmdline: regsvr32.exe /s C:\Users\user\Desktop\5o8zdV3GU3.dll MD5: 426E7499F6A7346F0410DEAD0805586B)
      • rundll32.exe (PID: 6476 cmdline: C:\Windows\SysWOW64\rundll32.exe "C:\Users\user\Desktop\5o8zdV3GU3.dll",DllRegisterServer MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
    • rundll32.exe (PID: 6076 cmdline: rundll32.exe C:\Users\user\Desktop\5o8zdV3GU3.dll,DllRegisterServer MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
      • rundll32.exe (PID: 5032 cmdline: C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Mumgmtegektiykh\kztyzxlvaam.cuq",PuybGev MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
        • rundll32.exe (PID: 4008 cmdline: C:\Windows\SysWOW64\rundll32.exe "C:\Windows\System32\Mumgmtegektiykh\kztyzxlvaam.cuq",DllRegisterServer MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
  • svchost.exe (PID: 7048 cmdline: c:\windows\system32\svchost.exe -k localservice -p -s CDPSvc MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 720 cmdline: c:\windows\system32\svchost.exe -k networkservice -p -s DoSvc MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 5140 cmdline: c:\windows\system32\svchost.exe -k unistacksvcgroup MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 6440 cmdline: C:\Windows\System32\svchost.exe -k NetworkService -p MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • SgrmBroker.exe (PID: 6416 cmdline: C:\Windows\system32\SgrmBroker.exe MD5: D3170A3F3A9626597EEE1888686E3EA6)
  • svchost.exe (PID: 6568 cmdline: c:\windows\system32\svchost.exe -k localservicenetworkrestricted -p -s wscsvc MD5: 32569E403279B3FD2EDB7EBD036273FA)
    • MpCmdRun.exe (PID: 4476 cmdline: "C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable MD5: A267555174BFA53844371226F482B86B)
      • conhost.exe (PID: 640 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • svchost.exe (PID: 5028 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 492 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 4104 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 5692 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • cleanup

Malware Configuration

Threatname: Emotet

{"C2 list": ["45.138.98.34:80", "69.16.218.101:8080", "51.210.242.234:8080", "185.148.168.220:8080", "142.4.219.173:8080", "54.38.242.185:443", "191.252.103.16:80", "104.131.62.48:8080", "62.171.178.147:8080", "217.182.143.207:443", "168.197.250.14:80", "37.44.244.177:8080", "66.42.57.149:443", "210.57.209.142:8080", "159.69.237.188:443", "116.124.128.206:8080", "128.199.192.135:8080", "195.154.146.35:443", "185.148.168.15:8080", "195.77.239.39:8080", "207.148.81.119:8080", "85.214.67.203:8080", "190.90.233.66:443", "78.46.73.125:443", "78.47.204.80:443", "37.59.209.141:8080", "54.37.228.122:443"], "Public Key": ["RUNLMSAAAADYNZPXY4tQxd/N4Wn5sTYAm5tUOxY2ol1ELrI4MNhHNi640vSLasjYTHpFRBoG+o84vtr7AJachCzOHjaAJFCW", "RUNTMSAAAAD0LxqDNhonUYwk8sqo7IWuUllRdUiUBnACc6romsQoe1YJD7wIe4AheqYofpZFucPDXCZ0z9i+ooUffqeoLZU0"]}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000006.00000002.288106949.0000000002920000.00000040.00000001.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
    00000009.00000002.295420739.00000000025D0000.00000040.00000001.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
      0000000F.00000002.299662672.0000000004B31000.00000020.00000001.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
        00000009.00000002.295926271.0000000004820000.00000040.00000001.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
          0000000C.00000002.322196530.00000000046F1000.00000020.00000001.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
            Click to see the 23 entries

            Unpacked PEs

            SourceRuleDescriptionAuthorStrings
            9.2.rundll32.exe.4980000.10.raw.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
              12.2.rundll32.exe.4800000.8.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
                9.2.rundll32.exe.47c0000.6.raw.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
                  9.2.rundll32.exe.25d0000.0.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
                    15.2.rundll32.exe.4b30000.1.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
                      Click to see the 37 entries

                      Sigma Overview

                      System Summary:

                      barindex
                      Sigma detected: Suspicious Call by OrdinalShow sources
                      Source: Process startedAuthor: Florian Roth: Data: Command: rundll32.exe "C:\Users\user\Desktop\5o8zdV3GU3.dll",#1, CommandLine: rundll32.exe "C:\Users\user\Desktop\5o8zdV3GU3.dll",#1, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\rundll32.exe, NewProcessName: C:\Windows\SysWOW64\rundll32.exe, OriginalFileName: C:\Windows\SysWOW64\rundll32.exe, ParentCommandLine: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\5o8zdV3GU3.dll",#1, ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 7068, ProcessCommandLine: rundll32.exe "C:\Users\user\Desktop\5o8zdV3GU3.dll",#1, ProcessId: 7156

                      Jbx Signature Overview

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection:

                      barindex
                      Found malware configurationShow sources
                      Source: 9.2.rundll32.exe.47c0000.6.raw.unpackMalware Configuration Extractor: Emotet {"C2 list": ["45.138.98.34:80", "69.16.218.101:8080", "51.210.242.234:8080", "185.148.168.220:8080", "142.4.219.173:8080", "54.38.242.185:443", "191.252.103.16:80", "104.131.62.48:8080", "62.171.178.147:8080", "217.182.143.207:443", "168.197.250.14:80", "37.44.244.177:8080", "66.42.57.149:443", "210.57.209.142:8080", "159.69.237.188:443", "116.124.128.206:8080", "128.199.192.135:8080", "195.154.146.35:443", "185.148.168.15:8080", "195.77.239.39:8080", "207.148.81.119:8080", "85.214.67.203:8080", "190.90.233.66:443", "78.46.73.125:443", "78.47.204.80:443", "37.59.209.141:8080", "54.37.228.122:443"], "Public Key": ["RUNLMSAAAADYNZPXY4tQxd/N4Wn5sTYAm5tUOxY2ol1ELrI4MNhHNi640vSLasjYTHpFRBoG+o84vtr7AJachCzOHjaAJFCW", "RUNTMSAAAAD0LxqDNhonUYwk8sqo7IWuUllRdUiUBnACc6romsQoe1YJD7wIe4AheqYofpZFucPDXCZ0z9i+ooUffqeoLZU0"]}
                      Multi AV Scanner detection for submitted fileShow sources
                      Source: 5o8zdV3GU3.dllVirustotal: Detection: 30%Perma Link
                      Machine Learning detection for sampleShow sources
                      Source: 5o8zdV3GU3.dllJoe Sandbox ML: detected
                      Source: 5o8zdV3GU3.dllStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE, DLL

                      Networking:

                      barindex
                      Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)Show sources
                      Source: TrafficSnort IDS: 2404332 ET CNC Feodo Tracker Reported CnC Server TCP group 17 192.168.2.3:49745 -> 45.138.98.34:80
                      Source: TrafficSnort IDS: 2404338 ET CNC Feodo Tracker Reported CnC Server TCP group 20 192.168.2.3:49746 -> 69.16.218.101:8080
                      System process connects to network (likely due to code injection or exploit)Show sources
                      Source: C:\Windows\SysWOW64\rundll32.exeNetwork Connect: 69.16.218.101 144
                      Source: C:\Windows\SysWOW64\rundll32.exeNetwork Connect: 45.138.98.34 80
                      C2 URLs / IPs found in malware configurationShow sources
                      Source: Malware configuration extractorIPs: 45.138.98.34:80
                      Source: Malware configuration extractorIPs: 69.16.218.101:8080
                      Source: Malware configuration extractorIPs: 51.210.242.234:8080
                      Source: Malware configuration extractorIPs: 185.148.168.220:8080
                      Source: Malware configuration extractorIPs: 142.4.219.173:8080
                      Source: Malware configuration extractorIPs: 54.38.242.185:443
                      Source: Malware configuration extractorIPs: 191.252.103.16:80
                      Source: Malware configuration extractorIPs: 104.131.62.48:8080
                      Source: Malware configuration extractorIPs: 62.171.178.147:8080
                      Source: Malware configuration extractorIPs: 217.182.143.207:443
                      Source: Malware configuration extractorIPs: 168.197.250.14:80
                      Source: Malware configuration extractorIPs: 37.44.244.177:8080
                      Source: Malware configuration extractorIPs: 66.42.57.149:443
                      Source: Malware configuration extractorIPs: 210.57.209.142:8080
                      Source: Malware configuration extractorIPs: 159.69.237.188:443
                      Source: Malware configuration extractorIPs: 116.124.128.206:8080
                      Source: Malware configuration extractorIPs: 128.199.192.135:8080
                      Source: Malware configuration extractorIPs: 195.154.146.35:443
                      Source: Malware configuration extractorIPs: 185.148.168.15:8080
                      Source: Malware configuration extractorIPs: 195.77.239.39:8080
                      Source: Malware configuration extractorIPs: 207.148.81.119:8080
                      Source: Malware configuration extractorIPs: 85.214.67.203:8080
                      Source: Malware configuration extractorIPs: 190.90.233.66:443
                      Source: Malware configuration extractorIPs: 78.46.73.125:443
                      Source: Malware configuration extractorIPs: 78.47.204.80:443
                      Source: Malware configuration extractorIPs: 37.59.209.141:8080
                      Source: Malware configuration extractorIPs: 54.37.228.122:443
                      Source: Joe Sandbox ViewASN Name: AS-CHOOPAUS AS-CHOOPAUS
                      Source: Joe Sandbox ViewASN Name: DIGITALOCEAN-ASNUS DIGITALOCEAN-ASNUS
                      Source: Joe Sandbox ViewIP Address: 207.148.81.119 207.148.81.119
                      Source: Joe Sandbox ViewIP Address: 104.131.62.48 104.131.62.48
                      Source: global trafficTCP traffic: 192.168.2.3:49746 -> 69.16.218.101:8080
                      Source: unknownNetwork traffic detected: IP country count 11
                      Source: unknownTCP traffic detected without corresponding DNS query: 45.138.98.34
                      Source: unknownTCP traffic detected without corresponding DNS query: 45.138.98.34
                      Source: unknownTCP traffic detected without corresponding DNS query: 45.138.98.34
                      Source: unknownTCP traffic detected without corresponding DNS query: 69.16.218.101
                      Source: unknownTCP traffic detected without corresponding DNS query: 69.16.218.101
                      Source: unknownTCP traffic detected without corresponding DNS query: 69.16.218.101
                      Source: unknownTCP traffic detected without corresponding DNS query: 69.16.218.101
                      Source: unknownTCP traffic detected without corresponding DNS query: 69.16.218.101
                      Source: unknownTCP traffic detected without corresponding DNS query: 69.16.218.101
                      Source: unknownTCP traffic detected without corresponding DNS query: 69.16.218.101
                      Source: unknownTCP traffic detected without corresponding DNS query: 69.16.218.101
                      Source: unknownTCP traffic detected without corresponding DNS query: 69.16.218.101
                      Source: unknownTCP traffic detected without corresponding DNS query: 69.16.218.101
                      Source: unknownTCP traffic detected without corresponding DNS query: 69.16.218.101
                      Source: svchost.exe, 00000018.00000003.393856935.000001E6A5995000.00000004.00000001.sdmpString found in binary or memory: Try it free for 30 days, no strings attached\r\n\r\nLike us on Facebook: http://www.facebook.com/spotify \r\nFollow us on Twitter: http://twitter.com/spotify","ProductTitle":"Spotify - Music and Podcasts","SearchTitles":[{"SearchTitleString":"Spotify","SearchTitleType":"SearchHint"},{"SearchTitleString":"Music","SearchTitleType":"SearchHint"},{"SearchTitleString":"music apps","SearchTitleType":"SearchHint"},{"SearchTitleString":"free music","SearchTitleType":"SearchHint"},{"SearchTitleString":"podcasts","SearchTitleType":"SearchHint"},{"SearchTitleString":"streaming","SearchTitleType":"SearchHint"},{"SearchTitleString":"soundcloud","SearchTitleType":"SearchHint"}],"Language":"en-us","Markets":["US","DZ","AR","AU","AT","BH","BD","BE","BR","BG","CA","CL","CN","CO","CR","HR","CY","CZ","DK","EG","EE","FI","FR","DE","GR","GT","HK","HU","IS","IN","ID","IQ","IE","IL","IT","JP","JO","KZ","KE","KW","LV","LB","LI","LT","LU","MY","MT","MR","MX","MA","NL","NZ","NG","NO","OM","PK","PE","PH","PL","PT","QA","RO","RU","SA","RS","SG","SK","SI","ZA","KR","ES","SE","CH","TW","TH","TT","TN","TR","UA","AE","GB","VN","YE","LY","LK","UY","VE","AF","AX","AL","AS","AO","AI","AQ","AG","AM","AW","BO","BQ","BA","BW","BV","IO","BN","BF","BI","KH","CM","CV","KY","CF","TD","TL","DJ","DM","DO","EC","SV","GQ","ER","ET","FK","FO","FJ","GF","PF","TF","GA","GM","GE","GH","GI","GL","GD","GP","GU","GG","GN","GW","GY","HT","HM","HN","AZ","BS","BB","BY","BZ","BJ","BM","BT","KM","CG","CD","CK","CX","CC","CI","CW","JM","SJ","JE","KI","KG","LA","LS","LR","MO","MK","MG","MW","IM","MH","MQ","MU","YT","FM","MD","MN","MS","MZ","MM","NA","NR","NP","MV","ML","NC","NI","NE","NU","NF","PW","PS","PA","PG","PY","RE","RW","BL","MF","WS","ST","SN","MP","PN","SX","SB","SO","SC","SL","GS","SH","KN","LC","PM","VC","TJ","TZ","TG","TK","TO","TM","TC","TV","UM","UG","VI","VG","WF","EH","ZM","ZW","UZ","VU","SR","SZ","AD","MC","SM","ME","VA","NEUTRAL"]}],"MarketProperties":[{"RelatedProducts":[],"Markets":["US"]}],"ProductASchema":"Product;3","ProductBSchema":"ProductUnifiedApp;3","ProductId":"9NCBCSZSJRSB","Properties":{"PackageFamilyName":"SpotifyAB.SpotifyMusic_zpdnekdrzrea0","PackageIdentityName":"SpotifyAB.SpotifyMusic","PublisherCertificateName":"CN=453637B3-4E12-4CDF-B0D3-2A3C863BF6EF","XboxCrossGenSetId":null,"XboxConsoleGenOptimized":null,"XboxConsoleGenCompatible":null},"AlternateIds":[{"IdType":"LegacyWindowsStoreProductId","Value":"ceac5d3f-8a4f-40e1-9a67-76d9108c7cb5"},{"IdType":"LegacyWindowsPhoneProductId","Value":"caac1b9d-621b-4f96-b143-e10e1397740a"},{"IdType":"XboxTitleId","Value":"1681279293"}],"IngestionSource":"DCE","IsMicrosoftProduct":false,"PreferredSkuId":"0010","ProductType":"Application","ValidationData":{"PassedValidation":false,"RevisionId":"2022-01-07T11:33:20.1626869Z||.||d5cdcec3-04df-404e-ba07-3240047c89f9||1152921505694348672||Null||fullrelease","ValidationResultUri":""},"MerchandizingTags":[],"PartD":"","ProductFamily":"Apps","ProductKind":"Application","DisplaySkuAvailab
                      Source: svchost.exe, 00000018.00000003.393856935.000001E6A5995000.00000004.00000001.sdmpString found in binary or memory: Try it free for 30 days, no strings attached\r\n\r\nLike us on Facebook: http://www.facebook.com/spotify \r\nFollow us on Twitter: http://twitter.com/spotify","ProductTitle":"Spotify - Music and Podcasts","SearchTitles":[{"SearchTitleString":"Spotify","SearchTitleType":"SearchHint"},{"SearchTitleString":"Music","SearchTitleType":"SearchHint"},{"SearchTitleString":"music apps","SearchTitleType":"SearchHint"},{"SearchTitleString":"free music","SearchTitleType":"SearchHint"},{"SearchTitleString":"podcasts","SearchTitleType":"SearchHint"},{"SearchTitleString":"streaming","SearchTitleType":"SearchHint"},{"SearchTitleString":"soundcloud","SearchTitleType":"SearchHint"}],"Language":"en-us","Markets":["US","DZ","AR","AU","AT","BH","BD","BE","BR","BG","CA","CL","CN","CO","CR","HR","CY","CZ","DK","EG","EE","FI","FR","DE","GR","GT","HK","HU","IS","IN","ID","IQ","IE","IL","IT","JP","JO","KZ","KE","KW","LV","LB","LI","LT","LU","MY","MT","MR","MX","MA","NL","NZ","NG","NO","OM","PK","PE","PH","PL","PT","QA","RO","RU","SA","RS","SG","SK","SI","ZA","KR","ES","SE","CH","TW","TH","TT","TN","TR","UA","AE","GB","VN","YE","LY","LK","UY","VE","AF","AX","AL","AS","AO","AI","AQ","AG","AM","AW","BO","BQ","BA","BW","BV","IO","BN","BF","BI","KH","CM","CV","KY","CF","TD","TL","DJ","DM","DO","EC","SV","GQ","ER","ET","FK","FO","FJ","GF","PF","TF","GA","GM","GE","GH","GI","GL","GD","GP","GU","GG","GN","GW","GY","HT","HM","HN","AZ","BS","BB","BY","BZ","BJ","BM","BT","KM","CG","CD","CK","CX","CC","CI","CW","JM","SJ","JE","KI","KG","LA","LS","LR","MO","MK","MG","MW","IM","MH","MQ","MU","YT","FM","MD","MN","MS","MZ","MM","NA","NR","NP","MV","ML","NC","NI","NE","NU","NF","PW","PS","PA","PG","PY","RE","RW","BL","MF","WS","ST","SN","MP","PN","SX","SB","SO","SC","SL","GS","SH","KN","LC","PM","VC","TJ","TZ","TG","TK","TO","TM","TC","TV","UM","UG","VI","VG","WF","EH","ZM","ZW","UZ","VU","SR","SZ","AD","MC","SM","ME","VA","NEUTRAL"]}],"MarketProperties":[{"RelatedProducts":[],"Markets":["US"]}],"ProductASchema":"Product;3","ProductBSchema":"ProductUnifiedApp;3","ProductId":"9NCBCSZSJRSB","Properties":{"PackageFamilyName":"SpotifyAB.SpotifyMusic_zpdnekdrzrea0","PackageIdentityName":"SpotifyAB.SpotifyMusic","PublisherCertificateName":"CN=453637B3-4E12-4CDF-B0D3-2A3C863BF6EF","XboxCrossGenSetId":null,"XboxConsoleGenOptimized":null,"XboxConsoleGenCompatible":null},"AlternateIds":[{"IdType":"LegacyWindowsStoreProductId","Value":"ceac5d3f-8a4f-40e1-9a67-76d9108c7cb5"},{"IdType":"LegacyWindowsPhoneProductId","Value":"caac1b9d-621b-4f96-b143-e10e1397740a"},{"IdType":"XboxTitleId","Value":"1681279293"}],"IngestionSource":"DCE","IsMicrosoftProduct":false,"PreferredSkuId":"0010","ProductType":"Application","ValidationData":{"PassedValidation":false,"RevisionId":"2022-01-07T11:33:20.1626869Z||.||d5cdcec3-04df-404e-ba07-3240047c89f9||1152921505694348672||Null||fullrelease","ValidationResultUri":""},"MerchandizingTags":[],"PartD":"","ProductFamily":"Apps","ProductKind":"Application","DisplaySkuAvailab
                      Source: svchost.exe, 00000018.00000003.393856935.000001E6A5995000.00000004.00000001.sdmpString found in binary or memory: Try it free for 30 days, no strings attached\r\n\r\nLike us on Facebook: http://www.facebook.com/spotify \r\nFollow us on Twitter: http://twitter.com/spotify","SkuTitle":"Spotify - Music and Podcasts","Language":"en-us","Markets":["US","DZ","AR","AU","AT","BH","BD","BE","BR","BG","CA","CL","CN","CO","CR","HR","CY","CZ","DK","EG","EE","FI","FR","DE","GR","GT","HK","HU","IS","IN","ID","IQ","IE","IL","IT","JP","JO","KZ","KE","KW","LV","LB","LI","LT","LU","MY","MT","MR","MX","MA","NL","NZ","NG","NO","OM","PK","PE","PH","PL","PT","QA","RO","RU","SA","RS","SG","SK","SI","ZA","KR","ES","SE","CH","TW","TH","TT","TN","TR","UA","AE","GB","VN","YE","LY","LK","UY","VE","AF","AX","AL","AS","AO","AI","AQ","AG","AM","AW","BO","BQ","BA","BW","BV","IO","BN","BF","BI","KH","CM","CV","KY","CF","TD","TL","DJ","DM","DO","EC","SV","GQ","ER","ET","FK","FO","FJ","GF","PF","TF","GA","GM","GE","GH","GI","GL","GD","GP","GU","GG","GN","GW","GY","HT","HM","HN","A equals www.facebook.com (Facebook)
                      Source: svchost.exe, 00000018.00000003.393856935.000001E6A5995000.00000004.00000001.sdmpString found in binary or memory: Try it free for 30 days, no strings attached\r\n\r\nLike us on Facebook: http://www.facebook.com/spotify \r\nFollow us on Twitter: http://twitter.com/spotify","SkuTitle":"Spotify - Music and Podcasts","Language":"en-us","Markets":["US","DZ","AR","AU","AT","BH","BD","BE","BR","BG","CA","CL","CN","CO","CR","HR","CY","CZ","DK","EG","EE","FI","FR","DE","GR","GT","HK","HU","IS","IN","ID","IQ","IE","IL","IT","JP","JO","KZ","KE","KW","LV","LB","LI","LT","LU","MY","MT","MR","MX","MA","NL","NZ","NG","NO","OM","PK","PE","PH","PL","PT","QA","RO","RU","SA","RS","SG","SK","SI","ZA","KR","ES","SE","CH","TW","TH","TT","TN","TR","UA","AE","GB","VN","YE","LY","LK","UY","VE","AF","AX","AL","AS","AO","AI","AQ","AG","AM","AW","BO","BQ","BA","BW","BV","IO","BN","BF","BI","KH","CM","CV","KY","CF","TD","TL","DJ","DM","DO","EC","SV","GQ","ER","ET","FK","FO","FJ","GF","PF","TF","GA","GM","GE","GH","GI","GL","GD","GP","GU","GG","GN","GW","GY","HT","HM","HN","A equals www.twitter.com (Twitter)
                      Source: svchost.exe, 00000018.00000002.411666750.000001E6A52E8000.00000004.00000001.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
                      Source: svchost.exe, 00000018.00000002.411666750.000001E6A52E8000.00000004.00000001.sdmpString found in binary or memory: http://crl.ver)
                      Source: 77EC63BDA74BD0D0E0426DC8F80085060.18.drString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
                      Source: rundll32.exe, 00000012.00000003.346414857.00000000055BE000.00000004.00000001.sdmp, rundll32.exe, 00000012.00000003.347045018.0000000005590000.00000004.00000001.sdmp, rundll32.exe, 00000012.00000003.347166038.00000000055B6000.00000004.00000001.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab?b1afdd3bf6d13
                      Source: svchost.exe, 00000018.00000003.388724008.000001E6A595D000.00000004.00000001.sdmp, svchost.exe, 00000018.00000003.388810562.000001E6A5E02000.00000004.00000001.sdmp, svchost.exe, 00000018.00000003.388740953.000001E6A5979000.00000004.00000001.sdmpString found in binary or memory: http://help.disneyplus.com.
                      Source: svchost.exe, 0000000D.00000002.312216539.0000027C67A13000.00000004.00000001.sdmpString found in binary or memory: http://www.bingmapsportal.com
                      Source: svchost.exe, 00000003.00000002.808986189.0000026843644000.00000004.00000001.sdmpString found in binary or memory: https://%s.dnet.xboxlive.com
                      Source: svchost.exe, 00000003.00000002.808986189.0000026843644000.00000004.00000001.sdmpString found in binary or memory: https://%s.xboxlive.com
                      Source: svchost.exe, 00000003.00000002.808986189.0000026843644000.00000004.00000001.sdmpString found in binary or memory: https://activity.windows.com
                      Source: svchost.exe, 00000003.00000002.808986189.0000026843644000.00000004.00000001.sdmpString found in binary or memory: https://activity.windows.comr
                      Source: svchost.exe, 0000000D.00000003.311061989.0000027C67A60000.00000004.00000001.sdmpString found in binary or memory: https://appexmapsappupdate.blob.core.windows.net
                      Source: svchost.exe, 00000003.00000002.808986189.0000026843644000.00000004.00000001.sdmpString found in binary or memory: https://bn2.notify.windows.com/v2/register/xplatform/device
                      Source: svchost.exe, 00000003.00000002.808986189.0000026843644000.00000004.00000001.sdmpString found in binary or memory: https://co4-df.notify.windows.com/v2/register/xplatform/device
                      Source: svchost.exe, 0000000D.00000003.311173852.0000027C67A49000.00000004.00000001.sdmpString found in binary or memory: https://dev.ditu.live.com/REST/v1/Imagery/Copyright/
                      Source: svchost.exe, 0000000D.00000003.311061989.0000027C67A60000.00000004.00000001.sdmpString found in binary or memory: https://dev.ditu.live.com/REST/v1/Locations
                      Source: svchost.exe, 0000000D.00000002.312248027.0000027C67A3D000.00000004.00000001.sdmpString found in binary or memory: https://dev.ditu.live.com/REST/v1/Routes/
                      Source: svchost.exe, 0000000D.00000003.310880307.0000027C67A67000.00000004.00000001.sdmp, svchost.exe, 0000000D.00000002.312284199.0000027C67A69000.00000004.00000001.sdmpString found in binary or memory: https://dev.ditu.live.com/REST/v1/Transit/Stops/
                      Source: svchost.exe, 0000000D.00000003.311061989.0000027C67A60000.00000004.00000001.sdmpString found in binary or memory: https://dev.ditu.live.com/mapcontrol/logging.ashx
                      Source: svchost.exe, 0000000D.00000002.312260288.0000027C67A4B000.00000004.00000001.sdmp, svchost.exe, 0000000D.00000003.311173852.0000027C67A49000.00000004.00000001.sdmpString found in binary or memory: https://dev.ditu.live.com/mapcontrol/mapconfiguration.ashx?name=native&v=
                      Source: svchost.exe, 0000000D.00000003.287688148.0000027C67A31000.00000004.00000001.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Locations
                      Source: svchost.exe, 0000000D.00000002.312248027.0000027C67A3D000.00000004.00000001.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Routes/
                      Source: svchost.exe, 0000000D.00000003.311061989.0000027C67A60000.00000004.00000001.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Routes/Driving
                      Source: svchost.exe, 0000000D.00000003.311061989.0000027C67A60000.00000004.00000001.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Routes/Transit
                      Source: svchost.exe, 0000000D.00000003.311061989.0000027C67A60000.00000004.00000001.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Routes/Walking
                      Source: svchost.exe, 0000000D.00000003.311625138.0000027C67A41000.00000004.00000001.sdmp, svchost.exe, 0000000D.00000003.311420754.0000027C67A40000.00000004.00000001.sdmp, svchost.exe, 0000000D.00000002.312254295.0000027C67A42000.00000004.00000001.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Transit/Schedules/
                      Source: svchost.exe, 0000000D.00000003.311625138.0000027C67A41000.00000004.00000001.sdmp, svchost.exe, 0000000D.00000003.311420754.0000027C67A40000.00000004.00000001.sdmp, svchost.exe, 0000000D.00000002.312254295.0000027C67A42000.00000004.00000001.sdmpString found in binary or memory: https://dev.virtualearth.net/mapcontrol/HumanScaleServices/GetBubbles.ashx?n=
                      Source: svchost.exe, 0000000D.00000003.311061989.0000027C67A60000.00000004.00000001.sdmpString found in binary or memory: https://dev.virtualearth.net/mapcontrol/logging.ashx
                      Source: svchost.exe, 0000000D.00000003.311420754.0000027C67A40000.00000004.00000001.sdmp, svchost.exe, 0000000D.00000002.312269483.0000027C67A5C000.00000004.00000001.sdmpString found in binary or memory: https://dev.virtualearth.net/webservices/v1/LoggingService/LoggingService.svc/Log?
                      Source: svchost.exe, 00000018.00000003.388724008.000001E6A595D000.00000004.00000001.sdmp, svchost.exe, 00000018.00000003.388810562.000001E6A5E02000.00000004.00000001.sdmp, svchost.exe, 00000018.00000003.388740953.000001E6A5979000.00000004.00000001.sdmpString found in binary or memory: https://disneyplus.com/legal.
                      Source: svchost.exe, 0000000D.00000003.311173852.0000027C67A49000.00000004.00000001.sdmpString found in binary or memory: https://dynamic.api.tiles.ditu.live.com/odvs/gd?pv=1&r=
                      Source: svchost.exe, 0000000D.00000002.312269483.0000027C67A5C000.00000004.00000001.sdmpString found in binary or memory: https://dynamic.api.tiles.ditu.live.com/odvs/gdi?pv=1&r=
                      Source: svchost.exe, 0000000D.00000002.312269483.0000027C67A5C000.00000004.00000001.sdmpString found in binary or memory: https://dynamic.api.tiles.ditu.live.com/odvs/gdv?pv=1&r=
                      Source: svchost.exe, 0000000D.00000003.311173852.0000027C67A49000.00000004.00000001.sdmpString found in binary or memory: https://dynamic.t
                      Source: svchost.exe, 0000000D.00000003.311061989.0000027C67A60000.00000004.00000001.sdmpString found in binary or memory: https://dynamic.t0.tiles.ditu.live.com/comp/gen.ashx
                      Source: svchost.exe, 0000000D.00000002.312248027.0000027C67A3D000.00000004.00000001.sdmpString found in binary or memory: https://ecn.dev.virtualearth.net/REST/v1/Imagery/Copyright/
                      Source: svchost.exe, 0000000D.00000003.287688148.0000027C67A31000.00000004.00000001.sdmpString found in binary or memory: https://ecn.dev.virtualearth.net/mapcontrol/mapconfiguration.ashx?name=native&v=
                      Source: svchost.exe, 0000000D.00000002.312248027.0000027C67A3D000.00000004.00000001.sdmpString found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/comp/gen.ashx
                      Source: svchost.exe, 0000000D.00000002.312248027.0000027C67A3D000.00000004.00000001.sdmp, svchost.exe, 0000000D.00000002.312216539.0000027C67A13000.00000004.00000001.sdmpString found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gd?pv=1&r=
                      Source: svchost.exe, 0000000D.00000003.311420754.0000027C67A40000.00000004.00000001.sdmp, svchost.exe, 0000000D.00000003.311559423.0000027C67A45000.00000004.00000001.sdmpString found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdi?pv=1&r=
                      Source: svchost.exe, 0000000D.00000003.311420754.0000027C67A40000.00000004.00000001.sdmp, svchost.exe, 0000000D.00000003.311559423.0000027C67A45000.00000004.00000001.sdmpString found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdv?pv=1&r=
                      Source: svchost.exe, 0000000D.00000003.287688148.0000027C67A31000.00000004.00000001.sdmpString found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gri?pv=1&r=
                      Source: svchost.exe, 0000000D.00000003.311709544.0000027C67A3A000.00000004.00000001.sdmp, svchost.exe, 0000000D.00000003.287688148.0000027C67A31000.00000004.00000001.sdmpString found in binary or memory: https://t0.ssl.ak.tiles.virtualearth.net/tiles/gen
                      Source: svchost.exe, 0000000D.00000002.312260288.0000027C67A4B000.00000004.00000001.sdmp, svchost.exe, 0000000D.00000003.311173852.0000027C67A49000.00000004.00000001.sdmpString found in binary or memory: https://t0.tiles.ditu.live.com/tiles/gen
                      Source: svchost.exe, 00000018.00000003.388724008.000001E6A595D000.00000004.00000001.sdmp, svchost.exe, 00000018.00000003.388810562.000001E6A5E02000.00000004.00000001.sdmp, svchost.exe, 00000018.00000003.388740953.000001E6A5979000.00000004.00000001.sdmpString found in binary or memory: https://www.disneyplus.com/legal/privacy-policy
                      Source: svchost.exe, 00000018.00000003.388724008.000001E6A595D000.00000004.00000001.sdmp, svchost.exe, 00000018.00000003.388810562.000001E6A5E02000.00000004.00000001.sdmp, svchost.exe, 00000018.00000003.388740953.000001E6A5979000.00000004.00000001.sdmpString found in binary or memory: https://www.disneyplus.com/legal/your-california-privacy-rights
                      Source: svchost.exe, 00000018.00000003.389559591.000001E6A597C000.00000004.00000001.sdmp, svchost.exe, 00000018.00000003.389828999.000001E6A599E000.00000004.00000001.sdmp, svchost.exe, 00000018.00000003.389643100.000001E6A59D6000.00000004.00000001.sdmp, svchost.exe, 00000018.00000003.389608441.000001E6A59D6000.00000004.00000001.sdmpString found in binary or memory: https://www.tiktok.com/legal/report/feedback
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 6_2_100012D0 recvfrom,
                      Source: loaddll32.exe, 00000002.00000002.292296586.00000000015EB000.00000004.00000020.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 6_2_1000FF59 GetKeyState,GetKeyState,GetKeyState,GetKeyState,SendMessageA,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1000FF59 GetKeyState,GetKeyState,GetKeyState,GetKeyState,SendMessageA,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_1000FF59 GetKeyState,GetKeyState,GetKeyState,GetKeyState,SendMessageA,

                      E-Banking Fraud:

                      barindex
                      Yara detected EmotetShow sources
                      Source: Yara matchFile source: 9.2.rundll32.exe.4980000.10.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 12.2.rundll32.exe.4800000.8.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 9.2.rundll32.exe.47c0000.6.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 9.2.rundll32.exe.25d0000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 15.2.rundll32.exe.4b30000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 12.2.rundll32.exe.4800000.8.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 12.2.rundll32.exe.25c0000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 7.2.rundll32.exe.3340000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 7.2.rundll32.exe.3340000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 9.2.rundll32.exe.4660000.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 9.2.rundll32.exe.4820000.8.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 9.2.rundll32.exe.4980000.10.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 9.2.rundll32.exe.45b0000.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 9.2.rundll32.exe.4690000.5.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 12.2.rundll32.exe.46f0000.5.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 9.2.rundll32.exe.4850000.9.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 9.2.rundll32.exe.49b0000.11.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 7.2.rundll32.exe.3370000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 9.2.rundll32.exe.4580000.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 15.2.rundll32.exe.3240000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 12.2.rundll32.exe.3ff0000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 12.2.rundll32.exe.4590000.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 12.2.rundll32.exe.46c0000.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 12.2.rundll32.exe.4590000.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 9.2.rundll32.exe.2600000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 9.2.rundll32.exe.4660000.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 12.2.rundll32.exe.25c0000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 15.2.rundll32.exe.3240000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 12.2.rundll32.exe.47a0000.6.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 9.2.rundll32.exe.47f0000.7.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 9.2.rundll32.exe.25d0000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.2.regsvr32.exe.2920000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 12.2.rundll32.exe.46c0000.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.2.regsvr32.exe.2920000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 9.2.rundll32.exe.4580000.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.2.regsvr32.exe.4220000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 9.2.rundll32.exe.4820000.8.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 12.2.rundll32.exe.47d0000.7.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 9.2.rundll32.exe.47c0000.6.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 12.2.rundll32.exe.4830000.9.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 12.2.rundll32.exe.45c0000.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 12.2.rundll32.exe.47a0000.6.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000006.00000002.288106949.0000000002920000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000009.00000002.295420739.00000000025D0000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000F.00000002.299662672.0000000004B31000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000009.00000002.295926271.0000000004820000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000C.00000002.322196530.00000000046F1000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000006.00000002.288171571.0000000004221000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000009.00000002.295834893.0000000004691000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000C.00000002.322096907.0000000004590000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000009.00000002.295905840.00000000047F1000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000C.00000002.322237408.00000000047A0000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000009.00000002.295970010.0000000004980000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000C.00000002.322126344.00000000045C1000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000C.00000002.322324942.0000000004831000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000C.00000002.322265167.00000000047D1000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000009.00000002.295742622.0000000004580000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000009.00000002.295801770.0000000004660000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000C.00000002.321908815.0000000003FF1000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000C.00000002.322168517.00000000046C0000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000009.00000002.295884974.00000000047C0000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000C.00000002.321798721.00000000025C0000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000009.00000002.295946412.0000000004851000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000007.00000002.291064992.0000000003371000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000F.00000002.299581696.0000000003240000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000009.00000002.295994852.00000000049B1000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000009.00000002.295767081.00000000045B1000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000007.00000002.291040092.0000000003340000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000C.00000002.322291454.0000000004800000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000009.00000002.295442330.0000000002601000.00000020.00000001.sdmp, type: MEMORY

                      System Summary:

                      barindex
                      Source: 5o8zdV3GU3.dllStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE, DLL
                      Source: C:\Windows\SysWOW64\rundll32.exeFile deleted: C:\Windows\SysWOW64\Mumgmtegektiykh\kztyzxlvaam.cuq:Zone.IdentifierJump to behavior
                      Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Windows\SysWOW64\Mumgmtegektiykh\Jump to behavior
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 6_2_10020011
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 6_2_100181CA
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 6_2_1001929D
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 6_2_1002542D
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 6_2_100274AE
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 6_2_10026575
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 6_2_1001869D
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 6_2_1001178A
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 6_2_10016860
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 6_2_1002596F
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 6_2_10022A5C
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 6_2_10018A71
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 6_2_1001AAB7
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 6_2_1001CB16
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 6_2_10018E7D
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 6_2_10025EB1
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 6_2_042385FF
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 6_2_0423EFDD
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 6_2_04223431
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 6_2_0423DC71
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 6_2_0423A474
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 6_2_04227442
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 6_2_0422A445
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 6_2_04221CA1
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 6_2_0423E4E5
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 6_2_0423CCD9
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 6_2_04238D3D
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 6_2_0423AD08
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 6_2_04235515
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 6_2_0423654A
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 6_2_04242D53
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 6_2_04237D5B
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 6_2_04233D85
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 6_2_04239DF5
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 6_2_042255FF
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 6_2_0423C5D5
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 6_2_0422C5D8
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 6_2_04228636
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 6_2_0422DE74
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 6_2_0423567B
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 6_2_04227E79
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 6_2_0422E640
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 6_2_04232E5D
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 6_2_04233EAA
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 6_2_042436AA
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 6_2_042446BD
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 6_2_0422C6B8
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 6_2_04230EBC
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 6_2_04243EE9
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 6_2_0423BEFD
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 6_2_04221F38
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 6_2_0422670B
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 6_2_0422EF0C
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 6_2_04234F74
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 6_2_04239774
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 6_2_04235779
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 6_2_0423FF58
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 6_2_042277A3
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 6_2_04238FAE
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 6_2_042407AA
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 6_2_042417BD
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 6_2_042257B8
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 6_2_0422BFBE
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 6_2_04230F86
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 6_2_042367E6
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 6_2_0422E7DE
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 6_2_0422B820
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 6_2_04238806
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 6_2_04242009
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 6_2_0422A871
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 6_2_04227078
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 6_2_0423F840
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 6_2_0422F0E9
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 6_2_042400EF
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 6_2_042280C0
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 6_2_0423D8DB
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 6_2_0423017B
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 6_2_04232142
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 6_2_0422D14C
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 6_2_0423E955
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 6_2_0423D1BC
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 6_2_04236187
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 6_2_04222194
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 6_2_0423E1F8
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 6_2_04239A01
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 6_2_04237A0F
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 6_2_04240A64
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 6_2_04234A66
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 6_2_04243263
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 6_2_04234244
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 6_2_0423B257
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 6_2_0423A2A5
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 6_2_0422BAA9
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 6_2_04230ABA
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 6_2_0423CAD5
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 6_2_04235333
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 6_2_04242B09
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10020011
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_100181CA
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1001929D
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1002542D
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_100274AE
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10026575
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1001869D
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1001178A
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10016860
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1002596F
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10022A5C
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10018A71
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1001AAB7
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1001CB16
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10018E7D
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10025EB1
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_10020011
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_100181CA
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_1001929D
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_1002542D
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_100274AE
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_10026575
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_1001869D
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_1001178A
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_10016860
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_1002596F
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_10022A5C
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_10018A71
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_1001AAB7
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_1001CB16
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_10018E7D
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_10025EB1
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_0400AD08
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_0400654A
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_0400FF58
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_0400EFDD
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_04012009
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_03FF670B
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_04002142
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_03FFDE74
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_03FF8636
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_04007A0F
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_03FFC5D8
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_04004A66
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_03FFA445
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_03FF4BFC
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_0400DC71
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_03FFFB8E
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_03FF238C
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_0400A474
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_03FF6B7A
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_03FFF369
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_0400CCD9
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_0400E4E5
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_04005515
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_04008D3D
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_04012D53
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_03FFBAA9
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_04007D5B
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_04003D85
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_0400C5D5
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_04009DF5
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_040085FF
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_04002E5D
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_03FF2194
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_0400567B
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_04003EAA
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_040136AA
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_03FFD14C
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_04000EBC
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_040146BD
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_04013EE9
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_0400BEFD
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_03FFF0E9
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_03FF80C0
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_04004F74
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_04009774
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_04005779
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_04000F86
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_03FF7078
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_03FFA871
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_040107AA
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_04008FAE
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_040117BD
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_03FFB820
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_040067E6
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_040007F4
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_040027F9
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_04008806
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_03FFE7DE
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_0400F840
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_03FFBFBE
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_03FF57B8
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_03FF77A3
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_03FF1F38
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_0400D8DB
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_040100EF
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_03FFEF0C
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_03FFC6B8
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_0400E955
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_0400017B
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_03FF7E79
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_04006187
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_0400D1BC
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_03FFE640
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_0400E1F8
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_03FF55FF
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_04009A01
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_04004244
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_0400B257
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_04013263
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_04010A64
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_0400A2A5
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_04000ABA
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_0400CAD5
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_04012B09
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_04005333
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_03FF1CA1
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_0400437A
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_03FF7442
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_03FF3431
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_0400FBDE
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_04B485FF
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_04B4EFDD
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_04B546BD
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_04B40EBC
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_04B3C6B8
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_04B40ABA
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_04B4A2A5
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_04B31CA1
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_04B3BAA9
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_04B43EAA
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_04B536AA
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_04B4BEFD
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_04B4E4E5
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_04B3F0E9
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_04B500EF
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_04B53EE9
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_04B4CAD5
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_04B4CCD9
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_04B4D8DB
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_04B380C0
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_04B33431
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_04B38636
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_04B3B820
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_04B48806
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_04B49A01
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_04B47A0F
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_04B52009
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_04B4A474
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_04B3A871
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_04B4DC71
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_04B3DE74
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_04B37E79
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_04B37078
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_04B4567B
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_04B50A64
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_04B44A66
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_04B53263
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_04B4B257
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_04B42E5D
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_04B44244
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_04B37442
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_04B3E640
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_04B4F840
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_04B3A445
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_04B4D1BC
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_04B517BD
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_04B357B8
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_04B3BFBE
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_04B377A3
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_04B48FAE
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_04B507AA
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_04B32194
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_04B43D85
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_04B40F86
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_04B46187
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_04B3FB8E
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_04B3238C
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_04B49DF5
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_04B4E1F8
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_04B355FF
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_04B34BFC
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_04B467E6
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_04B4C5D5
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_04B3C5D8
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_04B3E7DE
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_04B45333
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_04B48D3D
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_04B31F38
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_04B45515
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_04B3670B
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_04B52B09
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_04B4AD08
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_04B3EF0C
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_04B44F74
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_04B49774
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_04B36B7A
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_04B45779
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_04B4017B
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_04B3F369
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_04B4E955
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_04B52D53
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_04B4FF58
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_04B47D5B
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_04B42142
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_04B4654A
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_04B3D14C
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: String function: 10017BC1 appears 68 times
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: String function: 1001984C appears 48 times
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: String function: 10017BC1 appears 136 times
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: String function: 1000D5EC appears 38 times
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: String function: 1001A471 appears 40 times
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: String function: 1001984C appears 96 times
                      Source: 5o8zdV3GU3.dllBinary or memory string: OriginalFilenameUDPTool.EXE: vs 5o8zdV3GU3.dll
                      Source: 5o8zdV3GU3.dllStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                      Source: C:\Windows\System32\svchost.exeSection loaded: xboxlivetitleid.dll
                      Source: C:\Windows\System32\svchost.exeSection loaded: cdpsgshims.dll
                      Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: sfc.dll
                      Source: 5o8zdV3GU3.dllVirustotal: Detection: 30%
                      Source: 5o8zdV3GU3.dllStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                      Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
                      Source: unknownProcess created: C:\Windows\System32\loaddll32.exe loaddll32.exe "C:\Users\user\Desktop\5o8zdV3GU3.dll"
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe c:\windows\system32\svchost.exe -k localservice -p -s CDPSvc
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\5o8zdV3GU3.dll",#1
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\5o8zdV3GU3.dll
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\5o8zdV3GU3.dll",#1
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe c:\windows\system32\svchost.exe -k networkservice -p -s DoSvc
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\5o8zdV3GU3.dll,DllRegisterServer
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe c:\windows\system32\svchost.exe -k unistacksvcgroup
                      Source: C:\Windows\SysWOW64\regsvr32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\rundll32.exe "C:\Users\user\Desktop\5o8zdV3GU3.dll",DllRegisterServer
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\rundll32.exe "C:\Users\user\Desktop\5o8zdV3GU3.dll",DllRegisterServer
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k NetworkService -p
                      Source: unknownProcess created: C:\Windows\System32\SgrmBroker.exe C:\Windows\system32\SgrmBroker.exe
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Mumgmtegektiykh\kztyzxlvaam.cuq",PuybGev
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe c:\windows\system32\svchost.exe -k localservicenetworkrestricted -p -s wscsvc
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\rundll32.exe "C:\Windows\System32\Mumgmtegektiykh\kztyzxlvaam.cuq",DllRegisterServer
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p
                      Source: C:\Windows\System32\svchost.exeProcess created: C:\Program Files\Windows Defender\MpCmdRun.exe "C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable
                      Source: C:\Program Files\Windows Defender\MpCmdRun.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\5o8zdV3GU3.dll",#1
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\5o8zdV3GU3.dll
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\5o8zdV3GU3.dll,DllRegisterServer
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\5o8zdV3GU3.dll",#1
                      Source: C:\Windows\SysWOW64\regsvr32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\rundll32.exe "C:\Users\user\Desktop\5o8zdV3GU3.dll",DllRegisterServer
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\rundll32.exe "C:\Users\user\Desktop\5o8zdV3GU3.dll",DllRegisterServer
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Mumgmtegektiykh\kztyzxlvaam.cuq",PuybGev
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\rundll32.exe "C:\Windows\System32\Mumgmtegektiykh\kztyzxlvaam.cuq",DllRegisterServer
                      Source: C:\Windows\System32\svchost.exeProcess created: C:\Program Files\Windows Defender\MpCmdRun.exe "C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable
                      Source: C:\Windows\SysWOW64\rundll32.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32
                      Source: C:\Windows\System32\svchost.exeFile created: C:\Users\user\AppData\Local\packages\ActiveSync\LocalState\DiagOutputDir\UnistackCritical.etlJump to behavior
                      Source: classification engineClassification label: mal100.troj.evad.winDLL@31/10@0/27
                      Source: C:\Windows\SysWOW64\rundll32.exeFile read: C:\Users\desktop.iniJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\5o8zdV3GU3.dll",#1
                      Source: C:\Windows\System32\conhost.exeMutant created: \BaseNamedObjects\Local\SM0:640:120:WilError_01
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 6_2_100126F9 FindResourceA,LoadResource,LockResource,FreeResource,
                      Source: C:\Windows\SysWOW64\rundll32.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: 5o8zdV3GU3.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                      Source: 5o8zdV3GU3.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                      Source: 5o8zdV3GU3.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                      Source: 5o8zdV3GU3.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                      Source: 5o8zdV3GU3.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 6_2_10019891 push ecx; ret
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 6_2_10017C60 push ecx; ret
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 6_2_042308E0 push esp; iretd
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 6_2_04221195 push cs; iretd
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10019891 push ecx; ret
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10017C60 push ecx; ret
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_10019891 push ecx; ret
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_10017C60 push ecx; ret
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_03FF1195 push cs; iretd
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_04B408E0 push esp; iretd
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_04B31195 push cs; iretd
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 6_2_10023A79 LoadLibraryA,GetProcAddress,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,__invoke_watson,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,__decode_pointer,__decode_pointer,__invoke_watson,__decode_pointer,__decode_pointer,__decode_pointer,
                      Source: 5o8zdV3GU3.dllStatic PE information: real checksum: 0x66354 should be: 0x74135
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\5o8zdV3GU3.dll
                      Source: C:\Windows\SysWOW64\rundll32.exePE file moved: C:\Windows\SysWOW64\Mumgmtegektiykh\kztyzxlvaam.cuqJump to behavior

                      Hooking and other Techniques for Hiding and Protection:

                      barindex
                      Hides that the sample has been downloaded from the Internet (zone.identifier)Show sources
                      Source: C:\Windows\SysWOW64\rundll32.exeFile opened: C:\Windows\SysWOW64\Mumgmtegektiykh\kztyzxlvaam.cuq:Zone.Identifier read attributes | delete
                      Source: C:\Windows\SysWOW64\rundll32.exeFile opened: C:\Windows\SysWOW64\Wqwjyzkxuxtcnbx\rgto.bfe:Zone.Identifier read attributes | delete
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 6_2_1000D804 IsIconic,GetWindowPlacement,GetWindowRect,
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 6_2_10008B90 IsIconic,SendMessageA,GetSystemMetrics,GetSystemMetrics,GetClientRect,DrawIcon,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1000D804 IsIconic,GetWindowPlacement,GetWindowRect,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10008B90 IsIconic,SendMessageA,GetSystemMetrics,GetSystemMetrics,GetClientRect,DrawIcon,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_1000D804 IsIconic,GetWindowPlacement,GetWindowRect,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_10008B90 IsIconic,SendMessageA,GetSystemMetrics,GetSystemMetrics,GetClientRect,DrawIcon,
                      Source: C:\Windows\SysWOW64\rundll32.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\svchost.exe TID: 6732Thread sleep time: -180000s >= -30000s
                      Source: C:\Windows\System32\loaddll32.exeLast function: Thread delayed
                      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                      Source: C:\Windows\SysWOW64\rundll32.exeEvasive API call chain: GetModuleFileName,DecisionNodes,ExitProcess
                      Source: C:\Windows\SysWOW64\regsvr32.exeAPI coverage: 4.6 %
                      Source: C:\Windows\SysWOW64\rundll32.exeAPI coverage: 4.7 %
                      Source: C:\Windows\SysWOW64\rundll32.exeAPI coverage: 5.6 %
                      Source: C:\Windows\SysWOW64\regsvr32.exeAPI call chain: ExitProcess graph end node
                      Source: C:\Windows\SysWOW64\rundll32.exeAPI call chain: ExitProcess graph end node
                      Source: C:\Windows\SysWOW64\rundll32.exeAPI call chain: ExitProcess graph end node
                      Source: C:\Windows\SysWOW64\rundll32.exeAPI call chain: ExitProcess graph end node
                      Source: C:\Windows\SysWOW64\rundll32.exeFile Volume queried: C:\ FullSizeInformation
                      Source: svchost.exe, 00000000.00000002.808696683.000001954B202000.00000004.00000001.sdmpBinary or memory string: HvHostWdiSystemHostScDeviceEnumWiaRpctrkwksAudioEndpointBuilderhidservdot3svcDsSvcfhsvcWPDBusEnumsvsvcwlansvcEmbeddedModeirmonSensorServicevmicvssNgcSvcsysmainDevQueryBrokerStorSvcvmickvpexchangevmicshutdownvmicguestinterfacevmicvmsessionNcbServiceNetmanDeviceAssociationServiceTabletInputServicePcaSvcIPxlatCfgSvcCscServiceUmRdpService
                      Source: svchost.exe, 00000018.00000003.392278113.000001E6A52D1000.00000004.00000001.sdmp, svchost.exe, 00000018.00000002.411666750.000001E6A52E8000.00000004.00000001.sdmp, svchost.exe, 00000018.00000002.411641964.000001E6A52C6000.00000004.00000001.sdmpBinary or memory string: Hyper-V RAW
                      Source: svchost.exe, 00000018.00000002.411613340.000001E6A52A6000.00000004.00000001.sdmpBinary or memory string: Hyper-V RAW
                      Source: svchost.exe, 00000000.00000002.808868979.000001954B240000.00000004.00000001.sdmp, svchost.exe, 00000003.00000002.808986189.0000026843644000.00000004.00000001.sdmp, svchost.exe, 00000008.00000002.808889452.0000026DCBE29000.00000004.00000001.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 6_2_1001C49A _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 6_2_10023A79 LoadLibraryA,GetProcAddress,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,__invoke_watson,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,__decode_pointer,__decode_pointer,__invoke_watson,__decode_pointer,__decode_pointer,__decode_pointer,
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 6_2_100178B6 GetProcessHeap,GetProcessHeap,HeapAlloc,GetVersionExA,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,__heap_term,__RTC_Initialize,GetCommandLineA,___crtGetEnvironmentStringsA,__ioinit,__mtterm,__setargv,__setenvp,__cinit,__ioterm,__ioterm,__mtterm,__heap_term,___set_flsgetvalue,__calloc_crt,__decode_pointer,__initptd,GetCurrentThreadId,__freeptd,
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 6_2_0422F7F7 mov eax, dword ptr fs:[00000030h]
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_03FFF7F7 mov eax, dword ptr fs:[00000030h]
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_04B3F7F7 mov eax, dword ptr fs:[00000030h]
                      Source: C:\Windows\System32\loaddll32.exeProcess queried: DebugPort
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 6_2_1001C49A _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 6_2_10021743 __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 6_2_100167D5 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 6_2_1001FC21 SetUnhandledExceptionFilter,__encode_pointer,
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 6_2_1001FC43 __decode_pointer,SetUnhandledExceptionFilter,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1001C49A _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10021743 __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_100167D5 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1001FC21 SetUnhandledExceptionFilter,__encode_pointer,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1001FC43 __decode_pointer,SetUnhandledExceptionFilter,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_1001C49A _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_10021743 __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_100167D5 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_1001FC21 SetUnhandledExceptionFilter,__encode_pointer,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_1001FC43 __decode_pointer,SetUnhandledExceptionFilter,

                      HIPS / PFW / Operating System Protection Evasion:

                      barindex
                      System process connects to network (likely due to code injection or exploit)Show sources
                      Source: C:\Windows\SysWOW64\rundll32.exeNetwork Connect: 69.16.218.101 144
                      Source: C:\Windows\SysWOW64\rundll32.exeNetwork Connect: 45.138.98.34 80
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\5o8zdV3GU3.dll",#1
                      Source: svchost.exe, 0000000A.00000002.809322394.00000217E2990000.00000002.00020000.sdmpBinary or memory string: Program Manager
                      Source: svchost.exe, 0000000A.00000002.809322394.00000217E2990000.00000002.00020000.sdmpBinary or memory string: Shell_TrayWnd
                      Source: svchost.exe, 0000000A.00000002.809322394.00000217E2990000.00000002.00020000.sdmpBinary or memory string: Progman
                      Source: svchost.exe, 0000000A.00000002.809322394.00000217E2990000.00000002.00020000.sdmpBinary or memory string: Progmanlock
                      Source: C:\Windows\SysWOW64\rundll32.exeQueries volume information: C:\ VolumeInformation
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: GetThreadLocale,GetLocaleInfoA,GetACP,
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: _strcpy_s,__snprintf_s,GetLocaleInfoA,LoadLibraryA,
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: GetLocaleInfoA,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetThreadLocale,GetLocaleInfoA,GetACP,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: _strcpy_s,__snprintf_s,GetLocaleInfoA,LoadLibraryA,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetLocaleInfoA,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetThreadLocale,GetLocaleInfoA,GetACP,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: _strcpy_s,__snprintf_s,GetLocaleInfoA,LoadLibraryA,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetLocaleInfoA,
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 6_2_10022853 cpuid
                      Source: C:\Windows\SysWOW64\rundll32.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 6_2_1001F914 GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter,
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 6_2_100178B6 GetProcessHeap,GetProcessHeap,HeapAlloc,GetVersionExA,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,__heap_term,__RTC_Initialize,GetCommandLineA,___crtGetEnvironmentStringsA,__ioinit,__mtterm,__setargv,__setenvp,__cinit,__ioterm,__ioterm,__mtterm,__heap_term,___set_flsgetvalue,__calloc_crt,__decode_pointer,__initptd,GetCurrentThreadId,__freeptd,

                      Lowering of HIPS / PFW / Operating System Security Settings:

                      barindex
                      Changes security center settings (notifications, updates, antivirus, firewall)Show sources
                      Source: C:\Windows\System32\svchost.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center cvalJump to behavior
                      Source: C:\Windows\System32\svchost.exeWMI Queries: IWbemServices::ExecNotificationQuery - ROOT\SecurityCenter : SELECT * FROM __InstanceOperationEvent WHERE TargetInstance ISA &apos;AntiVirusProduct&apos; OR TargetInstance ISA &apos;FirewallProduct&apos; OR TargetInstance ISA &apos;AntiSpywareProduct&apos;
                      Source: C:\Windows\System32\svchost.exeWMI Queries: IWbemServices::CreateInstanceEnum - ROOT\SecurityCenter2 : FirewallProduct
                      Source: C:\Windows\System32\svchost.exeWMI Queries: IWbemServices::CreateInstanceEnum - ROOT\SecurityCenter2 : AntiVirusProduct
                      Source: C:\Windows\System32\svchost.exeWMI Queries: IWbemServices::CreateInstanceEnum - ROOT\SecurityCenter2 : AntiSpywareProduct
                      Source: svchost.exe, 00000011.00000002.808909564.00000169CC640000.00000004.00000001.sdmpBinary or memory string: ,@V%ProgramFiles%\Windows Defender\MsMpeng.exe
                      Source: svchost.exe, 00000011.00000002.808878874.00000169CC62A000.00000004.00000001.sdmp, svchost.exe, 00000011.00000002.808977503.00000169CC702000.00000004.00000001.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe

                      Stealing of Sensitive Information:

                      barindex
                      Yara detected EmotetShow sources
                      Source: Yara matchFile source: 9.2.rundll32.exe.4980000.10.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 12.2.rundll32.exe.4800000.8.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 9.2.rundll32.exe.47c0000.6.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 9.2.rundll32.exe.25d0000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 15.2.rundll32.exe.4b30000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 12.2.rundll32.exe.4800000.8.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 12.2.rundll32.exe.25c0000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 7.2.rundll32.exe.3340000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 7.2.rundll32.exe.3340000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 9.2.rundll32.exe.4660000.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 9.2.rundll32.exe.4820000.8.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 9.2.rundll32.exe.4980000.10.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 9.2.rundll32.exe.45b0000.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 9.2.rundll32.exe.4690000.5.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 12.2.rundll32.exe.46f0000.5.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 9.2.rundll32.exe.4850000.9.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 9.2.rundll32.exe.49b0000.11.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 7.2.rundll32.exe.3370000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 9.2.rundll32.exe.4580000.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 15.2.rundll32.exe.3240000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 12.2.rundll32.exe.3ff0000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 12.2.rundll32.exe.4590000.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 12.2.rundll32.exe.46c0000.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 12.2.rundll32.exe.4590000.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 9.2.rundll32.exe.2600000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 9.2.rundll32.exe.4660000.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 12.2.rundll32.exe.25c0000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 15.2.rundll32.exe.3240000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 12.2.rundll32.exe.47a0000.6.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 9.2.rundll32.exe.47f0000.7.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 9.2.rundll32.exe.25d0000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.2.regsvr32.exe.2920000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 12.2.rundll32.exe.46c0000.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.2.regsvr32.exe.2920000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 9.2.rundll32.exe.4580000.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.2.regsvr32.exe.4220000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 9.2.rundll32.exe.4820000.8.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 12.2.rundll32.exe.47d0000.7.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 9.2.rundll32.exe.47c0000.6.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 12.2.rundll32.exe.4830000.9.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 12.2.rundll32.exe.45c0000.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 12.2.rundll32.exe.47a0000.6.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000006.00000002.288106949.0000000002920000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000009.00000002.295420739.00000000025D0000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000F.00000002.299662672.0000000004B31000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000009.00000002.295926271.0000000004820000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000C.00000002.322196530.00000000046F1000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000006.00000002.288171571.0000000004221000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000009.00000002.295834893.0000000004691000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000C.00000002.322096907.0000000004590000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000009.00000002.295905840.00000000047F1000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000C.00000002.322237408.00000000047A0000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000009.00000002.295970010.0000000004980000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000C.00000002.322126344.00000000045C1000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000C.00000002.322324942.0000000004831000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000C.00000002.322265167.00000000047D1000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000009.00000002.295742622.0000000004580000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000009.00000002.295801770.0000000004660000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000C.00000002.321908815.0000000003FF1000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000C.00000002.322168517.00000000046C0000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000009.00000002.295884974.00000000047C0000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000C.00000002.321798721.00000000025C0000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000009.00000002.295946412.0000000004851000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000007.00000002.291064992.0000000003371000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000F.00000002.299581696.0000000003240000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000009.00000002.295994852.00000000049B1000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000009.00000002.295767081.00000000045B1000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000007.00000002.291040092.0000000003340000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000C.00000002.322291454.0000000004800000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000009.00000002.295442330.0000000002601000.00000020.00000001.sdmp, type: MEMORY
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 6_2_100011C0 WSAStartup,_memset,htonl,htons,socket,bind,setsockopt,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_100011C0 WSAStartup,_memset,htonl,htons,socket,bind,setsockopt,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_100011C0 WSAStartup,_memset,htonl,htons,socket,bind,setsockopt,

                      Mitre Att&ck Matrix

                      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                      Valid AccountsWindows Management Instrumentation1DLL Side-Loading1DLL Side-Loading1Disable or Modify Tools1Input Capture2System Time Discovery1Remote ServicesArchive Collected Data1Exfiltration Over Other Network MediumIngress Tool Transfer1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                      Default AccountsNative API2Boot or Logon Initialization ScriptsProcess Injection112Deobfuscate/Decode Files or Information1LSASS MemoryFile and Directory Discovery1Remote Desktop ProtocolInput Capture2Exfiltration Over BluetoothEncrypted Channel1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                      Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Obfuscated Files or Information2Security Account ManagerSystem Information Discovery35SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationNon-Standard Port1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                      Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)DLL Side-Loading1NTDSQuery Registry1Distributed Component Object ModelInput CaptureScheduled TransferApplication Layer Protocol1SIM Card SwapCarrier Billing Fraud
                      Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptFile Deletion1LSA SecretsSecurity Software Discovery51SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                      Replication Through Removable MediaLaunchdRc.commonRc.commonMasquerading21Cached Domain CredentialsVirtualization/Sandbox Evasion2VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                      External Remote ServicesScheduled TaskStartup ItemsStartup ItemsVirtualization/Sandbox Evasion2DCSyncProcess Discovery1Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                      Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobProcess Injection112Proc FilesystemApplication Window Discovery1Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
                      Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)Hidden Files and Directories1/etc/passwd and /etc/shadowRemote System Discovery1Software Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
                      Supply Chain CompromiseAppleScriptAt (Windows)At (Windows)Regsvr321Network SniffingProcess DiscoveryTaint Shared ContentLocal Data StagingExfiltration Over Unencrypted/Obfuscated Non-C2 ProtocolFile Transfer ProtocolsData Encrypted for Impact
                      Compromise Software Dependencies and Development ToolsWindows Command ShellCronCronRundll321Input CapturePermission Groups DiscoveryReplication Through Removable MediaRemote Data StagingExfiltration Over Physical MediumMail ProtocolsService Stop

                      Behavior Graph

                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet
                      behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 553143 Sample: 5o8zdV3GU3 Startdate: 14/01/2022 Architecture: WINDOWS Score: 100 41 210.57.209.142 UNAIR-AS-IDUniversitasAirlanggaID Indonesia 2->41 43 85.214.67.203 STRATOSTRATOAGDE Germany 2->43 45 23 other IPs or domains 2->45 53 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->53 55 Found malware configuration 2->55 57 Multi AV Scanner detection for submitted file 2->57 59 4 other signatures 2->59 9 loaddll32.exe 1 2->9         started        11 svchost.exe 2->11         started        14 svchost.exe 2->14         started        16 9 other processes 2->16 signatures3 process4 signatures5 18 rundll32.exe 2 9->18         started        21 cmd.exe 1 9->21         started        23 regsvr32.exe 9->23         started        65 Changes security center settings (notifications, updates, antivirus, firewall) 11->65 25 MpCmdRun.exe 1 11->25         started        process6 signatures7 51 Hides that the sample has been downloaded from the Internet (zone.identifier) 18->51 27 rundll32.exe 18->27         started        29 rundll32.exe 21->29         started        31 rundll32.exe 23->31         started        33 conhost.exe 25->33         started        process8 process9 35 rundll32.exe 27->35         started        39 rundll32.exe 2 29->39         started        dnsIp10 47 45.138.98.34, 49745, 80 M247GB Germany 35->47 49 69.16.218.101, 49746, 8080 LIQUIDWEBUS United States 35->49 61 System process connects to network (likely due to code injection or exploit) 35->61 63 Hides that the sample has been downloaded from the Internet (zone.identifier) 39->63 signatures11

                      Screenshots

                      Thumbnails

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.

                      windows-stand

                      Antivirus, Machine Learning and Genetic Malware Detection

                      Initial Sample

                      SourceDetectionScannerLabelLink
                      5o8zdV3GU3.dll31%VirustotalBrowse
                      5o8zdV3GU3.dll100%Joe Sandbox ML

                      Dropped Files

                      No Antivirus matches

                      Unpacked PE Files

                      SourceDetectionScannerLabelLinkDownload
                      12.2.rundll32.exe.46c0000.4.unpack100%AviraHEUR/AGEN.1145233Download File
                      12.2.rundll32.exe.4800000.8.unpack100%AviraHEUR/AGEN.1145233Download File
                      7.2.rundll32.exe.3340000.0.unpack100%AviraHEUR/AGEN.1145233Download File
                      9.2.rundll32.exe.4850000.9.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      9.2.rundll32.exe.45b0000.3.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      9.2.rundll32.exe.4690000.5.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      9.2.rundll32.exe.4660000.4.unpack100%AviraHEUR/AGEN.1145233Download File
                      15.2.rundll32.exe.4b30000.1.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      9.2.rundll32.exe.25d0000.0.unpack100%AviraHEUR/AGEN.1145233Download File
                      9.2.rundll32.exe.4980000.10.unpack100%AviraHEUR/AGEN.1145233Download File
                      9.2.rundll32.exe.4820000.8.unpack100%AviraHEUR/AGEN.1145233Download File
                      12.2.rundll32.exe.46f0000.5.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      15.2.rundll32.exe.3240000.0.unpack100%AviraHEUR/AGEN.1145233Download File
                      9.2.rundll32.exe.49b0000.11.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      7.2.rundll32.exe.3370000.1.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      12.2.rundll32.exe.4590000.2.unpack100%AviraHEUR/AGEN.1145233Download File
                      12.2.rundll32.exe.3ff0000.1.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      9.2.rundll32.exe.2600000.1.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      12.2.rundll32.exe.25c0000.0.unpack100%AviraHEUR/AGEN.1145233Download File
                      12.2.rundll32.exe.47a0000.6.unpack100%AviraHEUR/AGEN.1145233Download File
                      9.2.rundll32.exe.47f0000.7.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      6.2.regsvr32.exe.2920000.0.unpack100%AviraHEUR/AGEN.1145233Download File
                      9.2.rundll32.exe.4580000.2.unpack100%AviraHEUR/AGEN.1145233Download File
                      6.2.regsvr32.exe.4220000.1.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      9.2.rundll32.exe.47c0000.6.unpack100%AviraHEUR/AGEN.1145233Download File
                      12.2.rundll32.exe.4830000.9.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      12.2.rundll32.exe.47d0000.7.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      12.2.rundll32.exe.45c0000.3.unpack100%AviraTR/Crypt.XPACK.GenDownload File

                      Domains

                      SourceDetectionScannerLabelLink
                      windowsupdate.s.llnwi.net0%VirustotalBrowse

                      URLs

                      SourceDetectionScannerLabelLink
                      https://www.disneyplus.com/legal/your-california-privacy-rights0%URL Reputationsafe
                      http://crl.ver)0%Avira URL Cloudsafe
                      https://www.tiktok.com/legal/report/feedback0%URL Reputationsafe
                      https://activity.windows.comr0%URL Reputationsafe
                      https://%s.xboxlive.com0%URL Reputationsafe
                      https://www.disneyplus.com/legal/privacy-policy0%URL Reputationsafe
                      https://dynamic.t0%URL Reputationsafe
                      https://disneyplus.com/legal.0%URL Reputationsafe
                      http://help.disneyplus.com.0%URL Reputationsafe
                      https://%s.dnet.xboxlive.com0%URL Reputationsafe

                      Domains and IPs

                      Contacted Domains

                      NameIPActiveMaliciousAntivirus DetectionReputation
                      windowsupdate.s.llnwi.net
                      95.140.236.128
                      truefalseunknown

                      URLs from Memory and Binaries

                      NameSourceMaliciousAntivirus DetectionReputation
                      https://dynamic.t0.tiles.ditu.live.com/comp/gen.ashxsvchost.exe, 0000000D.00000003.311061989.0000027C67A60000.00000004.00000001.sdmpfalse
                        high
                        https://www.disneyplus.com/legal/your-california-privacy-rightssvchost.exe, 00000018.00000003.388724008.000001E6A595D000.00000004.00000001.sdmp, svchost.exe, 00000018.00000003.388810562.000001E6A5E02000.00000004.00000001.sdmp, svchost.exe, 00000018.00000003.388740953.000001E6A5979000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdv?pv=1&r=svchost.exe, 0000000D.00000003.311420754.0000027C67A40000.00000004.00000001.sdmp, svchost.exe, 0000000D.00000003.311559423.0000027C67A45000.00000004.00000001.sdmpfalse
                          high
                          https://dev.ditu.live.com/REST/v1/Routes/svchost.exe, 0000000D.00000002.312248027.0000027C67A3D000.00000004.00000001.sdmpfalse
                            high
                            https://dev.virtualearth.net/REST/v1/Routes/Drivingsvchost.exe, 0000000D.00000003.311061989.0000027C67A60000.00000004.00000001.sdmpfalse
                              high
                              https://t0.ssl.ak.dynamic.tiles.virtualearth.net/comp/gen.ashxsvchost.exe, 0000000D.00000002.312248027.0000027C67A3D000.00000004.00000001.sdmpfalse
                                high
                                https://dev.ditu.live.com/REST/v1/Transit/Stops/svchost.exe, 0000000D.00000003.310880307.0000027C67A67000.00000004.00000001.sdmp, svchost.exe, 0000000D.00000002.312284199.0000027C67A69000.00000004.00000001.sdmpfalse
                                  high
                                  https://t0.tiles.ditu.live.com/tiles/gensvchost.exe, 0000000D.00000002.312260288.0000027C67A4B000.00000004.00000001.sdmp, svchost.exe, 0000000D.00000003.311173852.0000027C67A49000.00000004.00000001.sdmpfalse
                                    high
                                    https://dev.virtualearth.net/REST/v1/Routes/svchost.exe, 0000000D.00000002.312248027.0000027C67A3D000.00000004.00000001.sdmpfalse
                                      high
                                      https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdi?pv=1&r=svchost.exe, 0000000D.00000003.311420754.0000027C67A40000.00000004.00000001.sdmp, svchost.exe, 0000000D.00000003.311559423.0000027C67A45000.00000004.00000001.sdmpfalse
                                        high
                                        https://dev.virtualearth.net/REST/v1/Routes/Walkingsvchost.exe, 0000000D.00000003.311061989.0000027C67A60000.00000004.00000001.sdmpfalse
                                          high
                                          http://crl.ver)svchost.exe, 00000018.00000002.411666750.000001E6A52E8000.00000004.00000001.sdmpfalse
                                          • Avira URL Cloud: safe
                                          low
                                          https://dev.virtualearth.net/webservices/v1/LoggingService/LoggingService.svc/Log?svchost.exe, 0000000D.00000003.311420754.0000027C67A40000.00000004.00000001.sdmp, svchost.exe, 0000000D.00000002.312269483.0000027C67A5C000.00000004.00000001.sdmpfalse
                                            high
                                            https://www.tiktok.com/legal/report/feedbacksvchost.exe, 00000018.00000003.389559591.000001E6A597C000.00000004.00000001.sdmp, svchost.exe, 00000018.00000003.389828999.000001E6A599E000.00000004.00000001.sdmp, svchost.exe, 00000018.00000003.389643100.000001E6A59D6000.00000004.00000001.sdmp, svchost.exe, 00000018.00000003.389608441.000001E6A59D6000.00000004.00000001.sdmpfalse
                                            • URL Reputation: safe
                                            unknown
                                            https://activity.windows.comrsvchost.exe, 00000003.00000002.808986189.0000026843644000.00000004.00000001.sdmpfalse
                                            • URL Reputation: safe
                                            unknown
                                            https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gd?pv=1&r=svchost.exe, 0000000D.00000002.312248027.0000027C67A3D000.00000004.00000001.sdmp, svchost.exe, 0000000D.00000002.312216539.0000027C67A13000.00000004.00000001.sdmpfalse
                                              high
                                              https://dev.virtualearth.net/mapcontrol/HumanScaleServices/GetBubbles.ashx?n=svchost.exe, 0000000D.00000003.311625138.0000027C67A41000.00000004.00000001.sdmp, svchost.exe, 0000000D.00000003.311420754.0000027C67A40000.00000004.00000001.sdmp, svchost.exe, 0000000D.00000002.312254295.0000027C67A42000.00000004.00000001.sdmpfalse
                                                high
                                                https://%s.xboxlive.comsvchost.exe, 00000003.00000002.808986189.0000026843644000.00000004.00000001.sdmpfalse
                                                • URL Reputation: safe
                                                low
                                                https://dev.ditu.live.com/mapcontrol/mapconfiguration.ashx?name=native&v=svchost.exe, 0000000D.00000002.312260288.0000027C67A4B000.00000004.00000001.sdmp, svchost.exe, 0000000D.00000003.311173852.0000027C67A49000.00000004.00000001.sdmpfalse
                                                  high
                                                  https://dev.virtualearth.net/REST/v1/Locationssvchost.exe, 0000000D.00000003.287688148.0000027C67A31000.00000004.00000001.sdmpfalse
                                                    high
                                                    https://ecn.dev.virtualearth.net/mapcontrol/mapconfiguration.ashx?name=native&v=svchost.exe, 0000000D.00000003.287688148.0000027C67A31000.00000004.00000001.sdmpfalse
                                                      high
                                                      https://dev.virtualearth.net/mapcontrol/logging.ashxsvchost.exe, 0000000D.00000003.311061989.0000027C67A60000.00000004.00000001.sdmpfalse
                                                        high
                                                        https://dev.ditu.live.com/mapcontrol/logging.ashxsvchost.exe, 0000000D.00000003.311061989.0000027C67A60000.00000004.00000001.sdmpfalse
                                                          high
                                                          https://dev.ditu.live.com/REST/v1/Imagery/Copyright/svchost.exe, 0000000D.00000003.311173852.0000027C67A49000.00000004.00000001.sdmpfalse
                                                            high
                                                            https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gri?pv=1&r=svchost.exe, 0000000D.00000003.287688148.0000027C67A31000.00000004.00000001.sdmpfalse
                                                              high
                                                              https://dynamic.api.tiles.ditu.live.com/odvs/gdi?pv=1&r=svchost.exe, 0000000D.00000002.312269483.0000027C67A5C000.00000004.00000001.sdmpfalse
                                                                high
                                                                https://www.disneyplus.com/legal/privacy-policysvchost.exe, 00000018.00000003.388724008.000001E6A595D000.00000004.00000001.sdmp, svchost.exe, 00000018.00000003.388810562.000001E6A5E02000.00000004.00000001.sdmp, svchost.exe, 00000018.00000003.388740953.000001E6A5979000.00000004.00000001.sdmpfalse
                                                                • URL Reputation: safe
                                                                unknown
                                                                https://dev.virtualearth.net/REST/v1/Transit/Schedules/svchost.exe, 0000000D.00000003.311625138.0000027C67A41000.00000004.00000001.sdmp, svchost.exe, 0000000D.00000003.311420754.0000027C67A40000.00000004.00000001.sdmp, svchost.exe, 0000000D.00000002.312254295.0000027C67A42000.00000004.00000001.sdmpfalse
                                                                  high
                                                                  https://dynamic.tsvchost.exe, 0000000D.00000003.311173852.0000027C67A49000.00000004.00000001.sdmpfalse
                                                                  • URL Reputation: safe
                                                                  unknown
                                                                  https://dev.virtualearth.net/REST/v1/Routes/Transitsvchost.exe, 0000000D.00000003.311061989.0000027C67A60000.00000004.00000001.sdmpfalse
                                                                    high
                                                                    https://disneyplus.com/legal.svchost.exe, 00000018.00000003.388724008.000001E6A595D000.00000004.00000001.sdmp, svchost.exe, 00000018.00000003.388810562.000001E6A5E02000.00000004.00000001.sdmp, svchost.exe, 00000018.00000003.388740953.000001E6A5979000.00000004.00000001.sdmpfalse
                                                                    • URL Reputation: safe
                                                                    unknown
                                                                    https://t0.ssl.ak.tiles.virtualearth.net/tiles/gensvchost.exe, 0000000D.00000003.311709544.0000027C67A3A000.00000004.00000001.sdmp, svchost.exe, 0000000D.00000003.287688148.0000027C67A31000.00000004.00000001.sdmpfalse
                                                                      high
                                                                      https://dynamic.api.tiles.ditu.live.com/odvs/gdv?pv=1&r=svchost.exe, 0000000D.00000002.312269483.0000027C67A5C000.00000004.00000001.sdmpfalse
                                                                        high
                                                                        https://activity.windows.comsvchost.exe, 00000003.00000002.808986189.0000026843644000.00000004.00000001.sdmpfalse
                                                                          high
                                                                          http://www.bingmapsportal.comsvchost.exe, 0000000D.00000002.312216539.0000027C67A13000.00000004.00000001.sdmpfalse
                                                                            high
                                                                            https://dev.ditu.live.com/REST/v1/Locationssvchost.exe, 0000000D.00000003.311061989.0000027C67A60000.00000004.00000001.sdmpfalse
                                                                              high
                                                                              http://help.disneyplus.com.svchost.exe, 00000018.00000003.388724008.000001E6A595D000.00000004.00000001.sdmp, svchost.exe, 00000018.00000003.388810562.000001E6A5E02000.00000004.00000001.sdmp, svchost.exe, 00000018.00000003.388740953.000001E6A5979000.00000004.00000001.sdmpfalse
                                                                              • URL Reputation: safe
                                                                              unknown
                                                                              https://ecn.dev.virtualearth.net/REST/v1/Imagery/Copyright/svchost.exe, 0000000D.00000002.312248027.0000027C67A3D000.00000004.00000001.sdmpfalse
                                                                                high
                                                                                https://%s.dnet.xboxlive.comsvchost.exe, 00000003.00000002.808986189.0000026843644000.00000004.00000001.sdmpfalse
                                                                                • URL Reputation: safe
                                                                                low
                                                                                https://dynamic.api.tiles.ditu.live.com/odvs/gd?pv=1&r=svchost.exe, 0000000D.00000003.311173852.0000027C67A49000.00000004.00000001.sdmpfalse
                                                                                  high

                                                                                  Contacted IPs

                                                                                  • No. of IPs < 25%
                                                                                  • 25% < No. of IPs < 50%
                                                                                  • 50% < No. of IPs < 75%
                                                                                  • 75% < No. of IPs

                                                                                  Public

                                                                                  IPDomainCountryFlagASNASN NameMalicious
                                                                                  207.148.81.119
                                                                                  unknownUnited States
                                                                                  20473AS-CHOOPAUStrue
                                                                                  104.131.62.48
                                                                                  unknownUnited States
                                                                                  14061DIGITALOCEAN-ASNUStrue
                                                                                  85.214.67.203
                                                                                  unknownGermany
                                                                                  6724STRATOSTRATOAGDEtrue
                                                                                  191.252.103.16
                                                                                  unknownBrazil
                                                                                  27715LocawebServicosdeInternetSABRtrue
                                                                                  168.197.250.14
                                                                                  unknownArgentina
                                                                                  264776OmarAnselmoRipollTDCNETARtrue
                                                                                  66.42.57.149
                                                                                  unknownUnited States
                                                                                  20473AS-CHOOPAUStrue
                                                                                  185.148.168.15
                                                                                  unknownGermany
                                                                                  44780EVERSCALE-ASDEtrue
                                                                                  51.210.242.234
                                                                                  unknownFrance
                                                                                  16276OVHFRtrue
                                                                                  217.182.143.207
                                                                                  unknownFrance
                                                                                  16276OVHFRtrue
                                                                                  69.16.218.101
                                                                                  unknownUnited States
                                                                                  32244LIQUIDWEBUStrue
                                                                                  159.69.237.188
                                                                                  unknownGermany
                                                                                  24940HETZNER-ASDEtrue
                                                                                  45.138.98.34
                                                                                  unknownGermany
                                                                                  9009M247GBtrue
                                                                                  116.124.128.206
                                                                                  unknownKorea Republic of
                                                                                  9318SKB-ASSKBroadbandCoLtdKRtrue
                                                                                  78.46.73.125
                                                                                  unknownGermany
                                                                                  24940HETZNER-ASDEtrue
                                                                                  37.59.209.141
                                                                                  unknownFrance
                                                                                  16276OVHFRtrue
                                                                                  210.57.209.142
                                                                                  unknownIndonesia
                                                                                  38142UNAIR-AS-IDUniversitasAirlanggaIDtrue
                                                                                  185.148.168.220
                                                                                  unknownGermany
                                                                                  44780EVERSCALE-ASDEtrue
                                                                                  54.37.228.122
                                                                                  unknownFrance
                                                                                  16276OVHFRtrue
                                                                                  190.90.233.66
                                                                                  unknownColombia
                                                                                  18678INTERNEXASAESPCOtrue
                                                                                  142.4.219.173
                                                                                  unknownCanada
                                                                                  16276OVHFRtrue
                                                                                  54.38.242.185
                                                                                  unknownFrance
                                                                                  16276OVHFRtrue
                                                                                  195.154.146.35
                                                                                  unknownFrance
                                                                                  12876OnlineSASFRtrue
                                                                                  195.77.239.39
                                                                                  unknownSpain
                                                                                  60493FICOSA-ASEStrue
                                                                                  78.47.204.80
                                                                                  unknownGermany
                                                                                  24940HETZNER-ASDEtrue
                                                                                  37.44.244.177
                                                                                  unknownGermany
                                                                                  47583AS-HOSTINGERLTtrue
                                                                                  62.171.178.147
                                                                                  unknownUnited Kingdom
                                                                                  51167CONTABODEtrue
                                                                                  128.199.192.135
                                                                                  unknownUnited Kingdom
                                                                                  14061DIGITALOCEAN-ASNUStrue

                                                                                  General Information

                                                                                  Joe Sandbox Version:34.0.0 Boulder Opal
                                                                                  Analysis ID:553143
                                                                                  Start date:14.01.2022
                                                                                  Start time:11:32:14
                                                                                  Joe Sandbox Product:CloudBasic
                                                                                  Overall analysis duration:0h 13m 46s
                                                                                  Hypervisor based Inspection enabled:false
                                                                                  Report type:light
                                                                                  Sample file name:5o8zdV3GU3 (renamed file extension from none to dll)
                                                                                  Cookbook file name:default.jbs
                                                                                  Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                                                                  Number of analysed new started processes analysed:35
                                                                                  Number of new started drivers analysed:0
                                                                                  Number of existing processes analysed:0
                                                                                  Number of existing drivers analysed:0
                                                                                  Number of injected processes analysed:0
                                                                                  Technologies:
                                                                                  • HCA enabled
                                                                                  • EGA enabled
                                                                                  • HDC enabled
                                                                                  • AMSI enabled
                                                                                  Analysis Mode:default
                                                                                  Analysis stop reason:Timeout
                                                                                  Detection:MAL
                                                                                  Classification:mal100.troj.evad.winDLL@31/10@0/27
                                                                                  EGA Information:
                                                                                  • Successful, ratio: 80%
                                                                                  HDC Information:
                                                                                  • Successful, ratio: 33.6% (good quality ratio 32.3%)
                                                                                  • Quality average: 78.2%
                                                                                  • Quality standard deviation: 26.8%
                                                                                  HCA Information:
                                                                                  • Successful, ratio: 100%
                                                                                  • Number of executed functions: 0
                                                                                  • Number of non-executed functions: 0
                                                                                  Cookbook Comments:
                                                                                  • Adjust boot time
                                                                                  • Enable AMSI
                                                                                  • Override analysis time to 240s for rundll32
                                                                                  Warnings:
                                                                                  Show All
                                                                                  • Exclude process from analysis (whitelisted): audiodg.exe, BackgroundTransferHost.exe, WMIADAP.exe, backgroundTaskHost.exe, wuapihost.exe
                                                                                  • Excluded IPs from analysis (whitelisted): 95.140.236.128, 173.222.108.210, 173.222.108.226, 20.54.110.249, 40.91.112.76
                                                                                  • Excluded domains from analysis (whitelisted): displaycatalog-rp-uswest.md.mp.microsoft.com.akadns.net, displaycatalog-rp-europe.md.mp.microsoft.com.akadns.net, wu-shim.trafficmanager.net, neu-displaycatalogrp.frontdoor.bigcatalog.commerce.microsoft.com, ctldl.windowsupdate.com, a767.dspw65.akamai.net, wus2-displaycatalogrp.frontdoor.bigcatalog.commerce.microsoft.com, arc.msn.com, download.windowsupdate.com.edgesuite.net, ris.api.iris.microsoft.com, consumer-displaycatalogrp-aks2aks-europe.md.mp.microsoft.com.akadns.net, consumer-displaycatalogrp-aks2aks-uswest.md.mp.microsoft.com.akadns.net, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, displaycatalog-rp.md.mp.microsoft.com.akadns.net
                                                                                  • Execution Graph export aborted for target rundll32.exe, PID 6076 because there are no executed function
                                                                                  • Not all processes where analyzed, report is missing behavior information
                                                                                  • Report size exceeded maximum capacity and may have missing behavior information.
                                                                                  • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                                  • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                                                  • Report size getting too big, too many NtQueryValueKey calls found.

                                                                                  Simulations

                                                                                  Behavior and APIs

                                                                                  TimeTypeDescription
                                                                                  11:33:57API Interceptor7x Sleep call for process: svchost.exe modified
                                                                                  11:34:14API Interceptor1x Sleep call for process: MpCmdRun.exe modified

                                                                                  Joe Sandbox View / Context

                                                                                  IPs

                                                                                  No context

                                                                                  Domains

                                                                                  No context

                                                                                  ASN

                                                                                  No context

                                                                                  JA3 Fingerprints

                                                                                  No context

                                                                                  Dropped Files

                                                                                  No context

                                                                                  Created / dropped Files

                                                                                  C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
                                                                                  Process:C:\Windows\SysWOW64\rundll32.exe
                                                                                  File Type:Microsoft Cabinet archive data, 61414 bytes, 1 file
                                                                                  Category:dropped
                                                                                  Size (bytes):61414
                                                                                  Entropy (8bit):7.995245868798237
                                                                                  Encrypted:true
                                                                                  SSDEEP:1536:EysgU6qmzixT64jYMZ8HbVPGfVDwm/xLZ9rP:wF6qmeo4eH1m9wmLvrP
                                                                                  MD5:ACAEDA60C79C6BCAC925EEB3653F45E0
                                                                                  SHA1:2AAAE490BCDACCC6172240FF1697753B37AC5578
                                                                                  SHA-256:6B0CECCF0103AFD89844761417C1D23ACC41F8AEBF3B7230765209B61EEE5658
                                                                                  SHA-512:FEAA6E7ED7DDA1583739B3E531AB5C562A222EE6ECD042690AE7DCFF966717C6E968469A7797265A11F6E899479AE0F3031E8CF5BEBE1492D5205E9C59690900
                                                                                  Malicious:false
                                                                                  Preview: MSCF............,...................I.......;w........RSNj .authroot.stl..>.(.5..CK..8T....c_.d...A.K...+.d.H..*i.RJJ.IQIR..$t)Kd.-[..T\{..ne......<.w......A..B........c...wi......D....c.0D,L........fy....Rg...=........i,3.3..Z....~^ve<...TF.*...f.zy.,...m.@.0.0...m.3..I(..+..v#...(.2....e...L..*y..V.......~U...."<ke.....l.X:Dt..R<7.5\A7L0=..T.V...IDr..8<....r&...I-.^..b.b.".Af....E.._..r.>.`;,.Hob..S.....7'..\.R$.".g..+..64..@nP.....k3...B.`.G..@D.....L.....`^...#OpW.....!....`.....rf:.}.R.@....gR.#7....l..H.#...d.Qh..3..fCX....==#..M.l..~&....[.J9.\..Ww.....Tx.%....]..a4E...q.+...#.*a..x..O..V.t..Y1!.T..`U...-...< _@...|(.....0..3.`.LU...E0.Gu.4KN....5...?.....I.p..'..........N<.d.O..dH@c1t...[w/...T....cYK.X>.0..Z.....O>..9.3.#9X.%.b...5.YK.E.V.....`./.3.._..nN]..=..M.o.F.._..z....._...gY..!Z..?l....vp.l.:.d.Z..W.....~...N.._.k...&.....$......i.F.d.....D!e.....Y..,.E..m.;.1... $.F..O.F.o_}.uG....,.%.>,.Zx.......o....c../.;....g&.....
                                                                                  C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
                                                                                  Process:C:\Windows\SysWOW64\rundll32.exe
                                                                                  File Type:data
                                                                                  Category:modified
                                                                                  Size (bytes):290
                                                                                  Entropy (8bit):2.968077906394976
                                                                                  Encrypted:false
                                                                                  SSDEEP:6:kKrA05SN+SkQlPlEGYRMY9z+4KlDA3RUe/:pHkPlE99SNxAhUe/
                                                                                  MD5:4E2D8482FAB31525DB879517E4210956
                                                                                  SHA1:E00CDD9A0F7F9FD3DC50F5510857EB391FC3346A
                                                                                  SHA-256:94570ABBE7681CE3AEB2B569D34997CD1B35C99C7339D00035F3CB86E920F88E
                                                                                  SHA-512:C780B1C98B3B4E749D610ADBF185534C572181819C076F23EE120CD84C57BE8D5C7C2F5816375E050DC6DFB969D7AD049A807A832F49A076A4C515E81812E63D
                                                                                  Malicious:false
                                                                                  Preview: p...... ............}...(....................................................... ........q.\].......................h.t.t.p.:././.c.t.l.d.l...w.i.n.d.o.w.s.u.p.d.a.t.e...c.o.m./.m.s.d.o.w.n.l.o.a.d./.u.p.d.a.t.e./.v.3./.s.t.a.t.i.c./.t.r.u.s.t.e.d.r./.e.n./.a.u.t.h.r.o.o.t.s.t.l...c.a.b...
                                                                                  C:\Users\user\AppData\Local\Packages\ActiveSync\LocalState\DiagOutputDir\SyncVerbose.etl
                                                                                  Process:C:\Windows\System32\svchost.exe
                                                                                  File Type:data
                                                                                  Category:dropped
                                                                                  Size (bytes):65536
                                                                                  Entropy (8bit):0.11004564230850619
                                                                                  Encrypted:false
                                                                                  SSDEEP:12:26+XjXm/Ey6q99959q3qQ10nMCldimE8eawHjcxXf:26+Kl68mLyMCldzE9BHjcxP
                                                                                  MD5:D0C1EBD79E84FE82388BC9F7FAA9CA8D
                                                                                  SHA1:A2012915159E4087A0016D27E06EC7B73547172B
                                                                                  SHA-256:1A0F75CF856C251A5B9396767140280A76F556D24D75B655AA6B85ABCDA41FEF
                                                                                  SHA-512:5F626CC9C2BD9263C1D1E793D2A0E7F8EDE52DC729F8BBF13D4CE0BDA3713F061EE191CF3825CB621BB0DCFD6CF438A3E4694E4A4B9172F1E2B45509D920F533
                                                                                  Malicious:false
                                                                                  Preview: ................................................................................h.......]d.......................B..............Zb..................................................@.t.z.r.e.s...d.l.l.,.-.2.1.2.......................................................@.t.z.r.e.s...d.l.l.,.-.2.1.1............................................................."%...... .........}...........S.y.n.c.V.e.r.b.o.s.e...C.:.\.U.s.e.r.s.\.h.a.r.d.z.\.A.p.p.D.a.t.a.\.L.o.c.a.l.\.p.a.c.k.a.g.e.s.\.A.c.t.i.v.e.S.y.n.c.\.L.o.c.a.l.S.t.a.t.e.\.D.i.a.g.O.u.t.p.u.t.D.i.r.\.S.y.n.c.V.e.r.b.o.s.e...e.t.l...........P.P.h........s......................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  C:\Users\user\AppData\Local\Packages\ActiveSync\LocalState\DiagOutputDir\UnistackCircular.etl
                                                                                  Process:C:\Windows\System32\svchost.exe
                                                                                  File Type:data
                                                                                  Category:dropped
                                                                                  Size (bytes):65536
                                                                                  Entropy (8bit):0.11272036861319339
                                                                                  Encrypted:false
                                                                                  SSDEEP:12:AXjXm/Ey6q9995t61miM3qQ10nMCldimE8eawHza1miI4iXP:AKl68a1tMLyMCldzE9BHza1tIR/
                                                                                  MD5:F55E1FDF1FD6A55ADDF04680DB2181B2
                                                                                  SHA1:4C55AD3BFEBB580715A41563DDACBD106A1E25C1
                                                                                  SHA-256:70561299BB407E61BDE3FF7FB7D71CE2CE5944D0DD1440064CE61AF3BF713194
                                                                                  SHA-512:6A0C04F0419FAD213A4D43AB019BF64DAA17D28B4F02AD762E433149BAF6985BD1A4583C3CE3CAC872546A0A5000104633AE431B45221C98FA1189298CE8F233
                                                                                  Malicious:false
                                                                                  Preview: ................................................................................h................................B..............Zb..................................................@.t.z.r.e.s...d.l.l.,.-.2.1.2.......................................................@.t.z.r.e.s...d.l.l.,.-.2.1.1............................................................."%...... ....._...}...........U.n.i.s.t.a.c.k.C.i.r.c.u.l.a.r...C.:.\.U.s.e.r.s.\.h.a.r.d.z.\.A.p.p.D.a.t.a.\.L.o.c.a.l.\.p.a.c.k.a.g.e.s.\.A.c.t.i.v.e.S.y.n.c.\.L.o.c.a.l.S.t.a.t.e.\.D.i.a.g.O.u.t.p.u.t.D.i.r.\.U.n.i.s.t.a.c.k.C.i.r.c.u.l.a.r...e.t.l.......P.P.h...............................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  C:\Users\user\AppData\Local\Packages\ActiveSync\LocalState\DiagOutputDir\UnistackCritical.etl
                                                                                  Process:C:\Windows\System32\svchost.exe
                                                                                  File Type:data
                                                                                  Category:dropped
                                                                                  Size (bytes):65536
                                                                                  Entropy (8bit):0.11273857454530721
                                                                                  Encrypted:false
                                                                                  SSDEEP:12:FJXjXm/Ey6q9995bf1mK2P3qQ10nMCldimE8eawHza1mKSiXP:FJKl68h1iPLyMCldzE9BHza12i/
                                                                                  MD5:90DE189AB507C6F07379D8A60A2C67CA
                                                                                  SHA1:B056F736B2D0DACD76193D6213CD149DA65C634D
                                                                                  SHA-256:8889615CBB2FA34222B2187B422DBFE6D1F4F9D68320CD6859D62444F293355B
                                                                                  SHA-512:584748E66C1098573C7804E305DA3A5666CE2C42379E9C037CB986301799BD054B1646EE5DD2CC10A42FFEF80F0BFA4892060FFF2355A7ADFF1E949C93F89133
                                                                                  Malicious:false
                                                                                  Preview: ................................................................................h.......}........................B..............Zb..................................................@.t.z.r.e.s...d.l.l.,.-.2.1.2.......................................................@.t.z.r.e.s...d.l.l.,.-.2.1.1............................................................."%...... ........}...........U.n.i.s.t.a.c.k.C.r.i.t.i.c.a.l...C.:.\.U.s.e.r.s.\.h.a.r.d.z.\.A.p.p.D.a.t.a.\.L.o.c.a.l.\.p.a.c.k.a.g.e.s.\.A.c.t.i.v.e.S.y.n.c.\.L.o.c.a.l.S.t.a.t.e.\.D.i.a.g.O.u.t.p.u.t.D.i.r.\.U.n.i.s.t.a.c.k.C.r.i.t.i.c.a.l...e.t.l.......P.P.h...............................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  C:\Users\user\AppData\Local\packages\ActiveSync\LocalState\DiagOutputDir\SyncVerbose.etl.0001@@ (copy)
                                                                                  Process:C:\Windows\System32\svchost.exe
                                                                                  File Type:data
                                                                                  Category:dropped
                                                                                  Size (bytes):65536
                                                                                  Entropy (8bit):0.11004564230850619
                                                                                  Encrypted:false
                                                                                  SSDEEP:12:26+XjXm/Ey6q99959q3qQ10nMCldimE8eawHjcxXf:26+Kl68mLyMCldzE9BHjcxP
                                                                                  MD5:D0C1EBD79E84FE82388BC9F7FAA9CA8D
                                                                                  SHA1:A2012915159E4087A0016D27E06EC7B73547172B
                                                                                  SHA-256:1A0F75CF856C251A5B9396767140280A76F556D24D75B655AA6B85ABCDA41FEF
                                                                                  SHA-512:5F626CC9C2BD9263C1D1E793D2A0E7F8EDE52DC729F8BBF13D4CE0BDA3713F061EE191CF3825CB621BB0DCFD6CF438A3E4694E4A4B9172F1E2B45509D920F533
                                                                                  Malicious:false
                                                                                  Preview: ................................................................................h.......]d.......................B..............Zb..................................................@.t.z.r.e.s...d.l.l.,.-.2.1.2.......................................................@.t.z.r.e.s...d.l.l.,.-.2.1.1............................................................."%...... .........}...........S.y.n.c.V.e.r.b.o.s.e...C.:.\.U.s.e.r.s.\.h.a.r.d.z.\.A.p.p.D.a.t.a.\.L.o.c.a.l.\.p.a.c.k.a.g.e.s.\.A.c.t.i.v.e.S.y.n.c.\.L.o.c.a.l.S.t.a.t.e.\.D.i.a.g.O.u.t.p.u.t.D.i.r.\.S.y.n.c.V.e.r.b.o.s.e...e.t.l...........P.P.h........s......................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  C:\Users\user\AppData\Local\packages\ActiveSync\LocalState\DiagOutputDir\UnistackCircular.etl.0001 (copy)
                                                                                  Process:C:\Windows\System32\svchost.exe
                                                                                  File Type:data
                                                                                  Category:dropped
                                                                                  Size (bytes):65536
                                                                                  Entropy (8bit):0.11272036861319339
                                                                                  Encrypted:false
                                                                                  SSDEEP:12:AXjXm/Ey6q9995t61miM3qQ10nMCldimE8eawHza1miI4iXP:AKl68a1tMLyMCldzE9BHza1tIR/
                                                                                  MD5:F55E1FDF1FD6A55ADDF04680DB2181B2
                                                                                  SHA1:4C55AD3BFEBB580715A41563DDACBD106A1E25C1
                                                                                  SHA-256:70561299BB407E61BDE3FF7FB7D71CE2CE5944D0DD1440064CE61AF3BF713194
                                                                                  SHA-512:6A0C04F0419FAD213A4D43AB019BF64DAA17D28B4F02AD762E433149BAF6985BD1A4583C3CE3CAC872546A0A5000104633AE431B45221C98FA1189298CE8F233
                                                                                  Malicious:false
                                                                                  Preview: ................................................................................h................................B..............Zb..................................................@.t.z.r.e.s...d.l.l.,.-.2.1.2.......................................................@.t.z.r.e.s...d.l.l.,.-.2.1.1............................................................."%...... ....._...}...........U.n.i.s.t.a.c.k.C.i.r.c.u.l.a.r...C.:.\.U.s.e.r.s.\.h.a.r.d.z.\.A.p.p.D.a.t.a.\.L.o.c.a.l.\.p.a.c.k.a.g.e.s.\.A.c.t.i.v.e.S.y.n.c.\.L.o.c.a.l.S.t.a.t.e.\.D.i.a.g.O.u.t.p.u.t.D.i.r.\.U.n.i.s.t.a.c.k.C.i.r.c.u.l.a.r...e.t.l.......P.P.h...............................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  C:\Users\user\AppData\Local\packages\ActiveSync\LocalState\DiagOutputDir\UnistackCritical.etl.0001B. (copy)
                                                                                  Process:C:\Windows\System32\svchost.exe
                                                                                  File Type:data
                                                                                  Category:dropped
                                                                                  Size (bytes):65536
                                                                                  Entropy (8bit):0.11273857454530721
                                                                                  Encrypted:false
                                                                                  SSDEEP:12:FJXjXm/Ey6q9995bf1mK2P3qQ10nMCldimE8eawHza1mKSiXP:FJKl68h1iPLyMCldzE9BHza12i/
                                                                                  MD5:90DE189AB507C6F07379D8A60A2C67CA
                                                                                  SHA1:B056F736B2D0DACD76193D6213CD149DA65C634D
                                                                                  SHA-256:8889615CBB2FA34222B2187B422DBFE6D1F4F9D68320CD6859D62444F293355B
                                                                                  SHA-512:584748E66C1098573C7804E305DA3A5666CE2C42379E9C037CB986301799BD054B1646EE5DD2CC10A42FFEF80F0BFA4892060FFF2355A7ADFF1E949C93F89133
                                                                                  Malicious:false
                                                                                  Preview: ................................................................................h.......}........................B..............Zb..................................................@.t.z.r.e.s...d.l.l.,.-.2.1.2.......................................................@.t.z.r.e.s...d.l.l.,.-.2.1.1............................................................."%...... ........}...........U.n.i.s.t.a.c.k.C.r.i.t.i.c.a.l...C.:.\.U.s.e.r.s.\.h.a.r.d.z.\.A.p.p.D.a.t.a.\.L.o.c.a.l.\.p.a.c.k.a.g.e.s.\.A.c.t.i.v.e.S.y.n.c.\.L.o.c.a.l.S.t.a.t.e.\.D.i.a.g.O.u.t.p.u.t.D.i.r.\.U.n.i.s.t.a.c.k.C.r.i.t.i.c.a.l...e.t.l.......P.P.h...............................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  C:\Windows\ServiceProfiles\LocalService\AppData\Local\Temp\MpCmdRun.log
                                                                                  Process:C:\Program Files\Windows Defender\MpCmdRun.exe
                                                                                  File Type:Little-endian UTF-16 Unicode text, with CRLF, CR line terminators
                                                                                  Category:modified
                                                                                  Size (bytes):9062
                                                                                  Entropy (8bit):3.1634752007515226
                                                                                  Encrypted:false
                                                                                  SSDEEP:192:cY+38+DJl+ibJ6+ioJJ+i3N+WtT+E9tD+Ett3d+E3zu+U:j+s+v+b+P+m+0+Q+q+l+U
                                                                                  MD5:98FE91B770DC3173B1FB98FCE4C28106
                                                                                  SHA1:A65DCAFD5EFA0086A49CBF3626DC7CBCD3713C5A
                                                                                  SHA-256:D11905C487D0B420432E4E368B967E45C84E7A41836929E9B3CA1DCBF4984BF1
                                                                                  SHA-512:CCA21FF6A276D62CAD4E7C71BE85537A799EF774043568636B53E14F12B49B45D80AB7ED4AA50D8F56107A97734607EF9F104AAE4EA8909B1011EA8FC695E5F4
                                                                                  Malicious:false
                                                                                  Preview: ..........-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.....M.p.C.m.d.R.u.n.:. .C.o.m.m.a.n.d. .L.i.n.e.:. .".C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.W.i.n.d.o.w.s. .D.e.f.e.n.d.e.r.\.m.p.c.m.d.r.u.n...e.x.e.". .-.w.d.e.n.a.b.l.e..... .S.t.a.r.t. .T.i.m.e.:. .. T.h.u. .. J.u.n. .. 2.7. .. 2.0.1.9. .0.1.:.2.9.:.4.9.........M.p.E.n.s.u.r.e.P.r.o.c.e.s.s.M.i.t.i.g.a.t.i.o.n.P.o.l.i.c.y.:. .h.r. .=. .0.x.1.....W.D.E.n.a.b.l.e.....E.R.R.O.R.:. .M.p.W.D.E.n.a.b.l.e.(.T.R.U.E.). .f.a.i.l.e.d. .(.8.0.0.7.0.4.E.C.).....M.p.C.m.d.R.u.n.:. .E.n.d. .T.i.m.e.:. .. T.h.u. .. J.u.n. .. 2.7. .. 2.0.1.9. .0.1.:.2.9.:.4.9.....-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.............-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.
                                                                                  C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Windows\DeliveryOptimization\Logs\dosvc.20220114_193309_336.etl
                                                                                  Process:C:\Windows\System32\svchost.exe
                                                                                  File Type:data
                                                                                  Category:dropped
                                                                                  Size (bytes):12288
                                                                                  Entropy (8bit):3.7720253343097254
                                                                                  Encrypted:false
                                                                                  SSDEEP:96:ICapdQ/o+Ml5PJ9N2YvHCPgII2l21kSO4a8T2kYFzWUMCj6JRQ57fY50UMCQK54a:baiqcVI2mYkC0SrCECp/RmCTC2Co
                                                                                  MD5:E48D22E2759A539B7F5DD04A288FAA87
                                                                                  SHA1:0A6BF33FAF75D8C4B57482BE0BBD36F794F28A32
                                                                                  SHA-256:1FEEE7CD3F43871A1BE00BC1F0D7947CE10F81446C2E096DF1C8899558EDCF6D
                                                                                  SHA-512:43562077C7157A15A4DF62835BB5A32C3D0E30339AE8249DBD8A5815EC77BD45A0C386295C451FC817BB27ED708CA0C81E6354322514FC3D22AFAD0F3516C06B
                                                                                  Malicious:false
                                                                                  Preview: .... ... ....................................... ...!...........................$................................B..............Zb... ... ..........................................@.t.z.r.e.s...d.l.l.,.-.2.1.2.......................................................@.t.z.r.e.s...d.l.l.,.-.2.1.1..................................................................... .....i...}...........8.6.9.6.E.A.C.4.-.1.2.8.8.-.4.2.8.8.-.A.4.E.E.-.4.9.E.E.4.3.1.B.0.A.D.9...C.:.\.W.i.n.d.o.w.s.\.S.e.r.v.i.c.e.P.r.o.f.i.l.e.s.\.N.e.t.w.o.r.k.S.e.r.v.i.c.e.\.A.p.p.D.a.t.a.\.L.o.c.a.l.\.M.i.c.r.o.s.o.f.t.\.W.i.n.d.o.w.s.\.D.e.l.i.v.e.r.y.O.p.t.i.m.i.z.a.t.i.o.n.\.L.o.g.s.\.d.o.s.v.c...2.0.2.2.0.1.1.4._.1.9.3.3.0.9._.3.3.6...e.t.l.........P.P.$...............................................................................................................................................................................................................................................................................

                                                                                  Static File Info

                                                                                  General

                                                                                  File type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                  Entropy (8bit):7.087980329599347
                                                                                  TrID:
                                                                                  • Win32 Dynamic Link Library (generic) (1002004/3) 95.65%
                                                                                  • Win32 EXE PECompact compressed (generic) (41571/9) 3.97%
                                                                                  • Generic Win/DOS Executable (2004/3) 0.19%
                                                                                  • DOS Executable Generic (2002/1) 0.19%
                                                                                  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                                  File name:5o8zdV3GU3.dll
                                                                                  File size:417792
                                                                                  MD5:189bf4703028e64816a04b4e4ed2767d
                                                                                  SHA1:0b7b0275e4095b367cb9bc54594d67b539b70ff1
                                                                                  SHA256:adadac282d13fd1859a084555e73747d751d27f39059026c08b52f2a316dddc9
                                                                                  SHA512:db4601cdb481fa7de52944e905543262aa9c24b7120dcf87031e29b403bc3e3aa6ce79df87f0fb21da219a77dd9c3f7b68ad26dc60cb8f0ce20ab3210305c609
                                                                                  SSDEEP:6144:o1ju3jPam65ucnNgDoDUhuGGwKveuz4VKYjHyCAJOhrmBlDxqms9ujAJKedmL/:yMjcuDaUIm5StJorohvsMjmKe
                                                                                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......Z'...F...F...F...I...F...I...F...F...D..9....F..9....F..9....F..9....F..9....F..9....F..Rich.F..................PE..L...k+.a...

                                                                                  File Icon

                                                                                  Icon Hash:71b018ccc6577131

                                                                                  Static PE Info

                                                                                  General

                                                                                  Entrypoint:0x10017b85
                                                                                  Entrypoint Section:.text
                                                                                  Digitally signed:false
                                                                                  Imagebase:0x10000000
                                                                                  Subsystem:windows gui
                                                                                  Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE, DLL
                                                                                  DLL Characteristics:
                                                                                  Time Stamp:0x61E02B6B [Thu Jan 13 13:38:51 2022 UTC]
                                                                                  TLS Callbacks:
                                                                                  CLR (.Net) Version:
                                                                                  OS Version Major:4
                                                                                  OS Version Minor:0
                                                                                  File Version Major:4
                                                                                  File Version Minor:0
                                                                                  Subsystem Version Major:4
                                                                                  Subsystem Version Minor:0
                                                                                  Import Hash:90add561a8bf6976696c056c199a41b8

                                                                                  Entrypoint Preview

                                                                                  Instruction
                                                                                  cmp dword ptr [esp+08h], 01h
                                                                                  jne 00007FEADCBE3047h
                                                                                  call 00007FEADCBEADC8h
                                                                                  push dword ptr [esp+04h]
                                                                                  mov ecx, dword ptr [esp+10h]
                                                                                  mov edx, dword ptr [esp+0Ch]
                                                                                  call 00007FEADCBE2F32h
                                                                                  pop ecx
                                                                                  retn 000Ch
                                                                                  push 00000000h
                                                                                  push dword ptr [esp+14h]
                                                                                  push dword ptr [esp+14h]
                                                                                  push dword ptr [esp+14h]
                                                                                  push dword ptr [esp+14h]
                                                                                  call 00007FEADCBEAE30h
                                                                                  add esp, 14h
                                                                                  ret
                                                                                  push eax
                                                                                  push dword ptr fs:[00000000h]
                                                                                  lea eax, dword ptr [esp+0Ch]
                                                                                  sub esp, dword ptr [esp+0Ch]
                                                                                  push ebx
                                                                                  push esi
                                                                                  push edi
                                                                                  mov dword ptr [eax], ebp
                                                                                  mov ebp, eax
                                                                                  mov eax, dword ptr [10057A08h]
                                                                                  xor eax, ebp
                                                                                  push eax
                                                                                  push dword ptr [ebp-04h]
                                                                                  mov dword ptr [ebp-04h], FFFFFFFFh
                                                                                  lea eax, dword ptr [ebp-0Ch]
                                                                                  mov dword ptr fs:[00000000h], eax
                                                                                  ret
                                                                                  push eax
                                                                                  push dword ptr fs:[00000000h]
                                                                                  lea eax, dword ptr [esp+0Ch]
                                                                                  sub esp, dword ptr [esp+0Ch]
                                                                                  push ebx
                                                                                  push esi
                                                                                  push edi
                                                                                  mov dword ptr [eax], ebp
                                                                                  mov ebp, eax
                                                                                  mov eax, dword ptr [10057A08h]
                                                                                  xor eax, ebp
                                                                                  push eax
                                                                                  mov dword ptr [ebp-10h], esp
                                                                                  push dword ptr [ebp-04h]
                                                                                  mov dword ptr [ebp-04h], FFFFFFFFh
                                                                                  lea eax, dword ptr [ebp-0Ch]
                                                                                  mov dword ptr fs:[00000000h], eax
                                                                                  ret
                                                                                  push eax
                                                                                  push dword ptr fs:[00000000h]
                                                                                  lea eax, dword ptr [esp+0Ch]
                                                                                  sub esp, dword ptr [esp+0Ch]
                                                                                  push ebx
                                                                                  push esi
                                                                                  push edi
                                                                                  mov dword ptr [eax], ebp
                                                                                  mov ebp, eax
                                                                                  mov eax, dword ptr [10057A08h]
                                                                                  xor eax, ebp
                                                                                  push eax
                                                                                  mov dword ptr [ebp-10h], eax

                                                                                  Rich Headers

                                                                                  Programming Language:
                                                                                  • [RES] VS2005 build 50727
                                                                                  • [ C ] VS2005 build 50727
                                                                                  • [EXP] VS2005 build 50727
                                                                                  • [C++] VS2005 build 50727
                                                                                  • [ASM] VS2005 build 50727
                                                                                  • [LNK] VS2005 build 50727

                                                                                  Data Directories

                                                                                  NameVirtual AddressVirtual Size Is in Section
                                                                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x313c00x50.rdata
                                                                                  IMAGE_DIRECTORY_ENTRY_IMPORT0x2fdcc0xb4.rdata
                                                                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x5d0000x3664.rsrc
                                                                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x610000x3df4.reloc
                                                                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x2cd600x40.rdata
                                                                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_IAT0x290000x440.rdata
                                                                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x2fd440x40.rdata
                                                                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                                                                  Sections

                                                                                  NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                  .text0x10000x27f5e0x28000False0.514996337891data6.66251942868IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                                                                  .rdata0x290000x84100x9000False0.308837890625data4.83029566033IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                  .data0x320000x2a9a00x27000False0.963572966747data7.93281036967IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                                                                                  .rsrc0x5d0000x36640x4000False0.274780273438data4.49622273105IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                  .reloc0x610000x82840x9000False0.33251953125data3.82081999119IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                                                                                  Resources

                                                                                  NameRVASizeTypeLanguageCountry
                                                                                  RT_CURSOR0x5db080x134dataChineseChina
                                                                                  RT_CURSOR0x5dc3c0xb4dataChineseChina
                                                                                  RT_CURSOR0x5dcf00x134AmigaOS bitmap fontChineseChina
                                                                                  RT_CURSOR0x5de240x134dataChineseChina
                                                                                  RT_CURSOR0x5df580x134dataChineseChina
                                                                                  RT_CURSOR0x5e08c0x134dataChineseChina
                                                                                  RT_CURSOR0x5e1c00x134dataChineseChina
                                                                                  RT_CURSOR0x5e2f40x134dataChineseChina
                                                                                  RT_CURSOR0x5e4280x134dataChineseChina
                                                                                  RT_CURSOR0x5e55c0x134dataChineseChina
                                                                                  RT_CURSOR0x5e6900x134dataChineseChina
                                                                                  RT_CURSOR0x5e7c40x134dataChineseChina
                                                                                  RT_CURSOR0x5e8f80x134AmigaOS bitmap fontChineseChina
                                                                                  RT_CURSOR0x5ea2c0x134dataChineseChina
                                                                                  RT_CURSOR0x5eb600x134dataChineseChina
                                                                                  RT_CURSOR0x5ec940x134dataChineseChina
                                                                                  RT_BITMAP0x5edc80xb8dataChineseChina
                                                                                  RT_BITMAP0x5ee800x144dataChineseChina
                                                                                  RT_ICON0x5efc40x2e8dBase IV DBT of @.DBF, block length 512, next free block index 40, next free block 67108992, next used block 3293332676ChineseChina
                                                                                  RT_ICON0x5f2ac0x128GLS_BINARY_LSB_FIRSTChineseChina
                                                                                  RT_DIALOG0x5f3d40x33cdataChineseChina
                                                                                  RT_DIALOG0x5f7100xe2dataChineseChina
                                                                                  RT_DIALOG0x5f7f40x34dataChineseChina
                                                                                  RT_STRING0x5f8280x54dataChineseChina
                                                                                  RT_STRING0x5f87c0x2cdataChineseChina
                                                                                  RT_STRING0x5f8a80x82dataChineseChina
                                                                                  RT_STRING0x5f92c0x1d0dataChineseChina
                                                                                  RT_STRING0x5fafc0x164dataChineseChina
                                                                                  RT_STRING0x5fc600x132dataChineseChina
                                                                                  RT_STRING0x5fd940x50dataChineseChina
                                                                                  RT_STRING0x5fde40x40dataChineseChina
                                                                                  RT_STRING0x5fe240x6adataChineseChina
                                                                                  RT_STRING0x5fe900x1d6dataChineseChina
                                                                                  RT_STRING0x600680x110dataChineseChina
                                                                                  RT_STRING0x601780x24dataChineseChina
                                                                                  RT_STRING0x6019c0x30dataChineseChina
                                                                                  RT_GROUP_CURSOR0x601cc0x22Lotus unknown worksheet or configuration, revision 0x2ChineseChina
                                                                                  RT_GROUP_CURSOR0x601f00x14Lotus unknown worksheet or configuration, revision 0x1ChineseChina
                                                                                  RT_GROUP_CURSOR0x602040x14Lotus unknown worksheet or configuration, revision 0x1ChineseChina
                                                                                  RT_GROUP_CURSOR0x602180x14Lotus unknown worksheet or configuration, revision 0x1ChineseChina
                                                                                  RT_GROUP_CURSOR0x6022c0x14Lotus unknown worksheet or configuration, revision 0x1ChineseChina
                                                                                  RT_GROUP_CURSOR0x602400x14Lotus unknown worksheet or configuration, revision 0x1ChineseChina
                                                                                  RT_GROUP_CURSOR0x602540x14Lotus unknown worksheet or configuration, revision 0x1ChineseChina
                                                                                  RT_GROUP_CURSOR0x602680x14Lotus unknown worksheet or configuration, revision 0x1ChineseChina
                                                                                  RT_GROUP_CURSOR0x6027c0x14Lotus unknown worksheet or configuration, revision 0x1ChineseChina
                                                                                  RT_GROUP_CURSOR0x602900x14Lotus unknown worksheet or configuration, revision 0x1ChineseChina
                                                                                  RT_GROUP_CURSOR0x602a40x14Lotus unknown worksheet or configuration, revision 0x1ChineseChina
                                                                                  RT_GROUP_CURSOR0x602b80x14Lotus unknown worksheet or configuration, revision 0x1ChineseChina
                                                                                  RT_GROUP_CURSOR0x602cc0x14Lotus unknown worksheet or configuration, revision 0x1ChineseChina
                                                                                  RT_GROUP_CURSOR0x602e00x14Lotus unknown worksheet or configuration, revision 0x1ChineseChina
                                                                                  RT_GROUP_CURSOR0x602f40x14Lotus unknown worksheet or configuration, revision 0x1ChineseChina
                                                                                  RT_GROUP_ICON0x603080x22dataChineseChina
                                                                                  RT_VERSION0x6032c0x2e0dataChineseChina
                                                                                  RT_MANIFEST0x6060c0x56ASCII text, with CRLF line terminatorsEnglishUnited States

                                                                                  Imports

                                                                                  DLLImport
                                                                                  KERNEL32.dllCreateFileA, GetCPInfo, GetOEMCP, RtlUnwind, HeapReAlloc, GetCommandLineA, RaiseException, ExitProcess, HeapSize, HeapDestroy, HeapCreate, TerminateProcess, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsDebuggerPresent, GetACP, LCMapStringW, GetStdHandle, SetHandleCount, GetFileType, GetStartupInfoA, FreeEnvironmentStringsA, GetEnvironmentStrings, FreeEnvironmentStringsW, GetEnvironmentStringsW, QueryPerformanceCounter, GetTickCount, GetSystemTimeAsFileTime, GetConsoleCP, GetConsoleMode, GetStringTypeA, GetStringTypeW, SetStdHandle, WriteConsoleA, GetConsoleOutputCP, WriteConsoleW, GetCurrentProcess, GetThreadLocale, FlushFileBuffers, SetFilePointer, WriteFile, ReadFile, GlobalFlags, WritePrivateProfileStringA, TlsFree, DeleteCriticalSection, LocalReAlloc, TlsSetValue, TlsAlloc, InitializeCriticalSection, GlobalHandle, GlobalReAlloc, EnterCriticalSection, TlsGetValue, LeaveCriticalSection, LocalAlloc, InterlockedIncrement, GlobalGetAtomNameA, GlobalFindAtomA, lstrcmpW, GetVersionExA, InterlockedDecrement, FreeResource, GetCurrentProcessId, GlobalAddAtomA, GetCurrentThread, GetCurrentThreadId, ConvertDefaultLocale, GetModuleFileNameA, EnumResourceLanguagesA, GetLocaleInfoA, lstrcmpA, GlobalDeleteAtom, GetModuleHandleA, GlobalFree, GlobalAlloc, GlobalLock, GlobalUnlock, FormatMessageA, LocalFree, FindResourceA, LoadResource, LockResource, SizeofResource, MulDiv, CreateThread, CloseHandle, HeapFree, GetNativeSystemInfo, GetProcessHeap, HeapAlloc, FreeLibrary, GetProcAddress, LoadLibraryA, IsBadReadPtr, VirtualProtect, SetLastError, VirtualAlloc, VirtualFree, VirtualQuery, Sleep, GetLastError, lstrlenA, WideCharToMultiByte, CompareStringA, MultiByteToWideChar, GetVersion, LCMapStringA, InterlockedExchange
                                                                                  USER32.dllLoadCursorA, GetSysColorBrush, EndPaint, BeginPaint, ReleaseDC, GetDC, ClientToScreen, GrayStringA, DrawTextExA, DrawTextA, TabbedTextOutA, SetWindowTextA, IsDialogMessageA, SetDlgItemTextA, GetDlgItemTextA, RegisterWindowMessageA, SendDlgItemMessageA, WinHelpA, GetCapture, GetClassLongA, GetClassNameA, SetPropA, GetPropA, RemovePropA, SetFocus, GetWindowTextLengthA, GetWindowTextA, GetForegroundWindow, GetTopWindow, GetMessageTime, MapWindowPoints, SetForegroundWindow, UpdateWindow, GetMenu, CreateWindowExA, GetClassInfoExA, GetClassInfoA, RegisterClassA, GetSysColor, CopyRect, PtInRect, GetDlgCtrlID, DefWindowProcA, CallWindowProcA, SetWindowLongA, SetWindowPos, SystemParametersInfoA, GetWindowPlacement, GetWindowRect, GetWindow, UnhookWindowsHookEx, GetDesktopWindow, SetActiveWindow, CreateDialogIndirectParamA, DestroyWindow, IsWindow, GetDlgItem, GetNextDlgTabItem, EndDialog, GetWindowThreadProcessId, GetWindowLongA, GetLastActivePopup, IsWindowEnabled, MessageBoxA, SetCursor, SetWindowsHookExA, CallNextHookEx, GetMessageA, TranslateMessage, DispatchMessageA, GetActiveWindow, IsWindowVisible, GetKeyState, PeekMessageA, GetCursorPos, ValidateRect, SetMenuItemBitmaps, DestroyMenu, UnregisterClassA, GetMessagePos, GetMenuCheckMarkDimensions, LoadBitmapA, GetFocus, GetParent, ModifyMenuA, EnableMenuItem, CheckMenuItem, PostQuitMessage, GetMenuState, GetMenuItemID, GetMenuItemCount, GetSubMenu, SetTimer, KillTimer, IsIconic, GetSystemMetrics, GetClientRect, DrawIcon, SendMessageA, ShowWindow, EnableWindow, LoadIconA, PostMessageA, AdjustWindowRectEx
                                                                                  GDI32.dllSetWindowExtEx, ScaleWindowExtEx, DeleteDC, GetStockObject, ScaleViewportExtEx, SetViewportExtEx, OffsetViewportOrgEx, SetViewportOrgEx, SelectObject, Escape, ExtTextOutA, TextOutA, RectVisible, PtVisible, GetDeviceCaps, DeleteObject, SetMapMode, RestoreDC, SaveDC, GetObjectA, SetBkColor, SetTextColor, GetClipBox, CreateBitmap
                                                                                  WINSPOOL.DRVDocumentPropertiesA, ClosePrinter, OpenPrinterA
                                                                                  ADVAPI32.dllRegSetValueExA, RegCreateKeyExA, RegQueryValueA, RegEnumKeyA, RegDeleteKeyA, RegOpenKeyExA, RegQueryValueExA, RegOpenKeyA, RegCloseKey
                                                                                  SHLWAPI.dllPathFindExtensionA
                                                                                  OLEAUT32.dllVariantClear, VariantChangeType, VariantInit
                                                                                  WS2_32.dllsendto, recvfrom, WSAStartup, inet_addr, htons, socket, bind, setsockopt, WSACleanup, closesocket, htonl

                                                                                  Exports

                                                                                  NameOrdinalAddress
                                                                                  DllRegisterServer10x10008af0

                                                                                  Version Infos

                                                                                  DescriptionData
                                                                                  LegalCopyright (C) 2014
                                                                                  InternalNameUDPTool
                                                                                  FileVersion1, 0, 0, 1
                                                                                  CompanyName
                                                                                  LegalTrademarks
                                                                                  ProductNameUDPTool
                                                                                  ProductVersion1, 0, 0, 1
                                                                                  FileDescriptionUDPTool Microsoft
                                                                                  OriginalFilenameUDPTool.EXE
                                                                                  Translation0x0804 0x04b0

                                                                                  Possible Origin

                                                                                  Language of compilation systemCountry where language is spokenMap
                                                                                  ChineseChina
                                                                                  EnglishUnited States

                                                                                  Network Behavior

                                                                                  Snort IDS Alerts

                                                                                  TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                                                                  01/14/22-11:33:33.971322TCP2404332ET CNC Feodo Tracker Reported CnC Server TCP group 174974580192.168.2.345.138.98.34
                                                                                  01/14/22-11:33:35.051066TCP2404338ET CNC Feodo Tracker Reported CnC Server TCP group 20497468080192.168.2.369.16.218.101

                                                                                  Network Port Distribution

                                                                                  TCP Packets

                                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                                  Jan 14, 2022 11:33:33.971322060 CET4974580192.168.2.345.138.98.34
                                                                                  Jan 14, 2022 11:33:33.988095999 CET804974545.138.98.34192.168.2.3
                                                                                  Jan 14, 2022 11:33:34.492244959 CET4974580192.168.2.345.138.98.34
                                                                                  Jan 14, 2022 11:33:34.509115934 CET804974545.138.98.34192.168.2.3
                                                                                  Jan 14, 2022 11:33:35.025767088 CET4974580192.168.2.345.138.98.34
                                                                                  Jan 14, 2022 11:33:35.042982101 CET804974545.138.98.34192.168.2.3
                                                                                  Jan 14, 2022 11:33:35.051065922 CET497468080192.168.2.369.16.218.101
                                                                                  Jan 14, 2022 11:33:35.184227943 CET80804974669.16.218.101192.168.2.3
                                                                                  Jan 14, 2022 11:33:35.184417963 CET497468080192.168.2.369.16.218.101
                                                                                  Jan 14, 2022 11:33:35.230561018 CET497468080192.168.2.369.16.218.101
                                                                                  Jan 14, 2022 11:33:35.364490032 CET80804974669.16.218.101192.168.2.3
                                                                                  Jan 14, 2022 11:33:35.377569914 CET80804974669.16.218.101192.168.2.3
                                                                                  Jan 14, 2022 11:33:35.377597094 CET80804974669.16.218.101192.168.2.3
                                                                                  Jan 14, 2022 11:33:35.377731085 CET497468080192.168.2.369.16.218.101
                                                                                  Jan 14, 2022 11:33:37.991425037 CET497468080192.168.2.369.16.218.101
                                                                                  Jan 14, 2022 11:33:38.125765085 CET80804974669.16.218.101192.168.2.3
                                                                                  Jan 14, 2022 11:33:38.126228094 CET80804974669.16.218.101192.168.2.3
                                                                                  Jan 14, 2022 11:33:38.126312017 CET497468080192.168.2.369.16.218.101
                                                                                  Jan 14, 2022 11:33:38.129585981 CET497468080192.168.2.369.16.218.101
                                                                                  Jan 14, 2022 11:33:38.262804985 CET80804974669.16.218.101192.168.2.3
                                                                                  Jan 14, 2022 11:33:38.766268969 CET80804974669.16.218.101192.168.2.3
                                                                                  Jan 14, 2022 11:33:38.768337965 CET497468080192.168.2.369.16.218.101
                                                                                  Jan 14, 2022 11:33:41.771298885 CET80804974669.16.218.101192.168.2.3
                                                                                  Jan 14, 2022 11:33:41.771322966 CET80804974669.16.218.101192.168.2.3
                                                                                  Jan 14, 2022 11:33:41.771457911 CET497468080192.168.2.369.16.218.101
                                                                                  Jan 14, 2022 11:35:12.626627922 CET497468080192.168.2.369.16.218.101
                                                                                  Jan 14, 2022 11:35:12.626677990 CET497468080192.168.2.369.16.218.101

                                                                                  DNS Answers

                                                                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                                                                  Jan 14, 2022 11:33:36.622252941 CET8.8.8.8192.168.2.30x7de9No error (0)windowsupdate.s.llnwi.net95.140.236.128A (IP address)IN (0x0001)
                                                                                  Jan 14, 2022 11:33:55.076152086 CET8.8.8.8192.168.2.30x6df3No error (0)windowsupdate.s.llnwi.net41.63.96.0A (IP address)IN (0x0001)
                                                                                  Jan 14, 2022 11:33:55.076152086 CET8.8.8.8192.168.2.30x6df3No error (0)windowsupdate.s.llnwi.net41.63.96.128A (IP address)IN (0x0001)

                                                                                  Code Manipulations

                                                                                  Statistics

                                                                                  Behavior

                                                                                  Click to jump to process

                                                                                  System Behavior

                                                                                  General

                                                                                  Start time:11:33:07
                                                                                  Start date:14/01/2022
                                                                                  Path:C:\Windows\System32\svchost.exe
                                                                                  Wow64 process (32bit):false
                                                                                  Commandline:C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
                                                                                  Imagebase:0x7ff70d6e0000
                                                                                  File size:51288 bytes
                                                                                  MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                                  Has elevated privileges:true
                                                                                  Has administrator privileges:true
                                                                                  Programmed in:C, C++ or other language
                                                                                  Reputation:high

                                                                                  General

                                                                                  Start time:11:33:07
                                                                                  Start date:14/01/2022
                                                                                  Path:C:\Windows\System32\loaddll32.exe
                                                                                  Wow64 process (32bit):true
                                                                                  Commandline:loaddll32.exe "C:\Users\user\Desktop\5o8zdV3GU3.dll"
                                                                                  Imagebase:0x160000
                                                                                  File size:116736 bytes
                                                                                  MD5 hash:7DEB5DB86C0AC789123DEC286286B938
                                                                                  Has elevated privileges:true
                                                                                  Has administrator privileges:true
                                                                                  Programmed in:C, C++ or other language
                                                                                  Reputation:moderate

                                                                                  General

                                                                                  Start time:11:33:07
                                                                                  Start date:14/01/2022
                                                                                  Path:C:\Windows\System32\svchost.exe
                                                                                  Wow64 process (32bit):false
                                                                                  Commandline:c:\windows\system32\svchost.exe -k localservice -p -s CDPSvc
                                                                                  Imagebase:0x7ff70d6e0000
                                                                                  File size:51288 bytes
                                                                                  MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                                  Has elevated privileges:true
                                                                                  Has administrator privileges:false
                                                                                  Programmed in:C, C++ or other language
                                                                                  Reputation:high

                                                                                  General

                                                                                  Start time:11:33:07
                                                                                  Start date:14/01/2022
                                                                                  Path:C:\Windows\SysWOW64\cmd.exe
                                                                                  Wow64 process (32bit):true
                                                                                  Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\5o8zdV3GU3.dll",#1
                                                                                  Imagebase:0xd80000
                                                                                  File size:232960 bytes
                                                                                  MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                                                                                  Has elevated privileges:true
                                                                                  Has administrator privileges:true
                                                                                  Programmed in:C, C++ or other language
                                                                                  Reputation:high

                                                                                  General

                                                                                  Start time:11:33:08
                                                                                  Start date:14/01/2022
                                                                                  Path:C:\Windows\SysWOW64\regsvr32.exe
                                                                                  Wow64 process (32bit):true
                                                                                  Commandline:regsvr32.exe /s C:\Users\user\Desktop\5o8zdV3GU3.dll
                                                                                  Imagebase:0x240000
                                                                                  File size:20992 bytes
                                                                                  MD5 hash:426E7499F6A7346F0410DEAD0805586B
                                                                                  Has elevated privileges:true
                                                                                  Has administrator privileges:true
                                                                                  Programmed in:C, C++ or other language
                                                                                  Yara matches:
                                                                                  • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000006.00000002.288106949.0000000002920000.00000040.00000001.sdmp, Author: Joe Security
                                                                                  • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000006.00000002.288171571.0000000004221000.00000020.00000001.sdmp, Author: Joe Security
                                                                                  Reputation:high

                                                                                  General

                                                                                  Start time:11:33:08
                                                                                  Start date:14/01/2022
                                                                                  Path:C:\Windows\SysWOW64\rundll32.exe
                                                                                  Wow64 process (32bit):true
                                                                                  Commandline:rundll32.exe "C:\Users\user\Desktop\5o8zdV3GU3.dll",#1
                                                                                  Imagebase:0x1a0000
                                                                                  File size:61952 bytes
                                                                                  MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                                                                                  Has elevated privileges:true
                                                                                  Has administrator privileges:true
                                                                                  Programmed in:C, C++ or other language
                                                                                  Yara matches:
                                                                                  • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000007.00000002.291064992.0000000003371000.00000020.00000001.sdmp, Author: Joe Security
                                                                                  • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000007.00000002.291040092.0000000003340000.00000040.00000001.sdmp, Author: Joe Security
                                                                                  Reputation:high

                                                                                  General

                                                                                  Start time:11:33:08
                                                                                  Start date:14/01/2022
                                                                                  Path:C:\Windows\System32\svchost.exe
                                                                                  Wow64 process (32bit):false
                                                                                  Commandline:c:\windows\system32\svchost.exe -k networkservice -p -s DoSvc
                                                                                  Imagebase:0x7ff70d6e0000
                                                                                  File size:51288 bytes
                                                                                  MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                                  Has elevated privileges:true
                                                                                  Has administrator privileges:false
                                                                                  Programmed in:C, C++ or other language
                                                                                  Reputation:high

                                                                                  General

                                                                                  Start time:11:33:08
                                                                                  Start date:14/01/2022
                                                                                  Path:C:\Windows\SysWOW64\rundll32.exe
                                                                                  Wow64 process (32bit):true
                                                                                  Commandline:rundll32.exe C:\Users\user\Desktop\5o8zdV3GU3.dll,DllRegisterServer
                                                                                  Imagebase:0x1a0000
                                                                                  File size:61952 bytes
                                                                                  MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                                                                                  Has elevated privileges:true
                                                                                  Has administrator privileges:true
                                                                                  Programmed in:C, C++ or other language
                                                                                  Yara matches:
                                                                                  • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000009.00000002.295420739.00000000025D0000.00000040.00000001.sdmp, Author: Joe Security
                                                                                  • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000009.00000002.295926271.0000000004820000.00000040.00000001.sdmp, Author: Joe Security
                                                                                  • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000009.00000002.295834893.0000000004691000.00000020.00000001.sdmp, Author: Joe Security
                                                                                  • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000009.00000002.295905840.00000000047F1000.00000020.00000001.sdmp, Author: Joe Security
                                                                                  • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000009.00000002.295970010.0000000004980000.00000040.00000001.sdmp, Author: Joe Security
                                                                                  • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000009.00000002.295742622.0000000004580000.00000040.00000001.sdmp, Author: Joe Security
                                                                                  • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000009.00000002.295801770.0000000004660000.00000040.00000001.sdmp, Author: Joe Security
                                                                                  • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000009.00000002.295884974.00000000047C0000.00000040.00000001.sdmp, Author: Joe Security
                                                                                  • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000009.00000002.295946412.0000000004851000.00000020.00000001.sdmp, Author: Joe Security
                                                                                  • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000009.00000002.295994852.00000000049B1000.00000020.00000001.sdmp, Author: Joe Security
                                                                                  • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000009.00000002.295767081.00000000045B1000.00000020.00000001.sdmp, Author: Joe Security
                                                                                  • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000009.00000002.295442330.0000000002601000.00000020.00000001.sdmp, Author: Joe Security
                                                                                  Reputation:high

                                                                                  General

                                                                                  Start time:11:33:08
                                                                                  Start date:14/01/2022
                                                                                  Path:C:\Windows\System32\svchost.exe
                                                                                  Wow64 process (32bit):false
                                                                                  Commandline:c:\windows\system32\svchost.exe -k unistacksvcgroup
                                                                                  Imagebase:0x7ff70d6e0000
                                                                                  File size:51288 bytes
                                                                                  MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                                  Has elevated privileges:false
                                                                                  Has administrator privileges:false
                                                                                  Programmed in:C, C++ or other language
                                                                                  Reputation:high

                                                                                  General

                                                                                  Start time:11:33:09
                                                                                  Start date:14/01/2022
                                                                                  Path:C:\Windows\SysWOW64\rundll32.exe
                                                                                  Wow64 process (32bit):true
                                                                                  Commandline:C:\Windows\SysWOW64\rundll32.exe "C:\Users\user\Desktop\5o8zdV3GU3.dll",DllRegisterServer
                                                                                  Imagebase:0x1a0000
                                                                                  File size:61952 bytes
                                                                                  MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                                                                                  Has elevated privileges:true
                                                                                  Has administrator privileges:true
                                                                                  Programmed in:C, C++ or other language

                                                                                  General

                                                                                  Start time:11:33:09
                                                                                  Start date:14/01/2022
                                                                                  Path:C:\Windows\SysWOW64\rundll32.exe
                                                                                  Wow64 process (32bit):true
                                                                                  Commandline:C:\Windows\SysWOW64\rundll32.exe "C:\Users\user\Desktop\5o8zdV3GU3.dll",DllRegisterServer
                                                                                  Imagebase:0x1a0000
                                                                                  File size:61952 bytes
                                                                                  MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                                                                                  Has elevated privileges:true
                                                                                  Has administrator privileges:true
                                                                                  Programmed in:C, C++ or other language
                                                                                  Yara matches:
                                                                                  • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000C.00000002.322196530.00000000046F1000.00000020.00000001.sdmp, Author: Joe Security
                                                                                  • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000C.00000002.322096907.0000000004590000.00000040.00000001.sdmp, Author: Joe Security
                                                                                  • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000C.00000002.322237408.00000000047A0000.00000040.00000001.sdmp, Author: Joe Security
                                                                                  • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000C.00000002.322126344.00000000045C1000.00000020.00000001.sdmp, Author: Joe Security
                                                                                  • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000C.00000002.322324942.0000000004831000.00000020.00000001.sdmp, Author: Joe Security
                                                                                  • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000C.00000002.322265167.00000000047D1000.00000020.00000001.sdmp, Author: Joe Security
                                                                                  • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000C.00000002.321908815.0000000003FF1000.00000020.00000001.sdmp, Author: Joe Security
                                                                                  • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000C.00000002.322168517.00000000046C0000.00000040.00000001.sdmp, Author: Joe Security
                                                                                  • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000C.00000002.321798721.00000000025C0000.00000040.00000001.sdmp, Author: Joe Security
                                                                                  • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000C.00000002.322291454.0000000004800000.00000040.00000001.sdmp, Author: Joe Security

                                                                                  General

                                                                                  Start time:11:33:09
                                                                                  Start date:14/01/2022
                                                                                  Path:C:\Windows\System32\svchost.exe
                                                                                  Wow64 process (32bit):false
                                                                                  Commandline:C:\Windows\System32\svchost.exe -k NetworkService -p
                                                                                  Imagebase:0x7ff70d6e0000
                                                                                  File size:51288 bytes
                                                                                  MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                                  Has elevated privileges:true
                                                                                  Has administrator privileges:false
                                                                                  Programmed in:C, C++ or other language

                                                                                  General

                                                                                  Start time:11:33:11
                                                                                  Start date:14/01/2022
                                                                                  Path:C:\Windows\System32\SgrmBroker.exe
                                                                                  Wow64 process (32bit):false
                                                                                  Commandline:C:\Windows\system32\SgrmBroker.exe
                                                                                  Imagebase:0x7ff6cab20000
                                                                                  File size:163336 bytes
                                                                                  MD5 hash:D3170A3F3A9626597EEE1888686E3EA6
                                                                                  Has elevated privileges:true
                                                                                  Has administrator privileges:true
                                                                                  Programmed in:C, C++ or other language

                                                                                  General

                                                                                  Start time:11:33:12
                                                                                  Start date:14/01/2022
                                                                                  Path:C:\Windows\SysWOW64\rundll32.exe
                                                                                  Wow64 process (32bit):true
                                                                                  Commandline:C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Mumgmtegektiykh\kztyzxlvaam.cuq",PuybGev
                                                                                  Imagebase:0x1a0000
                                                                                  File size:61952 bytes
                                                                                  MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                                                                                  Has elevated privileges:true
                                                                                  Has administrator privileges:true
                                                                                  Programmed in:C, C++ or other language
                                                                                  Yara matches:
                                                                                  • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000F.00000002.299662672.0000000004B31000.00000020.00000001.sdmp, Author: Joe Security
                                                                                  • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000F.00000002.299581696.0000000003240000.00000040.00000001.sdmp, Author: Joe Security

                                                                                  General

                                                                                  Start time:11:33:12
                                                                                  Start date:14/01/2022
                                                                                  Path:C:\Windows\System32\svchost.exe
                                                                                  Wow64 process (32bit):false
                                                                                  Commandline:c:\windows\system32\svchost.exe -k localservicenetworkrestricted -p -s wscsvc
                                                                                  Imagebase:0x7ff70d6e0000
                                                                                  File size:51288 bytes
                                                                                  MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                                  Has elevated privileges:true
                                                                                  Has administrator privileges:false
                                                                                  Programmed in:C, C++ or other language

                                                                                  General

                                                                                  Start time:11:33:13
                                                                                  Start date:14/01/2022
                                                                                  Path:C:\Windows\SysWOW64\rundll32.exe
                                                                                  Wow64 process (32bit):true
                                                                                  Commandline:C:\Windows\SysWOW64\rundll32.exe "C:\Windows\System32\Mumgmtegektiykh\kztyzxlvaam.cuq",DllRegisterServer
                                                                                  Imagebase:0x1a0000
                                                                                  File size:61952 bytes
                                                                                  MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                                                                                  Has elevated privileges:true
                                                                                  Has administrator privileges:true
                                                                                  Programmed in:C, C++ or other language

                                                                                  General

                                                                                  Start time:11:33:19
                                                                                  Start date:14/01/2022
                                                                                  Path:C:\Windows\System32\svchost.exe
                                                                                  Wow64 process (32bit):false
                                                                                  Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p
                                                                                  Imagebase:0x7ff70d6e0000
                                                                                  File size:51288 bytes
                                                                                  MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                                  Has elevated privileges:true
                                                                                  Has administrator privileges:true
                                                                                  Programmed in:C, C++ or other language

                                                                                  General

                                                                                  Start time:11:33:31
                                                                                  Start date:14/01/2022
                                                                                  Path:C:\Windows\System32\svchost.exe
                                                                                  Wow64 process (32bit):false
                                                                                  Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p
                                                                                  Imagebase:0x7ff70d6e0000
                                                                                  File size:51288 bytes
                                                                                  MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                                  Has elevated privileges:true
                                                                                  Has administrator privileges:true
                                                                                  Programmed in:C, C++ or other language

                                                                                  General

                                                                                  Start time:11:33:46
                                                                                  Start date:14/01/2022
                                                                                  Path:C:\Windows\System32\svchost.exe
                                                                                  Wow64 process (32bit):false
                                                                                  Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p
                                                                                  Imagebase:0x7ff70d6e0000
                                                                                  File size:51288 bytes
                                                                                  MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                                  Has elevated privileges:true
                                                                                  Has administrator privileges:true
                                                                                  Programmed in:C, C++ or other language

                                                                                  General

                                                                                  Start time:11:33:55
                                                                                  Start date:14/01/2022
                                                                                  Path:C:\Windows\System32\svchost.exe
                                                                                  Wow64 process (32bit):false
                                                                                  Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p
                                                                                  Imagebase:0x7ff70d6e0000
                                                                                  File size:51288 bytes
                                                                                  MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                                  Has elevated privileges:true
                                                                                  Has administrator privileges:true
                                                                                  Programmed in:C, C++ or other language

                                                                                  General

                                                                                  Start time:11:34:13
                                                                                  Start date:14/01/2022
                                                                                  Path:C:\Program Files\Windows Defender\MpCmdRun.exe
                                                                                  Wow64 process (32bit):false
                                                                                  Commandline:"C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable
                                                                                  Imagebase:0x7ff6b0e70000
                                                                                  File size:455656 bytes
                                                                                  MD5 hash:A267555174BFA53844371226F482B86B
                                                                                  Has elevated privileges:true
                                                                                  Has administrator privileges:false
                                                                                  Programmed in:C, C++ or other language

                                                                                  General

                                                                                  Start time:11:34:13
                                                                                  Start date:14/01/2022
                                                                                  Path:C:\Windows\System32\conhost.exe
                                                                                  Wow64 process (32bit):false
                                                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                  Imagebase:0x7ff7f20f0000
                                                                                  File size:625664 bytes
                                                                                  MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                                  Has elevated privileges:true
                                                                                  Has administrator privileges:false
                                                                                  Programmed in:C, C++ or other language

                                                                                  Disassembly

                                                                                  Code Analysis

                                                                                  Reset < >