Windows Analysis Report gyZm68Cgwf

Overview

General Information

Sample Name: gyZm68Cgwf (renamed file extension from none to dll)
Analysis ID: 553152
MD5: e6a310366f705e69cf9acf9738cd9c19
SHA1: 155edf8c757c340a3e60b9bf3d22568c997715db
SHA256: 4185087d600fb3a1d03e10017bf55233c84013b2e29ca9e0321686cac7c5e1cf
Tags: 32dllexe
Infos:

Most interesting Screenshot:

Detection

Emotet
Score: 100
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

Found malware configuration
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Multi AV Scanner detection for submitted file
Yara detected Emotet
System process connects to network (likely due to code injection or exploit)
Changes security center settings (notifications, updates, antivirus, firewall)
Machine Learning detection for sample
Sigma detected: Suspicious Call by Ordinal
C2 URLs / IPs found in malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query locales information (e.g. system language)
Deletes files inside the Windows folder
May sleep (evasive loops) to hinder dynamic analysis
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Uses code obfuscation techniques (call, push, ret)
Creates files inside the system directory
Internet Provider seen in connection with other malware
Detected potential crypto function
Contains functionality to query CPU information (cpuid)
Found potential string decryption / allocating functions
Sample execution stops while process was sleeping (likely an evasion)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to dynamically determine API calls
Contains functionality which may be used to detect a debugger (GetProcessHeap)
IP address seen in connection with other malware
Creates a DirectInput object (often for capturing keystrokes)
AV process strings found (often used to terminate AV products)
Sample file is different than original file name gathered from version info
PE file contains an invalid checksum
PE file contains strange resources
Tries to load missing DLLs
Contains functionality to read the PEB
Drops PE files to the windows directory (C:\Windows)
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Detected TCP or UDP traffic on non-standard ports
Checks if the current process is being debugged
Connects to several IPs in different countries
Potential key logger detected (key state polling based)
Registers a DLL
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Found large amount of non-executed APIs
Creates a process in suspended mode (likely to inject code)

Classification

AV Detection:

barindex
Found malware configuration
Source: 7.2.rundll32.exe.5030000.4.raw.unpack Malware Configuration Extractor: Emotet {"C2 list": ["45.138.98.34:80", "69.16.218.101:8080", "51.210.242.234:8080", "185.148.168.220:8080", "142.4.219.173:8080", "54.38.242.185:443", "191.252.103.16:80", "104.131.62.48:8080", "62.171.178.147:8080", "217.182.143.207:443", "168.197.250.14:80", "37.44.244.177:8080", "66.42.57.149:443", "210.57.209.142:8080", "159.69.237.188:443", "116.124.128.206:8080", "128.199.192.135:8080", "195.154.146.35:443", "185.148.168.15:8080", "195.77.239.39:8080", "207.148.81.119:8080", "85.214.67.203:8080", "190.90.233.66:443", "78.46.73.125:443", "78.47.204.80:443", "37.59.209.141:8080", "54.37.228.122:443"], "Public Key": ["RUNLMSAAAADYNZPXY4tQxd/N4Wn5sTYAm5tUOxY2ol1ELrI4MNhHNi640vSLasjYTHpFRBoG+o84vtr7AJachCzOHjaAJFCW", "RUNTMSAAAAD0LxqDNhonUYwk8sqo7IWuUllRdUiUBnACc6romsQoe1YJD7wIe4AheqYofpZFucPDXCZ0z9i+ooUffqeoLZU0"]}
Multi AV Scanner detection for submitted file
Source: gyZm68Cgwf.dll Virustotal: Detection: 28% Perma Link
Source: gyZm68Cgwf.dll ReversingLabs: Detection: 39%
Machine Learning detection for sample
Source: gyZm68Cgwf.dll Joe Sandbox ML: detected

Compliance:

barindex
Uses 32bit PE files
Source: gyZm68Cgwf.dll Static PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE, DLL

Networking:

barindex
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Source: Traffic Snort IDS: 2404332 ET CNC Feodo Tracker Reported CnC Server TCP group 17 192.168.2.3:49754 -> 45.138.98.34:80
Source: Traffic Snort IDS: 2404338 ET CNC Feodo Tracker Reported CnC Server TCP group 20 192.168.2.3:49755 -> 69.16.218.101:8080
System process connects to network (likely due to code injection or exploit)
Source: C:\Windows\SysWOW64\rundll32.exe Network Connect: 69.16.218.101 144 Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Network Connect: 45.138.98.34 80 Jump to behavior
C2 URLs / IPs found in malware configuration
Source: Malware configuration extractor IPs: 45.138.98.34:80
Source: Malware configuration extractor IPs: 69.16.218.101:8080
Source: Malware configuration extractor IPs: 51.210.242.234:8080
Source: Malware configuration extractor IPs: 185.148.168.220:8080
Source: Malware configuration extractor IPs: 142.4.219.173:8080
Source: Malware configuration extractor IPs: 54.38.242.185:443
Source: Malware configuration extractor IPs: 191.252.103.16:80
Source: Malware configuration extractor IPs: 104.131.62.48:8080
Source: Malware configuration extractor IPs: 62.171.178.147:8080
Source: Malware configuration extractor IPs: 217.182.143.207:443
Source: Malware configuration extractor IPs: 168.197.250.14:80
Source: Malware configuration extractor IPs: 37.44.244.177:8080
Source: Malware configuration extractor IPs: 66.42.57.149:443
Source: Malware configuration extractor IPs: 210.57.209.142:8080
Source: Malware configuration extractor IPs: 159.69.237.188:443
Source: Malware configuration extractor IPs: 116.124.128.206:8080
Source: Malware configuration extractor IPs: 128.199.192.135:8080
Source: Malware configuration extractor IPs: 195.154.146.35:443
Source: Malware configuration extractor IPs: 185.148.168.15:8080
Source: Malware configuration extractor IPs: 195.77.239.39:8080
Source: Malware configuration extractor IPs: 207.148.81.119:8080
Source: Malware configuration extractor IPs: 85.214.67.203:8080
Source: Malware configuration extractor IPs: 190.90.233.66:443
Source: Malware configuration extractor IPs: 78.46.73.125:443
Source: Malware configuration extractor IPs: 78.47.204.80:443
Source: Malware configuration extractor IPs: 37.59.209.141:8080
Source: Malware configuration extractor IPs: 54.37.228.122:443
Internet Provider seen in connection with other malware
Source: Joe Sandbox View ASN Name: AS-CHOOPAUS AS-CHOOPAUS
Source: Joe Sandbox View ASN Name: DIGITALOCEAN-ASNUS DIGITALOCEAN-ASNUS
IP address seen in connection with other malware
Source: Joe Sandbox View IP Address: 207.148.81.119 207.148.81.119
Source: Joe Sandbox View IP Address: 104.131.62.48 104.131.62.48
Detected TCP or UDP traffic on non-standard ports
Source: global traffic TCP traffic: 192.168.2.3:49755 -> 69.16.218.101:8080
Connects to several IPs in different countries
Source: unknown Network traffic detected: IP country count 11
Source: unknown TCP traffic detected without corresponding DNS query: 45.138.98.34
Source: unknown TCP traffic detected without corresponding DNS query: 45.138.98.34
Source: unknown TCP traffic detected without corresponding DNS query: 45.138.98.34
Source: unknown TCP traffic detected without corresponding DNS query: 69.16.218.101
Source: unknown TCP traffic detected without corresponding DNS query: 69.16.218.101
Source: unknown TCP traffic detected without corresponding DNS query: 69.16.218.101
Source: unknown TCP traffic detected without corresponding DNS query: 69.16.218.101
Source: unknown TCP traffic detected without corresponding DNS query: 69.16.218.101
Source: unknown TCP traffic detected without corresponding DNS query: 69.16.218.101
Source: unknown TCP traffic detected without corresponding DNS query: 69.16.218.101
Source: unknown TCP traffic detected without corresponding DNS query: 69.16.218.101
Source: unknown TCP traffic detected without corresponding DNS query: 69.16.218.101
Source: unknown TCP traffic detected without corresponding DNS query: 69.16.218.101
Source: unknown TCP traffic detected without corresponding DNS query: 69.16.218.101
Source: svchost.exe, 00000016.00000003.381450619.0000027DA5D8F000.00000004.00000001.sdmp String found in binary or memory: Try it free for 30 days, no strings attached\r\n\r\nLike us on Facebook: http://www.facebook.com/spotify \r\nFollow us on Twitter: http://twitter.com/spotify","ProductTitle":"Spotify - Music and Podcasts","SearchTitles":[{"SearchTitleString":"Spotify","SearchTitleType":"SearchHint"},{"SearchTitleString":"Music","SearchTitleType":"SearchHint"},{"SearchTitleString":"music apps","SearchTitleType":"SearchHint"},{"SearchTitleString":"free music","SearchTitleType":"SearchHint"},{"SearchTitleString":"podcasts","SearchTitleType":"SearchHint"},{"SearchTitleString":"streaming","SearchTitleType":"SearchHint"},{"SearchTitleString":"soundcloud","SearchTitleType":"SearchHint"}],"Language":"en-us","Markets":["US","DZ","AR","AU","AT","BH","BD","BE","BR","BG","CA","CL","CN","CO","CR","HR","CY","CZ","DK","EG","EE","FI","FR","DE","GR","GT","HK","HU","IS","IN","ID","IQ","IE","IL","IT","JP","JO","KZ","KE","KW","LV","LB","LI","LT","LU","MY","MT","MR","MX","MA","NL","NZ","NG","NO","OM","PK","PE","PH","PL","PT","QA","RO","RU","SA","RS","SG","SK","SI","ZA","KR","ES","SE","CH","TW","TH","TT","TN","TR","UA","AE","GB","VN","YE","LY","LK","UY","VE","AF","AX","AL","AS","AO","AI","AQ","AG","AM","AW","BO","BQ","BA","BW","BV","IO","BN","BF","BI","KH","CM","CV","KY","CF","TD","TL","DJ","DM","DO","EC","SV","GQ","ER","ET","FK","FO","FJ","GF","PF","TF","GA","GM","GE","GH","GI","GL","GD","GP","GU","GG","GN","GW","GY","HT","HM","HN","AZ","BS","BB","BY","BZ","BJ","BM","BT","KM","CG","CD","CK","CX","CC","CI","CW","JM","SJ","JE","KI","KG","LA","LS","LR","MO","MK","MG","MW","IM","MH","MQ","MU","YT","FM","MD","MN","MS","MZ","MM","NA","NR","NP","MV","ML","NC","NI","NE","NU","NF","PW","PS","PA","PG","PY","RE","RW","BL","MF","WS","ST","SN","MP","PN","SX","SB","SO","SC","SL","GS","SH","KN","LC","PM","VC","TJ","TZ","TG","TK","TO","TM","TC","TV","UM","UG","VI","VG","WF","EH","ZM","ZW","UZ","VU","SR","SZ","AD","MC","SM","ME","VA","NEUTRAL"]}],"MarketProperties":[{"RelatedProducts":[],"Markets":["US"]}],"ProductASchema":"Product;3","ProductBSchema":"ProductUnifiedApp;3","ProductId":"9NCBCSZSJRSB","Properties":{"PackageFamilyName":"SpotifyAB.SpotifyMusic_zpdnekdrzrea0","PackageIdentityName":"SpotifyAB.SpotifyMusic","PublisherCertificateName":"CN=453637B3-4E12-4CDF-B0D3-2A3C863BF6EF","XboxCrossGenSetId":null,"XboxConsoleGenOptimized":null,"XboxConsoleGenCompatible":null},"AlternateIds":[{"IdType":"LegacyWindowsStoreProductId","Value":"ceac5d3f-8a4f-40e1-9a67-76d9108c7cb5"},{"IdType":"LegacyWindowsPhoneProductId","Value":"caac1b9d-621b-4f96-b143-e10e1397740a"},{"IdType":"XboxTitleId","Value":"1681279293"}],"IngestionSource":"DCE","IsMicrosoftProduct":false,"PreferredSkuId":"0010","ProductType":"Application","ValidationData":{"PassedValidation":false,"RevisionId":"2022-01-07T11:33:20.1626869Z||.||d5cdcec3-04df-404e-ba07-3240047c89f9||1152921505694348672||Null||fullrelease","ValidationResultUri":""},"MerchandizingTags":[],"PartD":"","ProductFamily":"Apps","ProductKind":"Application","DisplaySkuAvailab
Source: svchost.exe, 00000016.00000003.381450619.0000027DA5D8F000.00000004.00000001.sdmp String found in binary or memory: Try it free for 30 days, no strings attached\r\n\r\nLike us on Facebook: http://www.facebook.com/spotify \r\nFollow us on Twitter: http://twitter.com/spotify","ProductTitle":"Spotify - Music and Podcasts","SearchTitles":[{"SearchTitleString":"Spotify","SearchTitleType":"SearchHint"},{"SearchTitleString":"Music","SearchTitleType":"SearchHint"},{"SearchTitleString":"music apps","SearchTitleType":"SearchHint"},{"SearchTitleString":"free music","SearchTitleType":"SearchHint"},{"SearchTitleString":"podcasts","SearchTitleType":"SearchHint"},{"SearchTitleString":"streaming","SearchTitleType":"SearchHint"},{"SearchTitleString":"soundcloud","SearchTitleType":"SearchHint"}],"Language":"en-us","Markets":["US","DZ","AR","AU","AT","BH","BD","BE","BR","BG","CA","CL","CN","CO","CR","HR","CY","CZ","DK","EG","EE","FI","FR","DE","GR","GT","HK","HU","IS","IN","ID","IQ","IE","IL","IT","JP","JO","KZ","KE","KW","LV","LB","LI","LT","LU","MY","MT","MR","MX","MA","NL","NZ","NG","NO","OM","PK","PE","PH","PL","PT","QA","RO","RU","SA","RS","SG","SK","SI","ZA","KR","ES","SE","CH","TW","TH","TT","TN","TR","UA","AE","GB","VN","YE","LY","LK","UY","VE","AF","AX","AL","AS","AO","AI","AQ","AG","AM","AW","BO","BQ","BA","BW","BV","IO","BN","BF","BI","KH","CM","CV","KY","CF","TD","TL","DJ","DM","DO","EC","SV","GQ","ER","ET","FK","FO","FJ","GF","PF","TF","GA","GM","GE","GH","GI","GL","GD","GP","GU","GG","GN","GW","GY","HT","HM","HN","AZ","BS","BB","BY","BZ","BJ","BM","BT","KM","CG","CD","CK","CX","CC","CI","CW","JM","SJ","JE","KI","KG","LA","LS","LR","MO","MK","MG","MW","IM","MH","MQ","MU","YT","FM","MD","MN","MS","MZ","MM","NA","NR","NP","MV","ML","NC","NI","NE","NU","NF","PW","PS","PA","PG","PY","RE","RW","BL","MF","WS","ST","SN","MP","PN","SX","SB","SO","SC","SL","GS","SH","KN","LC","PM","VC","TJ","TZ","TG","TK","TO","TM","TC","TV","UM","UG","VI","VG","WF","EH","ZM","ZW","UZ","VU","SR","SZ","AD","MC","SM","ME","VA","NEUTRAL"]}],"MarketProperties":[{"RelatedProducts":[],"Markets":["US"]}],"ProductASchema":"Product;3","ProductBSchema":"ProductUnifiedApp;3","ProductId":"9NCBCSZSJRSB","Properties":{"PackageFamilyName":"SpotifyAB.SpotifyMusic_zpdnekdrzrea0","PackageIdentityName":"SpotifyAB.SpotifyMusic","PublisherCertificateName":"CN=453637B3-4E12-4CDF-B0D3-2A3C863BF6EF","XboxCrossGenSetId":null,"XboxConsoleGenOptimized":null,"XboxConsoleGenCompatible":null},"AlternateIds":[{"IdType":"LegacyWindowsStoreProductId","Value":"ceac5d3f-8a4f-40e1-9a67-76d9108c7cb5"},{"IdType":"LegacyWindowsPhoneProductId","Value":"caac1b9d-621b-4f96-b143-e10e1397740a"},{"IdType":"XboxTitleId","Value":"1681279293"}],"IngestionSource":"DCE","IsMicrosoftProduct":false,"PreferredSkuId":"0010","ProductType":"Application","ValidationData":{"PassedValidation":false,"RevisionId":"2022-01-07T11:33:20.1626869Z||.||d5cdcec3-04df-404e-ba07-3240047c89f9||1152921505694348672||Null||fullrelease","ValidationResultUri":""},"MerchandizingTags":[],"PartD":"","ProductFamily":"Apps","ProductKind":"Application","DisplaySkuAvailab
Source: svchost.exe, 00000016.00000003.381450619.0000027DA5D8F000.00000004.00000001.sdmp String found in binary or memory: Try it free for 30 days, no strings attached\r\n\r\nLike us on Facebook: http://www.facebook.com/spotify \r\nFollow us on Twitter: http://twitter.com/spotify","SkuTitle":"Spotify - Music and Podcasts","Language":"en-us","Markets":["US","DZ","AR","AU","AT","BH","BD","BE","BR","BG","CA","CL","CN","CO","CR","HR","CY","CZ","DK","EG","EE","FI","FR","DE","GR","GT","HK","HU","IS","IN","ID","IQ","IE","IL","IT","JP","JO","KZ","KE","KW","LV","LB","LI","LT","LU","MY","MT","MR","MX","MA","NL","NZ","NG","NO","OM","PK","PE","PH","PL","PT","QA","RO","RU","SA","RS","SG","SK","SI","ZA","KR","ES","SE","CH","TW","TH","TT","TN","TR","UA","AE","GB","VN","YE","LY","LK","UY","VE","AF","AX","AL","AS","AO","AI","AQ","AG","AM","AW","BO","BQ","BA","BW","BV","IO","BN","BF","BI","KH","CM","CV","KY","CF","TD","TL","DJ","DM","DO","EC","SV","GQ","ER","ET","FK","FO","FJ","GF","PF","TF","GA","GM","GE","GH","GI","GL","GD","GP","GU","GG","GN","GW","GY","HT","HM","HN","A equals www.facebook.com (Facebook)
Source: svchost.exe, 00000016.00000003.381450619.0000027DA5D8F000.00000004.00000001.sdmp String found in binary or memory: Try it free for 30 days, no strings attached\r\n\r\nLike us on Facebook: http://www.facebook.com/spotify \r\nFollow us on Twitter: http://twitter.com/spotify","SkuTitle":"Spotify - Music and Podcasts","Language":"en-us","Markets":["US","DZ","AR","AU","AT","BH","BD","BE","BR","BG","CA","CL","CN","CO","CR","HR","CY","CZ","DK","EG","EE","FI","FR","DE","GR","GT","HK","HU","IS","IN","ID","IQ","IE","IL","IT","JP","JO","KZ","KE","KW","LV","LB","LI","LT","LU","MY","MT","MR","MX","MA","NL","NZ","NG","NO","OM","PK","PE","PH","PL","PT","QA","RO","RU","SA","RS","SG","SK","SI","ZA","KR","ES","SE","CH","TW","TH","TT","TN","TR","UA","AE","GB","VN","YE","LY","LK","UY","VE","AF","AX","AL","AS","AO","AI","AQ","AG","AM","AW","BO","BQ","BA","BW","BV","IO","BN","BF","BI","KH","CM","CV","KY","CF","TD","TL","DJ","DM","DO","EC","SV","GQ","ER","ET","FK","FO","FJ","GF","PF","TF","GA","GM","GE","GH","GI","GL","GD","GP","GU","GG","GN","GW","GY","HT","HM","HN","A equals www.twitter.com (Twitter)
Source: svchost.exe, 00000016.00000002.396724462.0000027DA54DF000.00000004.00000001.sdmp String found in binary or memory: http://crl.globalsign.net/root-r2.crl0
Source: svchost.exe, 00000016.00000002.396724462.0000027DA54DF000.00000004.00000001.sdmp String found in binary or memory: http://crl.ver)
Source: rundll32.exe, 0000000B.00000003.306252225.0000000004E29000.00000004.00000001.sdmp, rundll32.exe, 0000000B.00000003.305533400.0000000004E2B000.00000004.00000001.sdmp String found in binary or memory: http://ctldl.windowsupdate.com/
Source: 77EC63BDA74BD0D0E0426DC8F80085060.11.dr String found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
Source: rundll32.exe, 0000000B.00000003.305533400.0000000004E2B000.00000004.00000001.sdmp String found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab?229413c4f0e8e
Source: svchost.exe, 00000016.00000003.374720135.0000027DA5D83000.00000004.00000001.sdmp String found in binary or memory: http://help.disneyplus.com.
Source: svchost.exe, 0000000E.00000002.306871378.000002C222813000.00000004.00000001.sdmp String found in binary or memory: http://www.bingmapsportal.com
Source: svchost.exe, 0000000C.00000002.797778939.00000236A2244000.00000004.00000001.sdmp String found in binary or memory: https://%s.dnet.xboxlive.com
Source: svchost.exe, 0000000C.00000002.797778939.00000236A2244000.00000004.00000001.sdmp String found in binary or memory: https://%s.xboxlive.com
Source: svchost.exe, 0000000C.00000002.797778939.00000236A2244000.00000004.00000001.sdmp String found in binary or memory: https://activity.windows.com
Source: svchost.exe, 0000000C.00000002.797778939.00000236A2244000.00000004.00000001.sdmp String found in binary or memory: https://activity.windows.comds
Source: svchost.exe, 0000000E.00000003.306604803.000002C222861000.00000004.00000001.sdmp String found in binary or memory: https://appexmapsappupdate.blob.core.windows.net
Source: svchost.exe, 0000000C.00000002.797655896.00000236A2229000.00000004.00000001.sdmp String found in binary or memory: https://bn2.notify.windows.com/v2/register/xplatform/device
Source: svchost.exe, 0000000C.00000002.797655896.00000236A2229000.00000004.00000001.sdmp String found in binary or memory: https://co4-df.notify.windows.com/v2/register/xplatform/device
Source: svchost.exe, 0000000E.00000003.306630686.000002C222849000.00000004.00000001.sdmp String found in binary or memory: https://dev.ditu.live.com/REST/v1/Imagery/Copyright/
Source: svchost.exe, 0000000E.00000002.306926105.000002C22285C000.00000004.00000001.sdmp String found in binary or memory: https://dev.ditu.live.com/REST/v1/JsonFilter/VenueMaps/data/
Source: svchost.exe, 0000000E.00000003.306604803.000002C222861000.00000004.00000001.sdmp String found in binary or memory: https://dev.ditu.live.com/REST/v1/Locations
Source: svchost.exe, 0000000E.00000002.306901569.000002C22283D000.00000004.00000001.sdmp String found in binary or memory: https://dev.ditu.live.com/REST/v1/Routes/
Source: svchost.exe, 0000000E.00000002.306926105.000002C22285C000.00000004.00000001.sdmp String found in binary or memory: https://dev.ditu.live.com/REST/v1/Traffic/Incidents/
Source: svchost.exe, 0000000E.00000002.306941965.000002C22286A000.00000004.00000001.sdmp, svchost.exe, 0000000E.00000003.306586825.000002C222868000.00000004.00000001.sdmp String found in binary or memory: https://dev.ditu.live.com/REST/v1/Transit/Stops/
Source: svchost.exe, 0000000E.00000003.306604803.000002C222861000.00000004.00000001.sdmp String found in binary or memory: https://dev.ditu.live.com/mapcontrol/logging.ashx
Source: svchost.exe, 0000000E.00000002.306918594.000002C222852000.00000004.00000001.sdmp, svchost.exe, 0000000E.00000003.306615683.000002C22284C000.00000004.00000001.sdmp String found in binary or memory: https://dev.ditu.live.com/mapcontrol/mapconfiguration.ashx?name=native&v=
Source: svchost.exe, 0000000E.00000002.306926105.000002C22285C000.00000004.00000001.sdmp String found in binary or memory: https://dev.virtualearth.net/REST/v1/JsonFilter/VenueMaps/data/
Source: svchost.exe, 0000000E.00000003.306604803.000002C222861000.00000004.00000001.sdmp String found in binary or memory: https://dev.virtualearth.net/REST/v1/Locations
Source: svchost.exe, 0000000E.00000002.306901569.000002C22283D000.00000004.00000001.sdmp String found in binary or memory: https://dev.virtualearth.net/REST/v1/Routes/
Source: svchost.exe, 0000000E.00000003.306604803.000002C222861000.00000004.00000001.sdmp String found in binary or memory: https://dev.virtualearth.net/REST/v1/Routes/Driving
Source: svchost.exe, 0000000E.00000003.306604803.000002C222861000.00000004.00000001.sdmp String found in binary or memory: https://dev.virtualearth.net/REST/v1/Routes/Transit
Source: svchost.exe, 0000000E.00000003.306604803.000002C222861000.00000004.00000001.sdmp String found in binary or memory: https://dev.virtualearth.net/REST/v1/Routes/Walking
Source: svchost.exe, 0000000E.00000003.306646043.000002C222840000.00000004.00000001.sdmp, svchost.exe, 0000000E.00000003.306662365.000002C222841000.00000004.00000001.sdmp, svchost.exe, 0000000E.00000002.306907020.000002C222842000.00000004.00000001.sdmp String found in binary or memory: https://dev.virtualearth.net/REST/v1/Transit/Schedules/
Source: svchost.exe, 0000000E.00000003.306646043.000002C222840000.00000004.00000001.sdmp, svchost.exe, 0000000E.00000003.306662365.000002C222841000.00000004.00000001.sdmp, svchost.exe, 0000000E.00000002.306907020.000002C222842000.00000004.00000001.sdmp String found in binary or memory: https://dev.virtualearth.net/mapcontrol/HumanScaleServices/GetBubbles.ashx?n=
Source: svchost.exe, 0000000E.00000003.306604803.000002C222861000.00000004.00000001.sdmp String found in binary or memory: https://dev.virtualearth.net/mapcontrol/logging.ashx
Source: svchost.exe, 0000000E.00000002.306926105.000002C22285C000.00000004.00000001.sdmp, svchost.exe, 0000000E.00000003.306646043.000002C222840000.00000004.00000001.sdmp String found in binary or memory: https://dev.virtualearth.net/webservices/v1/LoggingService/LoggingService.svc/Log?
Source: svchost.exe, 00000016.00000003.374720135.0000027DA5D83000.00000004.00000001.sdmp String found in binary or memory: https://disneyplus.com/legal.
Source: svchost.exe, 0000000E.00000003.306630686.000002C222849000.00000004.00000001.sdmp String found in binary or memory: https://dynamic.api.tiles.ditu.live.com/odvs/gd?pv=1&r=
Source: svchost.exe, 0000000E.00000002.306926105.000002C22285C000.00000004.00000001.sdmp String found in binary or memory: https://dynamic.api.tiles.ditu.live.com/odvs/gdi?pv=1&r=
Source: svchost.exe, 0000000E.00000002.306926105.000002C22285C000.00000004.00000001.sdmp String found in binary or memory: https://dynamic.api.tiles.ditu.live.com/odvs/gdv?pv=1&r=
Source: svchost.exe, 0000000E.00000002.306936386.000002C222865000.00000004.00000001.sdmp String found in binary or memory: https://dynamic.t
Source: svchost.exe, 0000000E.00000003.306604803.000002C222861000.00000004.00000001.sdmp String found in binary or memory: https://dynamic.t0.tiles.ditu.live.com/comp/gen.ashx
Source: svchost.exe, 0000000E.00000002.306901569.000002C22283D000.00000004.00000001.sdmp String found in binary or memory: https://ecn.dev.virtualearth.net/REST/v1/Imagery/Copyright/
Source: svchost.exe, 0000000E.00000003.285016328.000002C222831000.00000004.00000001.sdmp String found in binary or memory: https://ecn.dev.virtualearth.net/mapcontrol/mapconfiguration.ashx?name=native&v=
Source: svchost.exe, 0000000E.00000002.306901569.000002C22283D000.00000004.00000001.sdmp String found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/comp/gen.ashx
Source: svchost.exe, 0000000E.00000002.306901569.000002C22283D000.00000004.00000001.sdmp, svchost.exe, 0000000E.00000002.306871378.000002C222813000.00000004.00000001.sdmp String found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gd?pv=1&r=
Source: svchost.exe, 0000000E.00000003.285016328.000002C222831000.00000004.00000001.sdmp String found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdi?pv=1&r=
Source: svchost.exe, 0000000E.00000003.306657472.000002C222845000.00000004.00000001.sdmp, svchost.exe, 0000000E.00000003.306646043.000002C222840000.00000004.00000001.sdmp String found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdv?pv=1&r=
Source: svchost.exe, 0000000E.00000003.285016328.000002C222831000.00000004.00000001.sdmp String found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gri?pv=1&r=
Source: svchost.exe, 0000000E.00000003.285016328.000002C222831000.00000004.00000001.sdmp, svchost.exe, 0000000E.00000002.306896021.000002C22283A000.00000004.00000001.sdmp String found in binary or memory: https://t0.ssl.ak.tiles.virtualearth.net/tiles/gen
Source: svchost.exe, 0000000E.00000002.306918594.000002C222852000.00000004.00000001.sdmp, svchost.exe, 0000000E.00000003.306615683.000002C22284C000.00000004.00000001.sdmp String found in binary or memory: https://t0.tiles.ditu.live.com/tiles/gen
Source: svchost.exe, 00000016.00000003.374720135.0000027DA5D83000.00000004.00000001.sdmp String found in binary or memory: https://www.disneyplus.com/legal/privacy-policy
Source: svchost.exe, 00000016.00000003.374720135.0000027DA5D83000.00000004.00000001.sdmp String found in binary or memory: https://www.disneyplus.com/legal/your-california-privacy-rights
Source: svchost.exe, 00000016.00000003.376301343.0000027DA5D87000.00000004.00000001.sdmp, svchost.exe, 00000016.00000003.376387097.0000027DA5DB9000.00000004.00000001.sdmp, svchost.exe, 00000016.00000003.376415282.0000027DA6202000.00000004.00000001.sdmp, svchost.exe, 00000016.00000003.376344235.0000027DA5DD0000.00000004.00000001.sdmp, svchost.exe, 00000016.00000003.376326447.0000027DA5D98000.00000004.00000001.sdmp String found in binary or memory: https://www.tiktok.com/legal/report/feedback
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 4_2_100012D0 recvfrom, 4_2_100012D0

Key, Mouse, Clipboard, Microphone and Screen Capturing:

barindex
Creates a DirectInput object (often for capturing keystrokes)
Source: loaddll32.exe, 00000001.00000002.277854316.000000000088B000.00000004.00000020.sdmp Binary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>
Potential key logger detected (key state polling based)
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 4_2_1000FF59 GetKeyState,GetKeyState,GetKeyState,GetKeyState,SendMessageA, 4_2_1000FF59
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_1000FF59 GetKeyState,GetKeyState,GetKeyState,GetKeyState,SendMessageA, 5_2_1000FF59

E-Banking Fraud:

barindex
Yara detected Emotet
Source: Yara match File source: 11.2.rundll32.exe.48e0000.6.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 11.2.rundll32.exe.550000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 11.2.rundll32.exe.4c90000.14.unpack, type: UNPACKEDPE
Source: Yara match File source: 11.2.rundll32.exe.760000.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 4.2.regsvr32.exe.c30000.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 9.2.rundll32.exe.2f80000.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 11.2.rundll32.exe.c40000.3.unpack, type: UNPACKEDPE
Source: Yara match File source: 7.2.rundll32.exe.5190000.6.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 11.2.rundll32.exe.48e0000.6.unpack, type: UNPACKEDPE
Source: Yara match File source: 11.2.rundll32.exe.4800000.4.unpack, type: UNPACKEDPE
Source: Yara match File source: 11.2.rundll32.exe.4c90000.14.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 7.2.rundll32.exe.5030000.4.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 9.2.rundll32.exe.4dc0000.2.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 9.2.rundll32.exe.2f50000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.4eb0000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 7.2.rundll32.exe.4f50000.2.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 11.2.rundll32.exe.4da0000.17.unpack, type: UNPACKEDPE
Source: Yara match File source: 7.2.rundll32.exe.4f80000.3.unpack, type: UNPACKEDPE
Source: Yara match File source: 7.2.rundll32.exe.51c0000.7.unpack, type: UNPACKEDPE
Source: Yara match File source: 11.2.rundll32.exe.7e0000.2.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 11.2.rundll32.exe.4830000.5.unpack, type: UNPACKEDPE
Source: Yara match File source: 7.2.rundll32.exe.5060000.5.unpack, type: UNPACKEDPE
Source: Yara match File source: 11.2.rundll32.exe.4a40000.8.unpack, type: UNPACKEDPE
Source: Yara match File source: 7.2.rundll32.exe.4910000.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 7.2.rundll32.exe.48e0000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 11.2.rundll32.exe.5020000.21.unpack, type: UNPACKEDPE
Source: Yara match File source: 11.2.rundll32.exe.4aa0000.10.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 9.2.rundll32.exe.4dc0000.2.unpack, type: UNPACKEDPE
Source: Yara match File source: 11.2.rundll32.exe.4b80000.12.unpack, type: UNPACKEDPE
Source: Yara match File source: 5.2.rundll32.exe.4d80000.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 4.2.regsvr32.exe.7b0000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 7.2.rundll32.exe.5380000.11.unpack, type: UNPACKEDPE
Source: Yara match File source: 4.2.regsvr32.exe.7b0000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 7.2.rundll32.exe.5220000.9.unpack, type: UNPACKEDPE
Source: Yara match File source: 11.2.rundll32.exe.4800000.4.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 9.2.rundll32.exe.4f30000.5.unpack, type: UNPACKEDPE
Source: Yara match File source: 9.2.rundll32.exe.4f60000.6.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 11.2.rundll32.exe.4aa0000.10.unpack, type: UNPACKEDPE
Source: Yara match File source: 7.2.rundll32.exe.5350000.10.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 11.2.rundll32.exe.7e0000.2.unpack, type: UNPACKEDPE
Source: Yara match File source: 11.2.rundll32.exe.550000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 11.2.rundll32.exe.4d70000.16.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 9.2.rundll32.exe.2f50000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.4eb0000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 11.2.rundll32.exe.4f70000.18.unpack, type: UNPACKEDPE
Source: Yara match File source: 11.2.rundll32.exe.4910000.7.unpack, type: UNPACKEDPE
Source: Yara match File source: 11.2.rundll32.exe.4b80000.12.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 9.2.rundll32.exe.4f60000.6.unpack, type: UNPACKEDPE
Source: Yara match File source: 9.2.rundll32.exe.4df0000.3.unpack, type: UNPACKEDPE
Source: Yara match File source: 7.2.rundll32.exe.4f50000.2.unpack, type: UNPACKEDPE
Source: Yara match File source: 11.2.rundll32.exe.4bb0000.13.unpack, type: UNPACKEDPE
Source: Yara match File source: 11.2.rundll32.exe.4ff0000.20.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 9.2.rundll32.exe.4f00000.4.unpack, type: UNPACKEDPE
Source: Yara match File source: 7.2.rundll32.exe.48e0000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 11.2.rundll32.exe.4ff0000.20.unpack, type: UNPACKEDPE
Source: Yara match File source: 11.2.rundll32.exe.4ad0000.11.unpack, type: UNPACKEDPE
Source: Yara match File source: 11.2.rundll32.exe.4cc0000.15.unpack, type: UNPACKEDPE
Source: Yara match File source: 11.2.rundll32.exe.4f70000.18.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 9.2.rundll32.exe.4f00000.4.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 7.2.rundll32.exe.51f0000.8.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 11.2.rundll32.exe.4fa0000.19.unpack, type: UNPACKEDPE
Source: Yara match File source: 11.2.rundll32.exe.4a70000.9.unpack, type: UNPACKEDPE
Source: Yara match File source: 5.2.rundll32.exe.4d50000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 7.2.rundll32.exe.5350000.10.unpack, type: UNPACKEDPE
Source: Yara match File source: 7.2.rundll32.exe.51f0000.8.unpack, type: UNPACKEDPE
Source: Yara match File source: 5.2.rundll32.exe.4d50000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 7.2.rundll32.exe.5030000.4.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.4fe0000.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 11.2.rundll32.exe.4a40000.8.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 11.2.rundll32.exe.4d70000.16.unpack, type: UNPACKEDPE
Source: Yara match File source: 7.2.rundll32.exe.5190000.6.unpack, type: UNPACKEDPE
Source: Yara match File source: 9.2.rundll32.exe.4f90000.7.unpack, type: UNPACKEDPE
Source: Yara match File source: 00000009.00000002.277730599.0000000004F91000.00000020.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000009.00000002.277713416.0000000004F60000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000009.00000002.277639007.0000000004DF1000.00000020.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000B.00000002.795927232.0000000000761000.00000020.00000010.sdmp, type: MEMORY
Source: Yara match File source: 0000000B.00000002.799414733.0000000004CC1000.00000020.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000B.00000002.799045913.0000000004911000.00000020.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000B.00000002.799697917.0000000004FA1000.00000020.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000007.00000002.279150423.00000000048E0000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000007.00000002.280282313.0000000005221000.00000020.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000007.00000002.280168007.00000000051F0000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000007.00000002.279548390.0000000004F50000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000B.00000002.799538032.0000000004DA1000.00000020.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000005.00000002.276563054.0000000004D81000.00000020.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000007.00000002.279789960.0000000005061000.00000020.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000009.00000002.277622976.0000000004DC0000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000007.00000002.280097781.00000000051C1000.00000020.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000B.00000002.799779111.0000000005021000.00000020.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000B.00000002.799658123.0000000004F70000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000004.00000002.273165607.00000000007B0000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000B.00000002.796004659.00000000007E0000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000B.00000002.798904750.0000000004800000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000B.00000002.799492765.0000000004D70000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.281478633.0000000004FE1000.00000020.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000004.00000002.273217579.0000000000C31000.00000020.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000B.00000002.796123742.0000000000C41000.00000020.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000B.00000002.799740487.0000000004FF0000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000B.00000002.798938392.0000000004831000.00000020.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000007.00000002.280709528.0000000005381000.00000020.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000B.00000002.799314316.0000000004BB1000.00000020.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000B.00000002.795619050.0000000000550000.00000040.00000010.sdmp, type: MEMORY
Source: Yara match File source: 00000005.00000002.276500628.0000000004D50000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000007.00000002.279944266.0000000005190000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000B.00000002.799278109.0000000004B80000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000B.00000002.799381749.0000000004C90000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000009.00000002.277677330.0000000004F00000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000B.00000002.799147765.0000000004A71000.00000020.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000009.00000002.277427449.0000000002F50000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000B.00000002.799215149.0000000004AD1000.00000020.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000007.00000002.279196865.0000000004911000.00000020.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000B.00000002.799109356.0000000004A40000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.281423189.0000000004EB0000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000B.00000002.799182038.0000000004AA0000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000007.00000002.279715977.0000000005030000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000007.00000002.279591942.0000000004F81000.00000020.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000B.00000002.799004905.00000000048E0000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000007.00000002.280437976.0000000005350000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000009.00000002.277695700.0000000004F31000.00000020.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000009.00000002.277447134.0000000002F81000.00000020.00000001.sdmp, type: MEMORY

System Summary:

barindex
Uses 32bit PE files
Source: gyZm68Cgwf.dll Static PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE, DLL
Deletes files inside the Windows folder
Source: C:\Windows\SysWOW64\rundll32.exe File deleted: C:\Windows\SysWOW64\Eehwmcxbz\pepkl.dhq:Zone.Identifier Jump to behavior
Creates files inside the system directory
Source: C:\Windows\SysWOW64\rundll32.exe File created: C:\Windows\SysWOW64\Eehwmcxbz\ Jump to behavior
Detected potential crypto function
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 4_2_10020011 4_2_10020011
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 4_2_100181CA 4_2_100181CA
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 4_2_1001929D 4_2_1001929D
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 4_2_1002542D 4_2_1002542D
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 4_2_100274AE 4_2_100274AE
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 4_2_10026575 4_2_10026575
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 4_2_1001869D 4_2_1001869D
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 4_2_1001178A 4_2_1001178A
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 4_2_10016860 4_2_10016860
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 4_2_1002596F 4_2_1002596F
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 4_2_10022A5C 4_2_10022A5C
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 4_2_10018A71 4_2_10018A71
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 4_2_1001AAB7 4_2_1001AAB7
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 4_2_1001CB16 4_2_1001CB16
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 4_2_10018E7D 4_2_10018E7D
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 4_2_10025EB1 4_2_10025EB1
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 4_2_00C485FF 4_2_00C485FF
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 4_2_00C4EFDD 4_2_00C4EFDD
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 4_2_00C380C0 4_2_00C380C0
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 4_2_00C4D8DB 4_2_00C4D8DB
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 4_2_00C3F0E9 4_2_00C3F0E9
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 4_2_00C500EF 4_2_00C500EF
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 4_2_00C4F840 4_2_00C4F840
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 4_2_00C3A871 4_2_00C3A871
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 4_2_00C37078 4_2_00C37078
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 4_2_00C48806 4_2_00C48806
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 4_2_00C52009 4_2_00C52009
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 4_2_00C3B820 4_2_00C3B820
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 4_2_00C4E1F8 4_2_00C4E1F8
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 4_2_00C46187 4_2_00C46187
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 4_2_00C32194 4_2_00C32194
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 4_2_00C4D1BC 4_2_00C4D1BC
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 4_2_00C42142 4_2_00C42142
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 4_2_00C3D14C 4_2_00C3D14C
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 4_2_00C4E955 4_2_00C4E955
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 4_2_00C4017B 4_2_00C4017B
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 4_2_00C4CAD5 4_2_00C4CAD5
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 4_2_00C4A2A5 4_2_00C4A2A5
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 4_2_00C3BAA9 4_2_00C3BAA9
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 4_2_00C40ABA 4_2_00C40ABA
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 4_2_00C44244 4_2_00C44244
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 4_2_00C4B257 4_2_00C4B257
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 4_2_00C50A64 4_2_00C50A64
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 4_2_00C44A66 4_2_00C44A66
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 4_2_00C53263 4_2_00C53263
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 4_2_00C49A01 4_2_00C49A01
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 4_2_00C47A0F 4_2_00C47A0F
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 4_2_00C34BFC 4_2_00C34BFC
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 4_2_00C3FB8E 4_2_00C3FB8E
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 4_2_00C3238C 4_2_00C3238C
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 4_2_00C3F369 4_2_00C3F369
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 4_2_00C36B7A 4_2_00C36B7A
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 4_2_00C52B09 4_2_00C52B09
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 4_2_00C45333 4_2_00C45333
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 4_2_00C4CCD9 4_2_00C4CCD9
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 4_2_00C4E4E5 4_2_00C4E4E5
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 4_2_00C31CA1 4_2_00C31CA1
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 4_2_00C37442 4_2_00C37442
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 4_2_00C3A445 4_2_00C3A445
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 4_2_00C4A474 4_2_00C4A474
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 4_2_00C4DC71 4_2_00C4DC71
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 4_2_00C33431 4_2_00C33431
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 4_2_00C4C5D5 4_2_00C4C5D5
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 4_2_00C3C5D8 4_2_00C3C5D8
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 4_2_00C49DF5 4_2_00C49DF5
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 4_2_00C355FF 4_2_00C355FF
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 4_2_00C43D85 4_2_00C43D85
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 4_2_00C4654A 4_2_00C4654A
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 4_2_00C52D53 4_2_00C52D53
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 4_2_00C47D5B 4_2_00C47D5B
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 4_2_00C4AD08 4_2_00C4AD08
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 4_2_00C45515 4_2_00C45515
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 4_2_00C48D3D 4_2_00C48D3D
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 4_2_00C53EE9 4_2_00C53EE9
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 4_2_00C4BEFD 4_2_00C4BEFD
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 4_2_00C43EAA 4_2_00C43EAA
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 4_2_00C536AA 4_2_00C536AA
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 4_2_00C40EBC 4_2_00C40EBC
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 4_2_00C546BD 4_2_00C546BD
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 4_2_00C3C6B8 4_2_00C3C6B8
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 4_2_00C3E640 4_2_00C3E640
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 4_2_00C42E5D 4_2_00C42E5D
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 4_2_00C3DE74 4_2_00C3DE74
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 4_2_00C37E79 4_2_00C37E79
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 4_2_00C4567B 4_2_00C4567B
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 4_2_00C38636 4_2_00C38636
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 4_2_00C3E7DE 4_2_00C3E7DE
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 4_2_00C467E6 4_2_00C467E6
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 4_2_00C40F86 4_2_00C40F86
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 4_2_00C377A3 4_2_00C377A3
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 4_2_00C48FAE 4_2_00C48FAE
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 4_2_00C507AA 4_2_00C507AA
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 4_2_00C517BD 4_2_00C517BD
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 4_2_00C357B8 4_2_00C357B8
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 4_2_00C3BFBE 4_2_00C3BFBE
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 4_2_00C4FF58 4_2_00C4FF58
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 4_2_00C44F74 4_2_00C44F74
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 4_2_00C49774 4_2_00C49774
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 4_2_00C45779 4_2_00C45779
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 4_2_00C3670B 4_2_00C3670B
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 4_2_00C3EF0C 4_2_00C3EF0C
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 4_2_00C31F38 4_2_00C31F38
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_10020011 5_2_10020011
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_100181CA 5_2_100181CA
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_1001929D 5_2_1001929D
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_1002542D 5_2_1002542D
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_100274AE 5_2_100274AE
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_10026575 5_2_10026575
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_1001869D 5_2_1001869D
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_1001178A 5_2_1001178A
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_10016860 5_2_10016860
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_1002596F 5_2_1002596F
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_10022A5C 5_2_10022A5C
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_10018A71 5_2_10018A71
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_1001AAB7 5_2_1001AAB7
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_1001CB16 5_2_1001CB16
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_10018E7D 5_2_10018E7D
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_10025EB1 5_2_10025EB1
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_04D985FF 5_2_04D985FF
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_04D9EFDD 5_2_04D9EFDD
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_04D9CCD9 5_2_04D9CCD9
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_04D9E4E5 5_2_04D9E4E5
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_04D81CA1 5_2_04D81CA1
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_04D87442 5_2_04D87442
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_04D8A445 5_2_04D8A445
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_04D9DC71 5_2_04D9DC71
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_04D9A474 5_2_04D9A474
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_04D83431 5_2_04D83431
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_04D8C5D8 5_2_04D8C5D8
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_04D9C5D5 5_2_04D9C5D5
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_04D855FF 5_2_04D855FF
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_04D99DF5 5_2_04D99DF5
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_04D93D85 5_2_04D93D85
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_04D97D5B 5_2_04D97D5B
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_04DA2D53 5_2_04DA2D53
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_04D9654A 5_2_04D9654A
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_04D95515 5_2_04D95515
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_04D9AD08 5_2_04D9AD08
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_04D98D3D 5_2_04D98D3D
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_04D9BEFD 5_2_04D9BEFD
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_04DA3EE9 5_2_04DA3EE9
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_04D8C6B8 5_2_04D8C6B8
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_04D90EBC 5_2_04D90EBC
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_04DA46BD 5_2_04DA46BD
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_04DA36AA 5_2_04DA36AA
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_04D93EAA 5_2_04D93EAA
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_04D92E5D 5_2_04D92E5D
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_04D8E640 5_2_04D8E640
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_04D87E79 5_2_04D87E79
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_04D9567B 5_2_04D9567B
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_04D8DE74 5_2_04D8DE74
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_04D88636 5_2_04D88636
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_04D8E7DE 5_2_04D8E7DE
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_04D967E6 5_2_04D967E6
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_04D90F86 5_2_04D90F86
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_04D857B8 5_2_04D857B8
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_04D8BFBE 5_2_04D8BFBE
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_04DA17BD 5_2_04DA17BD
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_04DA07AA 5_2_04DA07AA
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_04D98FAE 5_2_04D98FAE
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_04D877A3 5_2_04D877A3
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_04D9FF58 5_2_04D9FF58
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_04D95779 5_2_04D95779
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_04D94F74 5_2_04D94F74
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_04D99774 5_2_04D99774
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_04D8670B 5_2_04D8670B
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_04D8EF0C 5_2_04D8EF0C
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_04D81F38 5_2_04D81F38
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_04D9D8DB 5_2_04D9D8DB
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_04D880C0 5_2_04D880C0
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_04D8F0E9 5_2_04D8F0E9
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_04DA00EF 5_2_04DA00EF
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_04D9F840 5_2_04D9F840
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_04D87078 5_2_04D87078
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_04D8A871 5_2_04D8A871
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_04DA2009 5_2_04DA2009
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_04D98806 5_2_04D98806
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_04D8B820 5_2_04D8B820
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_04D9E1F8 5_2_04D9E1F8
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_04D82194 5_2_04D82194
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_04D96187 5_2_04D96187
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_04D9D1BC 5_2_04D9D1BC
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_04D9E955 5_2_04D9E955
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_04D8D14C 5_2_04D8D14C
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_04D92142 5_2_04D92142
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_04D9017B 5_2_04D9017B
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_04D9CAD5 5_2_04D9CAD5
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_04D90ABA 5_2_04D90ABA
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_04D8BAA9 5_2_04D8BAA9
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_04D9A2A5 5_2_04D9A2A5
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_04D9B257 5_2_04D9B257
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_04D94244 5_2_04D94244
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_04DA3263 5_2_04DA3263
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_04DA0A64 5_2_04DA0A64
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_04D94A66 5_2_04D94A66
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_04D97A0F 5_2_04D97A0F
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_04D99A01 5_2_04D99A01
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_04D84BFC 5_2_04D84BFC
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_04D8238C 5_2_04D8238C
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_04D8FB8E 5_2_04D8FB8E
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_04D86B7A 5_2_04D86B7A
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_04D8F369 5_2_04D8F369
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_04DA2B09 5_2_04DA2B09
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_04D95333 5_2_04D95333
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_04932009 7_2_04932009
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_04927A0F 7_2_04927A0F
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_04918636 7_2_04918636
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_0492B257 7_2_0492B257
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_0491DE74 7_2_0491DE74
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_04924A66 7_2_04924A66
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_049317BD 7_2_049317BD
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_0491C5D8 7_2_0491C5D8
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_0492EFDD 7_2_0492EFDD
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_049285FF 7_2_049285FF
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_0491670B 7_2_0491670B
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_0492AD08 7_2_0492AD08
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_0492E955 7_2_0492E955
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_0492FF58 7_2_0492FF58
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_04922142 7_2_04922142
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_0492654A 7_2_0492654A
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_04920ABA 7_2_04920ABA
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_0491C6B8 7_2_0491C6B8
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_049346BD 7_2_049346BD
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_04920EBC 7_2_04920EBC
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_04911CA1 7_2_04911CA1
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_0492A2A5 7_2_0492A2A5
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_04923EAA 7_2_04923EAA
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_0491BAA9 7_2_0491BAA9
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_049336AA 7_2_049336AA
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_0492CAD5 7_2_0492CAD5
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_0492D8DB 7_2_0492D8DB
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_0492CCD9 7_2_0492CCD9
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_049180C0 7_2_049180C0
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_0492BEFD 7_2_0492BEFD
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_0492E4E5 7_2_0492E4E5
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_0491F0E9 7_2_0491F0E9
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_04933EE9 7_2_04933EE9
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_049300EF 7_2_049300EF
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_04929A01 7_2_04929A01
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_04928806 7_2_04928806
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_04913431 7_2_04913431
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_0491B820 7_2_0491B820
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_04922E5D 7_2_04922E5D
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_0491E640 7_2_0491E640
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_0492F840 7_2_0492F840
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_04917442 7_2_04917442
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_0491A445 7_2_0491A445
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_04924244 7_2_04924244
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_0491A871 7_2_0491A871
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_0492DC71 7_2_0492DC71
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_0492A474 7_2_0492A474
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_04917E79 7_2_04917E79
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_04917078 7_2_04917078
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_0492567B 7_2_0492567B
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_04933263 7_2_04933263
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_04930A64 7_2_04930A64
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_04912194 7_2_04912194
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_04920F86 7_2_04920F86
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_04926187 7_2_04926187
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_04923D85 7_2_04923D85
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_0491238C 7_2_0491238C
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_0491FB8E 7_2_0491FB8E
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_049157B8 7_2_049157B8
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_0492D1BC 7_2_0492D1BC
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_0491BFBE 7_2_0491BFBE
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_049177A3 7_2_049177A3
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_049307AA 7_2_049307AA
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_04928FAE 7_2_04928FAE
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_0492C5D5 7_2_0492C5D5
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_0492FBDE 7_2_0492FBDE
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_0491E7DE 7_2_0491E7DE
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_049207F4 7_2_049207F4
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_04929DF5 7_2_04929DF5
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_0492E1F8 7_2_0492E1F8
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_049227F9 7_2_049227F9
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_04914BFC 7_2_04914BFC
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_049155FF 7_2_049155FF
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_049267E6 7_2_049267E6
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_04925515 7_2_04925515
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_04932B09 7_2_04932B09
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_0491EF0C 7_2_0491EF0C
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_04925333 7_2_04925333
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_04911F38 7_2_04911F38
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_04928D3D 7_2_04928D3D
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_04932D53 7_2_04932D53
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_04927D5B 7_2_04927D5B
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_0491D14C 7_2_0491D14C
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_04924F74 7_2_04924F74
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_04929774 7_2_04929774
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_0492437A 7_2_0492437A
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_0492017B 7_2_0492017B
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_04925779 7_2_04925779
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_04916B7A 7_2_04916B7A
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_0491F369 7_2_0491F369
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_02F8DE74 9_2_02F8DE74
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_02F94A66 9_2_02F94A66
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_02F8A445 9_2_02F8A445
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_02F88636 9_2_02F88636
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_02FA2009 9_2_02FA2009
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_02F97A0F 9_2_02F97A0F
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_02F8C5D8 9_2_02F8C5D8
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_02F9EFDD 9_2_02F9EFDD
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_02F9FF58 9_2_02F9FF58
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_02F9654A 9_2_02F9654A
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_02F92142 9_2_02F92142
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_02F9AD08 9_2_02F9AD08
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_02F8670B 9_2_02F8670B
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_02F9BEFD 9_2_02F9BEFD
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_02F8F0E9 9_2_02F8F0E9
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_02FA3EE9 9_2_02FA3EE9
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_02FA00EF 9_2_02FA00EF
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_02F9E4E5 9_2_02F9E4E5
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_02F9CCD9 9_2_02F9CCD9
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_02F9D8DB 9_2_02F9D8DB
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_02F9CAD5 9_2_02F9CAD5
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_02F880C0 9_2_02F880C0
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_02F8C6B8 9_2_02F8C6B8
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_02F90ABA 9_2_02F90ABA
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_02F90EBC 9_2_02F90EBC
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_02FA46BD 9_2_02FA46BD
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_02FA36AA 9_2_02FA36AA
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_02F8BAA9 9_2_02F8BAA9
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_02F93EAA 9_2_02F93EAA
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_02F81CA1 9_2_02F81CA1
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_02F9A2A5 9_2_02F9A2A5
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_02F87078 9_2_02F87078
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_02F87E79 9_2_02F87E79
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_02F9567B 9_2_02F9567B
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_02F9DC71 9_2_02F9DC71
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_02F8A871 9_2_02F8A871
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_02F9A474 9_2_02F9A474
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_02FA3263 9_2_02FA3263
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_02FA0A64 9_2_02FA0A64
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_02F92E5D 9_2_02F92E5D
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_02F9B257 9_2_02F9B257
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_02F8E640 9_2_02F8E640
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_02F9F840 9_2_02F9F840
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_02F87442 9_2_02F87442
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_02F94244 9_2_02F94244
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_02F83431 9_2_02F83431
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_02F8B820 9_2_02F8B820
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_02F99A01 9_2_02F99A01
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_02F98806 9_2_02F98806
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_02F927F9 9_2_02F927F9
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_02F9E1F8 9_2_02F9E1F8
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_02F84BFC 9_2_02F84BFC
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_02F985FF 9_2_02F985FF
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_02F855FF 9_2_02F855FF
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_02F99DF5 9_2_02F99DF5
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_02F907F4 9_2_02F907F4
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_02F967E6 9_2_02F967E6
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_02F8E7DE 9_2_02F8E7DE
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_02F9FBDE 9_2_02F9FBDE
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_02F9C5D5 9_2_02F9C5D5
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_02F857B8 9_2_02F857B8
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_02F9D1BC 9_2_02F9D1BC
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_02F8BFBE 9_2_02F8BFBE
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_02FA17BD 9_2_02FA17BD
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_02FA07AA 9_2_02FA07AA
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_02F98FAE 9_2_02F98FAE
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_02F877A3 9_2_02F877A3
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_02F82194 9_2_02F82194
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_02F8238C 9_2_02F8238C
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_02F8FB8E 9_2_02F8FB8E
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_02F93D85 9_2_02F93D85
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_02F96187 9_2_02F96187
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_02F90F86 9_2_02F90F86
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_02F95779 9_2_02F95779
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_02F86B7A 9_2_02F86B7A
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_02F9017B 9_2_02F9017B
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_02F9437A 9_2_02F9437A
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_02F94F74 9_2_02F94F74
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_02F99774 9_2_02F99774
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_02F8F369 9_2_02F8F369
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_02F97D5B 9_2_02F97D5B
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_02FA2D53 9_2_02FA2D53
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_02F9E955 9_2_02F9E955
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_02F8D14C 9_2_02F8D14C
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_02F81F38 9_2_02F81F38
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_02F98D3D 9_2_02F98D3D
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_02F95333 9_2_02F95333
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_02F95515 9_2_02F95515
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_02FA2B09 9_2_02FA2B09
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_02F8EF0C 9_2_02F8EF0C
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 10_2_04FF85FF 10_2_04FF85FF
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 10_2_04FFEFDD 10_2_04FFEFDD
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 10_2_04FFBEFD 10_2_04FFBEFD
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 10_2_05002B09 10_2_05002B09
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 10_2_04FEF0E9 10_2_04FEF0E9
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 10_2_04FFE4E5 10_2_04FFE4E5
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 10_2_04FFD8DB 10_2_04FFD8DB
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 10_2_04FFCCD9 10_2_04FFCCD9
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 10_2_04FFCAD5 10_2_04FFCAD5
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 10_2_04FE80C0 10_2_04FE80C0
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 10_2_04FF0EBC 10_2_04FF0EBC
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 10_2_04FF0ABA 10_2_04FF0ABA
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 10_2_04FEC6B8 10_2_04FEC6B8
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 10_2_05002D53 10_2_05002D53
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 10_2_04FF3EAA 10_2_04FF3EAA
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 10_2_04FEBAA9 10_2_04FEBAA9
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 10_2_04FFA2A5 10_2_04FFA2A5
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 10_2_04FE1CA1 10_2_04FE1CA1
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 10_2_04FF567B 10_2_04FF567B
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 10_2_04FE7078 10_2_04FE7078
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 10_2_04FE7E79 10_2_04FE7E79
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 10_2_04FEDE74 10_2_04FEDE74
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 10_2_04FFA474 10_2_04FFA474
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 10_2_04FFDC71 10_2_04FFDC71
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 10_2_04FEA871 10_2_04FEA871
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 10_2_04FF4A66 10_2_04FF4A66
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 10_2_04FF2E5D 10_2_04FF2E5D
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 10_2_04FFB257 10_2_04FFB257
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 10_2_050007AA 10_2_050007AA
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 10_2_04FEA445 10_2_04FEA445
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 10_2_04FF4244 10_2_04FF4244
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 10_2_04FE7442 10_2_04FE7442
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 10_2_050017BD 10_2_050017BD
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 10_2_04FEE640 10_2_04FEE640
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 10_2_04FFF840 10_2_04FFF840
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 10_2_04FE8636 10_2_04FE8636
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 10_2_04FE3431 10_2_04FE3431
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 10_2_04FEB820 10_2_04FEB820
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 10_2_04FF7A0F 10_2_04FF7A0F
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 10_2_04FF8806 10_2_04FF8806
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 10_2_04FF9A01 10_2_04FF9A01
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 10_2_04FE55FF 10_2_04FE55FF
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 10_2_04FE4BFC 10_2_04FE4BFC
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 10_2_04FFE1F8 10_2_04FFE1F8
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 10_2_05002009 10_2_05002009
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 10_2_04FF9DF5 10_2_04FF9DF5
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 10_2_04FF67E6 10_2_04FF67E6
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 10_2_04FEE7DE 10_2_04FEE7DE
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 10_2_04FEC5D8 10_2_04FEC5D8
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 10_2_04FFC5D5 10_2_04FFC5D5
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 10_2_04FEBFBE 10_2_04FEBFBE
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 10_2_04FFD1BC 10_2_04FFD1BC
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 10_2_04FE57B8 10_2_04FE57B8
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 10_2_04FF8FAE 10_2_04FF8FAE
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 10_2_04FE77A3 10_2_04FE77A3
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 10_2_05003263 10_2_05003263
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 10_2_05000A64 10_2_05000A64
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 10_2_04FE2194 10_2_04FE2194
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 10_2_04FEFB8E 10_2_04FEFB8E
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 10_2_04FE238C 10_2_04FE238C
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 10_2_04FF6187 10_2_04FF6187
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 10_2_04FF0F86 10_2_04FF0F86
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 10_2_04FF3D85 10_2_04FF3D85
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 10_2_04FE6B7A 10_2_04FE6B7A
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 10_2_04FF017B 10_2_04FF017B
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 10_2_04FF5779 10_2_04FF5779
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 10_2_04FF4F74 10_2_04FF4F74
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 10_2_04FF9774 10_2_04FF9774
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 10_2_04FEF369 10_2_04FEF369
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 10_2_04FF7D5B 10_2_04FF7D5B
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 10_2_04FFFF58 10_2_04FFFF58
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 10_2_04FFE955 10_2_04FFE955
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 10_2_050036AA 10_2_050036AA
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 10_2_04FED14C 10_2_04FED14C
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 10_2_04FF654A 10_2_04FF654A
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 10_2_050046BD 10_2_050046BD
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 10_2_04FF2142 10_2_04FF2142
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 10_2_04FF8D3D 10_2_04FF8D3D
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 10_2_04FE1F38 10_2_04FE1F38
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 10_2_04FF5333 10_2_04FF5333
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 10_2_05003EE9 10_2_05003EE9
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 10_2_04FF5515 10_2_04FF5515
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 10_2_050000EF 10_2_050000EF
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 10_2_04FEEF0C 10_2_04FEEF0C
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 10_2_04FE670B 10_2_04FE670B
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 10_2_04FFAD08 10_2_04FFAD08
Found potential string decryption / allocating functions
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: String function: 10017BC1 appears 68 times
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: String function: 1001984C appears 48 times
Source: C:\Windows\SysWOW64\rundll32.exe Code function: String function: 10017BC1 appears 68 times
Source: C:\Windows\SysWOW64\rundll32.exe Code function: String function: 1001984C appears 48 times
Sample file is different than original file name gathered from version info
Source: gyZm68Cgwf.dll Binary or memory string: OriginalFilenameUDPTool.EXE: vs gyZm68Cgwf.dll
PE file contains strange resources
Source: gyZm68Cgwf.dll Static PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Tries to load missing DLLs
Source: C:\Windows\SysWOW64\regsvr32.exe Section loaded: sfc.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: xboxlivetitleid.dll Jump to behavior
Source: C:\Windows\System32\svchost.exe Section loaded: cdpsgshims.dll Jump to behavior
Source: gyZm68Cgwf.dll Virustotal: Detection: 28%
Source: gyZm68Cgwf.dll ReversingLabs: Detection: 39%
Source: gyZm68Cgwf.dll Static PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
Source: C:\Windows\System32\loaddll32.exe Key opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers Jump to behavior
Source: unknown Process created: C:\Windows\System32\loaddll32.exe loaddll32.exe "C:\Users\user\Desktop\gyZm68Cgwf.dll"
Source: C:\Windows\System32\loaddll32.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\gyZm68Cgwf.dll",#1
Source: C:\Windows\System32\loaddll32.exe Process created: C:\Windows\SysWOW64\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\gyZm68Cgwf.dll
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\gyZm68Cgwf.dll",#1
Source: C:\Windows\System32\loaddll32.exe Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\gyZm68Cgwf.dll,DllRegisterServer
Source: C:\Windows\SysWOW64\regsvr32.exe Process created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\rundll32.exe "C:\Users\user\Desktop\gyZm68Cgwf.dll",DllRegisterServer
Source: C:\Windows\SysWOW64\rundll32.exe Process created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\rundll32.exe "C:\Users\user\Desktop\gyZm68Cgwf.dll",DllRegisterServer
Source: C:\Windows\SysWOW64\rundll32.exe Process created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Eehwmcxbz\pepkl.dhq",tlvll
Source: C:\Windows\SysWOW64\rundll32.exe Process created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\rundll32.exe "C:\Windows\System32\Eehwmcxbz\pepkl.dhq",DllRegisterServer
Source: unknown Process created: C:\Windows\System32\svchost.exe c:\windows\system32\svchost.exe -k localservice -p -s CDPSvc
Source: unknown Process created: C:\Windows\System32\svchost.exe c:\windows\system32\svchost.exe -k networkservice -p -s DoSvc
Source: unknown Process created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k NetworkService -p
Source: unknown Process created: C:\Windows\System32\SgrmBroker.exe C:\Windows\system32\SgrmBroker.exe
Source: unknown Process created: C:\Windows\System32\svchost.exe c:\windows\system32\svchost.exe -k localservicenetworkrestricted -p -s wscsvc
Source: unknown Process created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p
Source: unknown Process created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p
Source: unknown Process created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p
Source: unknown Process created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p
Source: C:\Windows\System32\svchost.exe Process created: C:\Program Files\Windows Defender\MpCmdRun.exe "C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable
Source: C:\Program Files\Windows Defender\MpCmdRun.exe Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\loaddll32.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\gyZm68Cgwf.dll",#1 Jump to behavior
Source: C:\Windows\System32\loaddll32.exe Process created: C:\Windows\SysWOW64\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\gyZm68Cgwf.dll Jump to behavior
Source: C:\Windows\System32\loaddll32.exe Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\gyZm68Cgwf.dll,DllRegisterServer Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\gyZm68Cgwf.dll",#1 Jump to behavior
Source: C:\Windows\SysWOW64\regsvr32.exe Process created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\rundll32.exe "C:\Users\user\Desktop\gyZm68Cgwf.dll",DllRegisterServer Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\rundll32.exe "C:\Users\user\Desktop\gyZm68Cgwf.dll",DllRegisterServer Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Eehwmcxbz\pepkl.dhq",tlvll Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\rundll32.exe "C:\Windows\System32\Eehwmcxbz\pepkl.dhq",DllRegisterServer Jump to behavior
Source: C:\Windows\System32\svchost.exe Process created: C:\Program Files\Windows Defender\MpCmdRun.exe "C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32 Jump to behavior
Source: classification engine Classification label: mal100.troj.evad.winDLL@29/4@0/27
Source: C:\Windows\SysWOW64\rundll32.exe File read: C:\Users\desktop.ini Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\gyZm68Cgwf.dll",#1
Source: C:\Windows\System32\conhost.exe Mutant created: \BaseNamedObjects\Local\SM0:4796:120:WilError_01
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 4_2_100126F9 FindResourceA,LoadResource,LockResource,FreeResource, 4_2_100126F9
Source: C:\Windows\SysWOW64\rundll32.exe File read: C:\Windows\System32\drivers\etc\hosts Jump to behavior
Source: C:\Windows\System32\svchost.exe File read: C:\Windows\System32\drivers\etc\hosts Jump to behavior
Source: C:\Windows\System32\svchost.exe File read: C:\Windows\System32\drivers\etc\hosts Jump to behavior
Source: gyZm68Cgwf.dll Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: gyZm68Cgwf.dll Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: gyZm68Cgwf.dll Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: gyZm68Cgwf.dll Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: gyZm68Cgwf.dll Static PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata

Data Obfuscation:

barindex
Uses code obfuscation techniques (call, push, ret)
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 4_2_10019891 push ecx; ret 4_2_100198A4
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 4_2_10017C60 push ecx; ret 4_2_10017C73
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 4_2_00C408E0 push esp; iretd 4_2_00C408E3
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 4_2_00C44889 push ss; ret 4_2_00C4488A
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 4_2_00C31195 push cs; iretd 4_2_00C31197
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 4_2_00C44962 push ss; ret 4_2_00C44963
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_10019891 push ecx; ret 5_2_100198A4
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_10017C60 push ecx; ret 5_2_10017C73
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_04D908E0 push esp; iretd 5_2_04D908E3
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_04D81195 push cs; iretd 5_2_04D81197
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_04911195 push cs; iretd 7_2_04911197
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_02F81195 push cs; iretd 9_2_02F81197
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 10_2_04FF08E0 push esp; iretd 10_2_04FF08E3
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 10_2_04FE1195 push cs; iretd 10_2_04FE1197
Contains functionality to dynamically determine API calls
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 4_2_10023A79 LoadLibraryA,GetProcAddress,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,__invoke_watson,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,__decode_pointer,__decode_pointer,__invoke_watson,__decode_pointer,__decode_pointer,__decode_pointer, 4_2_10023A79
PE file contains an invalid checksum
Source: gyZm68Cgwf.dll Static PE information: real checksum: 0x66354 should be: 0x6bd59
Registers a DLL
Source: C:\Windows\System32\loaddll32.exe Process created: C:\Windows\SysWOW64\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\gyZm68Cgwf.dll

Persistence and Installation Behavior:

barindex
Drops PE files to the windows directory (C:\Windows)
Source: C:\Windows\SysWOW64\rundll32.exe PE file moved: C:\Windows\SysWOW64\Eehwmcxbz\pepkl.dhq Jump to behavior

Hooking and other Techniques for Hiding and Protection:

barindex
Hides that the sample has been downloaded from the Internet (zone.identifier)
Source: C:\Windows\SysWOW64\rundll32.exe File opened: C:\Windows\SysWOW64\Eehwmcxbz\pepkl.dhq:Zone.Identifier read attributes | delete Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe File opened: C:\Windows\SysWOW64\Mxpiamylgwue\zjlesmx.igt:Zone.Identifier read attributes | delete Jump to behavior
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 4_2_1000D804 IsIconic,GetWindowPlacement,GetWindowRect, 4_2_1000D804
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 4_2_10008B90 IsIconic,SendMessageA,GetSystemMetrics,GetSystemMetrics,GetClientRect,DrawIcon, 4_2_10008B90
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_1000D804 IsIconic,GetWindowPlacement,GetWindowRect, 5_2_1000D804
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_10008B90 IsIconic,SendMessageA,GetSystemMetrics,GetSystemMetrics,GetClientRect,DrawIcon, 5_2_10008B90
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Source: C:\Windows\SysWOW64\rundll32.exe Registry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process information set: NOOPENFILEERRORBOX Jump to behavior

Malware Analysis System Evasion:

barindex
May sleep (evasive loops) to hinder dynamic analysis
Source: C:\Windows\System32\svchost.exe TID: 3876 Thread sleep time: -180000s >= -30000s Jump to behavior
Sample execution stops while process was sleeping (likely an evasion)
Source: C:\Windows\System32\loaddll32.exe Last function: Thread delayed
Source: C:\Windows\System32\conhost.exe Last function: Thread delayed
Found large amount of non-executed APIs
Source: C:\Windows\SysWOW64\regsvr32.exe API coverage: 4.6 %
Source: C:\Windows\SysWOW64\rundll32.exe API coverage: 4.9 %
Source: C:\Windows\SysWOW64\regsvr32.exe API call chain: ExitProcess graph end node
Source: C:\Windows\SysWOW64\rundll32.exe API call chain: ExitProcess graph end node
Source: C:\Windows\SysWOW64\rundll32.exe File Volume queried: C:\ FullSizeInformation Jump to behavior
Source: svchost.exe, 00000016.00000002.396567142.0000027DA547D000.00000004.00000001.sdmp, svchost.exe, 00000016.00000002.396709131.0000027DA54DC000.00000004.00000001.sdmp, svchost.exe, 00000016.00000002.396724462.0000027DA54DF000.00000004.00000001.sdmp, svchost.exe, 00000016.00000003.395587984.0000027DA547B000.00000004.00000001.sdmp Binary or memory string: Hyper-V RAW
Source: svchost.exe, 0000000C.00000002.797873657.00000236A2267000.00000004.00000001.sdmp, svchost.exe, 0000000D.00000002.797611545.0000027A4822A000.00000004.00000001.sdmp Binary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll

Anti Debugging:

barindex
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 4_2_1001C49A _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, 4_2_1001C49A
Contains functionality to dynamically determine API calls
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 4_2_10023A79 LoadLibraryA,GetProcAddress,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,__invoke_watson,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,__decode_pointer,__decode_pointer,__invoke_watson,__decode_pointer,__decode_pointer,__decode_pointer, 4_2_10023A79
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 4_2_100178B6 GetProcessHeap,GetProcessHeap,HeapAlloc,GetVersionExA,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,__heap_term,__RTC_Initialize,GetCommandLineA,___crtGetEnvironmentStringsA,__ioinit,__mtterm,__setargv,__setenvp,__cinit,__ioterm,__ioterm,__mtterm,__heap_term,___set_flsgetvalue,__calloc_crt,__decode_pointer,__initptd,GetCurrentThreadId,__freeptd, 4_2_100178B6
Contains functionality to read the PEB
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 4_2_00C3F7F7 mov eax, dword ptr fs:[00000030h] 4_2_00C3F7F7
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_04D8F7F7 mov eax, dword ptr fs:[00000030h] 5_2_04D8F7F7
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 7_2_0491F7F7 mov eax, dword ptr fs:[00000030h] 7_2_0491F7F7
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_02F8F7F7 mov eax, dword ptr fs:[00000030h] 9_2_02F8F7F7
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 10_2_04FEF7F7 mov eax, dword ptr fs:[00000030h] 10_2_04FEF7F7
Checks if the current process is being debugged
Source: C:\Windows\System32\loaddll32.exe Process queried: DebugPort Jump to behavior
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 4_2_1001C49A _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, 4_2_1001C49A
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 4_2_10021743 __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter, 4_2_10021743
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 4_2_100167D5 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, 4_2_100167D5
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 4_2_1001FC21 SetUnhandledExceptionFilter,__encode_pointer, 4_2_1001FC21
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 4_2_1001FC43 __decode_pointer,SetUnhandledExceptionFilter, 4_2_1001FC43
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_1001C49A _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, 5_2_1001C49A
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_10021743 __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter, 5_2_10021743
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_100167D5 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, 5_2_100167D5
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_1001FC21 SetUnhandledExceptionFilter,__encode_pointer, 5_2_1001FC21
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_1001FC43 __decode_pointer,SetUnhandledExceptionFilter, 5_2_1001FC43

HIPS / PFW / Operating System Protection Evasion:

barindex
System process connects to network (likely due to code injection or exploit)
Source: C:\Windows\SysWOW64\rundll32.exe Network Connect: 69.16.218.101 144 Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Network Connect: 45.138.98.34 80 Jump to behavior
Creates a process in suspended mode (likely to inject code)
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\gyZm68Cgwf.dll",#1 Jump to behavior
Source: rundll32.exe, 0000000B.00000002.798329855.0000000002CC0000.00000002.00020000.sdmp Binary or memory string: Program Manager
Source: rundll32.exe, 0000000B.00000002.798329855.0000000002CC0000.00000002.00020000.sdmp Binary or memory string: Shell_TrayWnd
Source: rundll32.exe, 0000000B.00000002.798329855.0000000002CC0000.00000002.00020000.sdmp Binary or memory string: Progman
Source: rundll32.exe, 0000000B.00000002.798329855.0000000002CC0000.00000002.00020000.sdmp Binary or memory string: Progmanlock

Language, Device and Operating System Detection:

barindex
Queries the volume information (name, serial number etc) of a device
Source: C:\Windows\SysWOW64\rundll32.exe Queries volume information: C:\ VolumeInformation Jump to behavior
Contains functionality to query locales information (e.g. system language)
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: GetThreadLocale,GetLocaleInfoA,GetACP, 4_2_10027704
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: _strcpy_s,__snprintf_s,GetLocaleInfoA,LoadLibraryA, 4_2_1000A803
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: GetLocaleInfoA, 4_2_10023880
Source: C:\Windows\SysWOW64\rundll32.exe Code function: GetThreadLocale,GetLocaleInfoA,GetACP, 5_2_10027704
Source: C:\Windows\SysWOW64\rundll32.exe Code function: _strcpy_s,__snprintf_s,GetLocaleInfoA,LoadLibraryA, 5_2_1000A803
Source: C:\Windows\SysWOW64\rundll32.exe Code function: GetLocaleInfoA, 5_2_10023880
Contains functionality to query CPU information (cpuid)
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 4_2_10022853 cpuid 4_2_10022853
Source: C:\Windows\SysWOW64\rundll32.exe Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid Jump to behavior
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 4_2_1001F914 GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter, 4_2_1001F914
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 4_2_100178B6 GetProcessHeap,GetProcessHeap,HeapAlloc,GetVersionExA,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,__heap_term,__RTC_Initialize,GetCommandLineA,___crtGetEnvironmentStringsA,__ioinit,__mtterm,__setargv,__setenvp,__cinit,__ioterm,__ioterm,__mtterm,__heap_term,___set_flsgetvalue,__calloc_crt,__decode_pointer,__initptd,GetCurrentThreadId,__freeptd, 4_2_100178B6

Lowering of HIPS / PFW / Operating System Security Settings:

barindex
Changes security center settings (notifications, updates, antivirus, firewall)
Source: C:\Windows\System32\svchost.exe Key value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center cval Jump to behavior
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Source: C:\Windows\System32\svchost.exe WMI Queries: IWbemServices::ExecNotificationQuery - ROOT\SecurityCenter : SELECT * FROM __InstanceOperationEvent WHERE TargetInstance ISA &apos;AntiVirusProduct&apos; OR TargetInstance ISA &apos;FirewallProduct&apos; OR TargetInstance ISA &apos;AntiSpywareProduct&apos;
Source: C:\Windows\System32\svchost.exe WMI Queries: IWbemServices::CreateInstanceEnum - ROOT\SecurityCenter2 : FirewallProduct
Source: C:\Windows\System32\svchost.exe WMI Queries: IWbemServices::CreateInstanceEnum - ROOT\SecurityCenter2 : AntiVirusProduct
Source: C:\Windows\System32\svchost.exe WMI Queries: IWbemServices::CreateInstanceEnum - ROOT\SecurityCenter2 : AntiSpywareProduct
AV process strings found (often used to terminate AV products)
Source: svchost.exe, 00000010.00000002.797303944.0000028588C40000.00000004.00000001.sdmp Binary or memory string: "@V%ProgramFiles%\Windows Defender\MsMpeng.exe
Source: svchost.exe, 00000010.00000002.797588392.0000028588D02000.00000004.00000001.sdmp Binary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe

Stealing of Sensitive Information:

barindex
Yara detected Emotet
Source: Yara match File source: 11.2.rundll32.exe.48e0000.6.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 11.2.rundll32.exe.550000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 11.2.rundll32.exe.4c90000.14.unpack, type: UNPACKEDPE
Source: Yara match File source: 11.2.rundll32.exe.760000.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 4.2.regsvr32.exe.c30000.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 9.2.rundll32.exe.2f80000.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 11.2.rundll32.exe.c40000.3.unpack, type: UNPACKEDPE
Source: Yara match File source: 7.2.rundll32.exe.5190000.6.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 11.2.rundll32.exe.48e0000.6.unpack, type: UNPACKEDPE
Source: Yara match File source: 11.2.rundll32.exe.4800000.4.unpack, type: UNPACKEDPE
Source: Yara match File source: 11.2.rundll32.exe.4c90000.14.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 7.2.rundll32.exe.5030000.4.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 9.2.rundll32.exe.4dc0000.2.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 9.2.rundll32.exe.2f50000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.4eb0000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 7.2.rundll32.exe.4f50000.2.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 11.2.rundll32.exe.4da0000.17.unpack, type: UNPACKEDPE
Source: Yara match File source: 7.2.rundll32.exe.4f80000.3.unpack, type: UNPACKEDPE
Source: Yara match File source: 7.2.rundll32.exe.51c0000.7.unpack, type: UNPACKEDPE
Source: Yara match File source: 11.2.rundll32.exe.7e0000.2.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 11.2.rundll32.exe.4830000.5.unpack, type: UNPACKEDPE
Source: Yara match File source: 7.2.rundll32.exe.5060000.5.unpack, type: UNPACKEDPE
Source: Yara match File source: 11.2.rundll32.exe.4a40000.8.unpack, type: UNPACKEDPE
Source: Yara match File source: 7.2.rundll32.exe.4910000.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 7.2.rundll32.exe.48e0000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 11.2.rundll32.exe.5020000.21.unpack, type: UNPACKEDPE
Source: Yara match File source: 11.2.rundll32.exe.4aa0000.10.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 9.2.rundll32.exe.4dc0000.2.unpack, type: UNPACKEDPE
Source: Yara match File source: 11.2.rundll32.exe.4b80000.12.unpack, type: UNPACKEDPE
Source: Yara match File source: 5.2.rundll32.exe.4d80000.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 4.2.regsvr32.exe.7b0000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 7.2.rundll32.exe.5380000.11.unpack, type: UNPACKEDPE
Source: Yara match File source: 4.2.regsvr32.exe.7b0000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 7.2.rundll32.exe.5220000.9.unpack, type: UNPACKEDPE
Source: Yara match File source: 11.2.rundll32.exe.4800000.4.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 9.2.rundll32.exe.4f30000.5.unpack, type: UNPACKEDPE
Source: Yara match File source: 9.2.rundll32.exe.4f60000.6.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 11.2.rundll32.exe.4aa0000.10.unpack, type: UNPACKEDPE
Source: Yara match File source: 7.2.rundll32.exe.5350000.10.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 11.2.rundll32.exe.7e0000.2.unpack, type: UNPACKEDPE
Source: Yara match File source: 11.2.rundll32.exe.550000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 11.2.rundll32.exe.4d70000.16.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 9.2.rundll32.exe.2f50000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.4eb0000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 11.2.rundll32.exe.4f70000.18.unpack, type: UNPACKEDPE
Source: Yara match File source: 11.2.rundll32.exe.4910000.7.unpack, type: UNPACKEDPE
Source: Yara match File source: 11.2.rundll32.exe.4b80000.12.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 9.2.rundll32.exe.4f60000.6.unpack, type: UNPACKEDPE
Source: Yara match File source: 9.2.rundll32.exe.4df0000.3.unpack, type: UNPACKEDPE
Source: Yara match File source: 7.2.rundll32.exe.4f50000.2.unpack, type: UNPACKEDPE
Source: Yara match File source: 11.2.rundll32.exe.4bb0000.13.unpack, type: UNPACKEDPE
Source: Yara match File source: 11.2.rundll32.exe.4ff0000.20.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 9.2.rundll32.exe.4f00000.4.unpack, type: UNPACKEDPE
Source: Yara match File source: 7.2.rundll32.exe.48e0000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 11.2.rundll32.exe.4ff0000.20.unpack, type: UNPACKEDPE
Source: Yara match File source: 11.2.rundll32.exe.4ad0000.11.unpack, type: UNPACKEDPE
Source: Yara match File source: 11.2.rundll32.exe.4cc0000.15.unpack, type: UNPACKEDPE
Source: Yara match File source: 11.2.rundll32.exe.4f70000.18.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 9.2.rundll32.exe.4f00000.4.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 7.2.rundll32.exe.51f0000.8.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 11.2.rundll32.exe.4fa0000.19.unpack, type: UNPACKEDPE
Source: Yara match File source: 11.2.rundll32.exe.4a70000.9.unpack, type: UNPACKEDPE
Source: Yara match File source: 5.2.rundll32.exe.4d50000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 7.2.rundll32.exe.5350000.10.unpack, type: UNPACKEDPE
Source: Yara match File source: 7.2.rundll32.exe.51f0000.8.unpack, type: UNPACKEDPE
Source: Yara match File source: 5.2.rundll32.exe.4d50000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 7.2.rundll32.exe.5030000.4.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.4fe0000.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 11.2.rundll32.exe.4a40000.8.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 11.2.rundll32.exe.4d70000.16.unpack, type: UNPACKEDPE
Source: Yara match File source: 7.2.rundll32.exe.5190000.6.unpack, type: UNPACKEDPE
Source: Yara match File source: 9.2.rundll32.exe.4f90000.7.unpack, type: UNPACKEDPE
Source: Yara match File source: 00000009.00000002.277730599.0000000004F91000.00000020.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000009.00000002.277713416.0000000004F60000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000009.00000002.277639007.0000000004DF1000.00000020.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000B.00000002.795927232.0000000000761000.00000020.00000010.sdmp, type: MEMORY
Source: Yara match File source: 0000000B.00000002.799414733.0000000004CC1000.00000020.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000B.00000002.799045913.0000000004911000.00000020.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000B.00000002.799697917.0000000004FA1000.00000020.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000007.00000002.279150423.00000000048E0000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000007.00000002.280282313.0000000005221000.00000020.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000007.00000002.280168007.00000000051F0000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000007.00000002.279548390.0000000004F50000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000B.00000002.799538032.0000000004DA1000.00000020.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000005.00000002.276563054.0000000004D81000.00000020.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000007.00000002.279789960.0000000005061000.00000020.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000009.00000002.277622976.0000000004DC0000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000007.00000002.280097781.00000000051C1000.00000020.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000B.00000002.799779111.0000000005021000.00000020.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000B.00000002.799658123.0000000004F70000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000004.00000002.273165607.00000000007B0000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000B.00000002.796004659.00000000007E0000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000B.00000002.798904750.0000000004800000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000B.00000002.799492765.0000000004D70000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.281478633.0000000004FE1000.00000020.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000004.00000002.273217579.0000000000C31000.00000020.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000B.00000002.796123742.0000000000C41000.00000020.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000B.00000002.799740487.0000000004FF0000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000B.00000002.798938392.0000000004831000.00000020.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000007.00000002.280709528.0000000005381000.00000020.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000B.00000002.799314316.0000000004BB1000.00000020.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000B.00000002.795619050.0000000000550000.00000040.00000010.sdmp, type: MEMORY
Source: Yara match File source: 00000005.00000002.276500628.0000000004D50000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000007.00000002.279944266.0000000005190000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000B.00000002.799278109.0000000004B80000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000B.00000002.799381749.0000000004C90000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000009.00000002.277677330.0000000004F00000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000B.00000002.799147765.0000000004A71000.00000020.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000009.00000002.277427449.0000000002F50000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000B.00000002.799215149.0000000004AD1000.00000020.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000007.00000002.279196865.0000000004911000.00000020.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000B.00000002.799109356.0000000004A40000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.281423189.0000000004EB0000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000B.00000002.799182038.0000000004AA0000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000007.00000002.279715977.0000000005030000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000007.00000002.279591942.0000000004F81000.00000020.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000000B.00000002.799004905.00000000048E0000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000007.00000002.280437976.0000000005350000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000009.00000002.277695700.0000000004F31000.00000020.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000009.00000002.277447134.0000000002F81000.00000020.00000001.sdmp, type: MEMORY

Remote Access Functionality:

barindex
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 4_2_100011C0 WSAStartup,_memset,htonl,htons,socket,bind,setsockopt, 4_2_100011C0
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_2_100011C0 WSAStartup,_memset,htonl,htons,socket,bind,setsockopt, 5_2_100011C0
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs