Loading ...

Play interactive tourEdit tour

Windows Analysis Report 4NBdOVqTyL

Overview

General Information

Sample Name:4NBdOVqTyL (renamed file extension from none to dll)
Analysis ID:553378
MD5:2b23fdac0d28360136a616b2803c286f
SHA1:5e730fa1ccfc04c44a34fd385dadc3d03d72d9b3
SHA256:cd5cb5b1c82dd0f301aac47ab966f00b4abc69a24a6a8c789ee7362a2c128537
Tags:32dllexe
Infos:

Most interesting Screenshot:

Detection

Emotet
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Multi AV Scanner detection for submitted file
Yara detected Emotet
System process connects to network (likely due to code injection or exploit)
Changes security center settings (notifications, updates, antivirus, firewall)
Found evasive API chain (may stop execution after reading information in the PEB, e.g. number of processors)
Sigma detected: Suspicious Call by Ordinal
C2 URLs / IPs found in malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
One or more processes crash
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query locales information (e.g. system language)
Deletes files inside the Windows folder
May sleep (evasive loops) to hinder dynamic analysis
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Uses code obfuscation techniques (call, push, ret)
Creates files inside the system directory
Internet Provider seen in connection with other malware
Detected potential crypto function
Found potential string decryption / allocating functions
Sample execution stops while process was sleeping (likely an evasion)
Found evasive API chain (may stop execution after checking a module file name)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to dynamically determine API calls
Contains functionality which may be used to detect a debugger (GetProcessHeap)
IP address seen in connection with other malware
AV process strings found (often used to terminate AV products)
PE file contains an invalid checksum
PE file contains strange resources
Tries to load missing DLLs
Contains functionality to read the PEB
Drops PE files to the windows directory (C:\Windows)
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Detected TCP or UDP traffic on non-standard ports
Checks if the current process is being debugged
Connects to several IPs in different countries
Potential key logger detected (key state polling based)
Registers a DLL
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Queries disk information (often used to detect virtual machines)
Found large amount of non-executed APIs
Creates a process in suspended mode (likely to inject code)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)

Classification

Process Tree

  • System is w10x64
  • loaddll32.exe (PID: 5652 cmdline: loaddll32.exe "C:\Users\user\Desktop\4NBdOVqTyL.dll" MD5: 7DEB5DB86C0AC789123DEC286286B938)
    • cmd.exe (PID: 4068 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\4NBdOVqTyL.dll",#1 MD5: F3BDBE3BB6F734E357235F4D5898582D)
      • rundll32.exe (PID: 4140 cmdline: rundll32.exe "C:\Users\user\Desktop\4NBdOVqTyL.dll",#1 MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
        • rundll32.exe (PID: 6744 cmdline: C:\Windows\SysWOW64\rundll32.exe "C:\Users\user\Desktop\4NBdOVqTyL.dll",DllRegisterServer MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
    • regsvr32.exe (PID: 2900 cmdline: regsvr32.exe /s C:\Users\user\Desktop\4NBdOVqTyL.dll MD5: 426E7499F6A7346F0410DEAD0805586B)
      • rundll32.exe (PID: 3440 cmdline: C:\Windows\SysWOW64\rundll32.exe "C:\Users\user\Desktop\4NBdOVqTyL.dll",DllRegisterServer MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
    • rundll32.exe (PID: 2368 cmdline: rundll32.exe C:\Users\user\Desktop\4NBdOVqTyL.dll,DllRegisterServer MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
      • rundll32.exe (PID: 6792 cmdline: C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Qpmpohowskn\yxodzrkk.uat",KEPxusHldvFY MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
        • rundll32.exe (PID: 6996 cmdline: C:\Windows\SysWOW64\rundll32.exe "C:\Windows\System32\Qpmpohowskn\yxodzrkk.uat",DllRegisterServer MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
    • WerFault.exe (PID: 3440 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 5652 -s 524 MD5: 9E2B8ACAD48ECCA55C0230D63623661B)
  • svchost.exe (PID: 3264 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 5056 cmdline: C:\Windows\System32\svchost.exe -k WerSvcGroup MD5: 32569E403279B3FD2EDB7EBD036273FA)
    • WerFault.exe (PID: 2132 cmdline: C:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 5652 -ip 5652 MD5: 9E2B8ACAD48ECCA55C0230D63623661B)
  • svchost.exe (PID: 2132 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 6200 cmdline: c:\windows\system32\svchost.exe -k localservice -p -s CDPSvc MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 6268 cmdline: c:\windows\system32\svchost.exe -k networkservice -p -s DoSvc MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 6392 cmdline: C:\Windows\System32\svchost.exe -k NetworkService -p MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • SgrmBroker.exe (PID: 6520 cmdline: C:\Windows\system32\SgrmBroker.exe MD5: D3170A3F3A9626597EEE1888686E3EA6)
  • svchost.exe (PID: 6540 cmdline: c:\windows\system32\svchost.exe -k localservicenetworkrestricted -p -s wscsvc MD5: 32569E403279B3FD2EDB7EBD036273FA)
    • MpCmdRun.exe (PID: 848 cmdline: "C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable MD5: A267555174BFA53844371226F482B86B)
      • conhost.exe (PID: 800 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • svchost.exe (PID: 6848 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 4520 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 5772 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • cleanup

Malware Configuration

Threatname: Emotet

{"C2 list": ["45.138.98.34:80", "69.16.218.101:8080", "51.210.242.234:8080", "185.148.168.220:8080", "142.4.219.173:8080", "54.38.242.185:443", "191.252.103.16:80", "104.131.62.48:8080", "62.171.178.147:8080", "217.182.143.207:443", "168.197.250.14:80", "37.44.244.177:8080", "66.42.57.149:443", "210.57.209.142:8080", "159.69.237.188:443", "116.124.128.206:8080", "128.199.192.135:8080", "195.154.146.35:443", "185.148.168.15:8080", "195.77.239.39:8080", "207.148.81.119:8080", "85.214.67.203:8080", "190.90.233.66:443", "78.46.73.125:443", "78.47.204.80:443", "37.59.209.141:8080", "54.37.228.122:443"], "Public Key": ["RUNLMSAAAADYNZPXY4tQxd/N4Wn5sTYAm5tUOxY2ol1ELrI4MNhHNi640vSLasjYTHpFRBoG+o84vtr7AJachCzOHjaAJFCW", "RUNTMSAAAAD0LxqDNhonUYwk8sqo7IWuUllRdUiUBnACc6romsQoe1YJD7wIe4AheqYofpZFucPDXCZ0z9i+ooUffqeoLZU0"]}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000001.00000002.295170355.0000000002441000.00000020.00000001.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
    00000005.00000002.319311816.0000000004FE0000.00000040.00000001.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
      00000003.00000002.264232474.0000000003450000.00000040.00000001.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
        00000003.00000002.264445003.0000000003601000.00000020.00000001.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
          00000001.00000000.271674594.0000000002441000.00000020.00000001.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
            Click to see the 24 entries

            Unpacked PEs

            SourceRuleDescriptionAuthorStrings
            5.2.rundll32.exe.11e0000.1.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
              5.2.rundll32.exe.1190000.0.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
                3.2.regsvr32.exe.3450000.0.raw.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
                  1.2.loaddll32.exe.2410000.0.raw.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
                    1.0.loaddll32.exe.2410000.3.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
                      Click to see the 39 entries

                      Sigma Overview

                      System Summary:

                      barindex
                      Sigma detected: Suspicious Call by OrdinalShow sources
                      Source: Process startedAuthor: Florian Roth: Data: Command: rundll32.exe "C:\Users\user\Desktop\4NBdOVqTyL.dll",#1, CommandLine: rundll32.exe "C:\Users\user\Desktop\4NBdOVqTyL.dll",#1, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\rundll32.exe, NewProcessName: C:\Windows\SysWOW64\rundll32.exe, OriginalFileName: C:\Windows\SysWOW64\rundll32.exe, ParentCommandLine: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\4NBdOVqTyL.dll",#1, ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 4068, ProcessCommandLine: rundll32.exe "C:\Users\user\Desktop\4NBdOVqTyL.dll",#1, ProcessId: 4140

                      Jbx Signature Overview

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection:

                      barindex
                      Found malware configurationShow sources
                      Source: 1.2.loaddll32.exe.2410000.0.raw.unpackMalware Configuration Extractor: Emotet {"C2 list": ["45.138.98.34:80", "69.16.218.101:8080", "51.210.242.234:8080", "185.148.168.220:8080", "142.4.219.173:8080", "54.38.242.185:443", "191.252.103.16:80", "104.131.62.48:8080", "62.171.178.147:8080", "217.182.143.207:443", "168.197.250.14:80", "37.44.244.177:8080", "66.42.57.149:443", "210.57.209.142:8080", "159.69.237.188:443", "116.124.128.206:8080", "128.199.192.135:8080", "195.154.146.35:443", "185.148.168.15:8080", "195.77.239.39:8080", "207.148.81.119:8080", "85.214.67.203:8080", "190.90.233.66:443", "78.46.73.125:443", "78.47.204.80:443", "37.59.209.141:8080", "54.37.228.122:443"], "Public Key": ["RUNLMSAAAADYNZPXY4tQxd/N4Wn5sTYAm5tUOxY2ol1ELrI4MNhHNi640vSLasjYTHpFRBoG+o84vtr7AJachCzOHjaAJFCW", "RUNTMSAAAAD0LxqDNhonUYwk8sqo7IWuUllRdUiUBnACc6romsQoe1YJD7wIe4AheqYofpZFucPDXCZ0z9i+ooUffqeoLZU0"]}
                      Multi AV Scanner detection for submitted fileShow sources
                      Source: 4NBdOVqTyL.dllVirustotal: Detection: 16%Perma Link
                      Source: 4NBdOVqTyL.dllReversingLabs: Detection: 16%
                      Source: 4NBdOVqTyL.dllStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE, DLL
                      Source: Binary string: ws2_32.pdb source: WerFault.exe, 0000000A.00000003.279991245.0000000005588000.00000004.00000040.sdmp, WerFault.exe, 0000000A.00000003.279928465.0000000005588000.00000004.00000040.sdmp
                      Source: Binary string: winspool.pdb source: WerFault.exe, 0000000A.00000003.279976362.0000000005580000.00000004.00000040.sdmp
                      Source: Binary string: wgdi32full.pdb source: WerFault.exe, 0000000A.00000003.279908980.0000000004EC1000.00000004.00000001.sdmp
                      Source: Binary string: wkernel32.pdb source: WerFault.exe, 0000000A.00000003.276091697.0000000004BA4000.00000004.00000001.sdmp, WerFault.exe, 0000000A.00000003.279908980.0000000004EC1000.00000004.00000001.sdmp
                      Source: Binary string: bcrypt.pdb source: WerFault.exe, 0000000A.00000003.279991245.0000000005588000.00000004.00000040.sdmp, WerFault.exe, 0000000A.00000003.279928465.0000000005588000.00000004.00000040.sdmp
                      Source: Binary string: sechost.pdb source: WerFault.exe, 0000000A.00000003.279919547.0000000005582000.00000004.00000040.sdmp
                      Source: Binary string: iphlpapi.pdb source: WerFault.exe, 0000000A.00000003.279991245.0000000005588000.00000004.00000040.sdmp, WerFault.exe, 0000000A.00000003.279928465.0000000005588000.00000004.00000040.sdmp
                      Source: Binary string: ucrtbase.pdb source: WerFault.exe, 0000000A.00000003.279908980.0000000004EC1000.00000004.00000001.sdmp
                      Source: Binary string: msvcrt.pdb source: WerFault.exe, 0000000A.00000003.279908980.0000000004EC1000.00000004.00000001.sdmp
                      Source: Binary string: propsys.pdb source: WerFault.exe, 0000000A.00000003.279991245.0000000005588000.00000004.00000040.sdmp, WerFault.exe, 0000000A.00000003.279928465.0000000005588000.00000004.00000040.sdmp
                      Source: Binary string: wrpcrt4.pdb source: WerFault.exe, 0000000A.00000003.279984565.0000000005585000.00000004.00000040.sdmp, WerFault.exe, 0000000A.00000003.279919547.0000000005582000.00000004.00000040.sdmp
                      Source: Binary string: wntdll.pdb source: WerFault.exe, 0000000A.00000003.279908980.0000000004EC1000.00000004.00000001.sdmp
                      Source: Binary string: wrpcrt4.pdbk source: WerFault.exe, 0000000A.00000003.279984565.0000000005585000.00000004.00000040.sdmp, WerFault.exe, 0000000A.00000003.279919547.0000000005582000.00000004.00000040.sdmp
                      Source: Binary string: shcore.pdb source: WerFault.exe, 0000000A.00000003.279991245.0000000005588000.00000004.00000040.sdmp, WerFault.exe, 0000000A.00000003.279928465.0000000005588000.00000004.00000040.sdmp
                      Source: Binary string: wgdi32.pdb source: WerFault.exe, 0000000A.00000003.279908980.0000000004EC1000.00000004.00000001.sdmp
                      Source: Binary string: advapi32.pdb source: WerFault.exe, 0000000A.00000003.279908980.0000000004EC1000.00000004.00000001.sdmp
                      Source: Binary string: wsspicli.pdb source: WerFault.exe, 0000000A.00000003.279976362.0000000005580000.00000004.00000040.sdmp
                      Source: Binary string: Kernel.Appcore.pdb source: WerFault.exe, 0000000A.00000003.279976362.0000000005580000.00000004.00000040.sdmp
                      Source: Binary string: msvcp_win.pdb source: WerFault.exe, 0000000A.00000003.279908980.0000000004EC1000.00000004.00000001.sdmp
                      Source: Binary string: cryptbase.pdb source: WerFault.exe, 0000000A.00000003.279976362.0000000005580000.00000004.00000040.sdmp
                      Source: Binary string: wimm32.pdb source: WerFault.exe, 0000000A.00000003.279991245.0000000005588000.00000004.00000040.sdmp, WerFault.exe, 0000000A.00000003.279928465.0000000005588000.00000004.00000040.sdmp
                      Source: Binary string: wkernelbase.pdb source: WerFault.exe, 0000000A.00000003.279908980.0000000004EC1000.00000004.00000001.sdmp
                      Source: Binary string: sechost.pdbk source: WerFault.exe, 0000000A.00000003.279919547.0000000005582000.00000004.00000040.sdmp
                      Source: Binary string: shlwapi.pdb source: WerFault.exe, 0000000A.00000003.279991245.0000000005588000.00000004.00000040.sdmp, WerFault.exe, 0000000A.00000003.279928465.0000000005588000.00000004.00000040.sdmp
                      Source: Binary string: bcryptprimitives.pdb source: WerFault.exe, 0000000A.00000003.279976362.0000000005580000.00000004.00000040.sdmp
                      Source: Binary string: wwin32u.pdb source: WerFault.exe, 0000000A.00000003.279908980.0000000004EC1000.00000004.00000001.sdmp
                      Source: Binary string: combase.pdb source: WerFault.exe, 0000000A.00000003.279991245.0000000005588000.00000004.00000040.sdmp, WerFault.exe, 0000000A.00000003.279928465.0000000005588000.00000004.00000040.sdmp
                      Source: Binary string: oleaut32.pdb source: WerFault.exe, 0000000A.00000003.279991245.0000000005588000.00000004.00000040.sdmp, WerFault.exe, 0000000A.00000003.279928465.0000000005588000.00000004.00000040.sdmp
                      Source: Binary string: apphelp.pdb source: WerFault.exe, 0000000A.00000003.279908980.0000000004EC1000.00000004.00000001.sdmp
                      Source: Binary string: wuser32.pdb source: WerFault.exe, 0000000A.00000003.279908980.0000000004EC1000.00000004.00000001.sdmp
                      Source: Binary string: awnjrznCReportStore::Prune: MaxReportCount=%d MaxSizeInMb=%dRSDSwkernel32.pdb source: WerFault.exe, 0000000A.00000002.294194625.0000000002B12000.00000004.00000001.sdmp

                      Networking:

                      barindex
                      Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)Show sources
                      Source: TrafficSnort IDS: 2404332 ET CNC Feodo Tracker Reported CnC Server TCP group 17 192.168.2.7:49769 -> 45.138.98.34:80
                      Source: TrafficSnort IDS: 2404338 ET CNC Feodo Tracker Reported CnC Server TCP group 20 192.168.2.7:49775 -> 69.16.218.101:8080
                      System process connects to network (likely due to code injection or exploit)Show sources
                      Source: C:\Windows\SysWOW64\rundll32.exeNetwork Connect: 69.16.218.101 144
                      Source: C:\Windows\SysWOW64\rundll32.exeNetwork Connect: 45.138.98.34 80
                      C2 URLs / IPs found in malware configurationShow sources
                      Source: Malware configuration extractorIPs: 45.138.98.34:80
                      Source: Malware configuration extractorIPs: 69.16.218.101:8080
                      Source: Malware configuration extractorIPs: 51.210.242.234:8080
                      Source: Malware configuration extractorIPs: 185.148.168.220:8080
                      Source: Malware configuration extractorIPs: 142.4.219.173:8080
                      Source: Malware configuration extractorIPs: 54.38.242.185:443
                      Source: Malware configuration extractorIPs: 191.252.103.16:80
                      Source: Malware configuration extractorIPs: 104.131.62.48:8080
                      Source: Malware configuration extractorIPs: 62.171.178.147:8080
                      Source: Malware configuration extractorIPs: 217.182.143.207:443
                      Source: Malware configuration extractorIPs: 168.197.250.14:80
                      Source: Malware configuration extractorIPs: 37.44.244.177:8080
                      Source: Malware configuration extractorIPs: 66.42.57.149:443
                      Source: Malware configuration extractorIPs: 210.57.209.142:8080
                      Source: Malware configuration extractorIPs: 159.69.237.188:443
                      Source: Malware configuration extractorIPs: 116.124.128.206:8080
                      Source: Malware configuration extractorIPs: 128.199.192.135:8080
                      Source: Malware configuration extractorIPs: 195.154.146.35:443
                      Source: Malware configuration extractorIPs: 185.148.168.15:8080
                      Source: Malware configuration extractorIPs: 195.77.239.39:8080
                      Source: Malware configuration extractorIPs: 207.148.81.119:8080
                      Source: Malware configuration extractorIPs: 85.214.67.203:8080
                      Source: Malware configuration extractorIPs: 190.90.233.66:443
                      Source: Malware configuration extractorIPs: 78.46.73.125:443
                      Source: Malware configuration extractorIPs: 78.47.204.80:443
                      Source: Malware configuration extractorIPs: 37.59.209.141:8080
                      Source: Malware configuration extractorIPs: 54.37.228.122:443
                      Source: Joe Sandbox ViewASN Name: AS-CHOOPAUS AS-CHOOPAUS
                      Source: Joe Sandbox ViewASN Name: DIGITALOCEAN-ASNUS DIGITALOCEAN-ASNUS
                      Source: Joe Sandbox ViewIP Address: 207.148.81.119 207.148.81.119
                      Source: Joe Sandbox ViewIP Address: 104.131.62.48 104.131.62.48
                      Source: global trafficTCP traffic: 192.168.2.7:49775 -> 69.16.218.101:8080
                      Source: unknownNetwork traffic detected: IP country count 12
                      Source: unknownTCP traffic detected without corresponding DNS query: 45.138.98.34
                      Source: unknownTCP traffic detected without corresponding DNS query: 45.138.98.34
                      Source: unknownTCP traffic detected without corresponding DNS query: 45.138.98.34
                      Source: unknownTCP traffic detected without corresponding DNS query: 69.16.218.101
                      Source: unknownTCP traffic detected without corresponding DNS query: 69.16.218.101
                      Source: unknownTCP traffic detected without corresponding DNS query: 69.16.218.101
                      Source: unknownTCP traffic detected without corresponding DNS query: 69.16.218.101
                      Source: unknownTCP traffic detected without corresponding DNS query: 69.16.218.101
                      Source: unknownTCP traffic detected without corresponding DNS query: 69.16.218.101
                      Source: unknownTCP traffic detected without corresponding DNS query: 69.16.218.101
                      Source: unknownTCP traffic detected without corresponding DNS query: 69.16.218.101
                      Source: unknownTCP traffic detected without corresponding DNS query: 69.16.218.101
                      Source: unknownTCP traffic detected without corresponding DNS query: 69.16.218.101
                      Source: unknownTCP traffic detected without corresponding DNS query: 69.16.218.101
                      Source: svchost.exe, 0000001F.00000003.445770498.0000020122F92000.00000004.00000001.sdmpString found in binary or memory: Try it free for 30 days, no strings attached\r\n\r\nLike us on Facebook: http://www.facebook.com/spotify \r\nFollow us on Twitter: http://twitter.com/spotify","ProductTitle":"Spotify - Music and Podcasts","SearchTitles":[{"SearchTitleString":"Spotify","SearchTitleType":"SearchHint"},{"SearchTitleString":"Music","SearchTitleType":"SearchHint"},{"SearchTitleString":"music apps","SearchTitleType":"SearchHint"},{"SearchTitleString":"free music","SearchTitleType":"SearchHint"},{"SearchTitleString":"podcasts","SearchTitleType":"SearchHint"},{"SearchTitleString":"streaming","SearchTitleType":"SearchHint"},{"SearchTitleString":"soundcloud","SearchTitleType":"SearchHint"}],"Language":"en-us","Markets":["US","DZ","AR","AU","AT","BH","BD","BE","BR","BG","CA","CL","CN","CO","CR","HR","CY","CZ","DK","EG","EE","FI","FR","DE","GR","GT","HK","HU","IS","IN","ID","IQ","IE","IL","IT","JP","JO","KZ","KE","KW","LV","LB","LI","LT","LU","MY","MT","MR","MX","MA","NL","NZ","NG","N equals www.facebook.com (Facebook)
                      Source: svchost.exe, 0000001F.00000003.445770498.0000020122F92000.00000004.00000001.sdmpString found in binary or memory: Try it free for 30 days, no strings attached\r\n\r\nLike us on Facebook: http://www.facebook.com/spotify \r\nFollow us on Twitter: http://twitter.com/spotify","ProductTitle":"Spotify - Music and Podcasts","SearchTitles":[{"SearchTitleString":"Spotify","SearchTitleType":"SearchHint"},{"SearchTitleString":"Music","SearchTitleType":"SearchHint"},{"SearchTitleString":"music apps","SearchTitleType":"SearchHint"},{"SearchTitleString":"free music","SearchTitleType":"SearchHint"},{"SearchTitleString":"podcasts","SearchTitleType":"SearchHint"},{"SearchTitleString":"streaming","SearchTitleType":"SearchHint"},{"SearchTitleString":"soundcloud","SearchTitleType":"SearchHint"}],"Language":"en-us","Markets":["US","DZ","AR","AU","AT","BH","BD","BE","BR","BG","CA","CL","CN","CO","CR","HR","CY","CZ","DK","EG","EE","FI","FR","DE","GR","GT","HK","HU","IS","IN","ID","IQ","IE","IL","IT","JP","JO","KZ","KE","KW","LV","LB","LI","LT","LU","MY","MT","MR","MX","MA","NL","NZ","NG","N equals www.twitter.com (Twitter)
                      Source: svchost.exe, 0000001F.00000003.445790114.0000020122FA3000.00000004.00000001.sdmp, svchost.exe, 0000001F.00000003.445770498.0000020122F92000.00000004.00000001.sdmpString found in binary or memory: Try it free for 30 days, no strings attached\r\n\r\nLike us on Facebook: http://www.facebook.com/spotify \r\nFollow us on Twitter: http://twitter.com/spotify","ProductTitle":"Spotify - Music and Podcasts","SearchTitles":[{"SearchTitleString":"Spotify","SearchTitleType":"SearchHint"},{"SearchTitleString":"Music","SearchTitleType":"SearchHint"},{"SearchTitleString":"music apps","SearchTitleType":"SearchHint"},{"SearchTitleString":"free music","SearchTitleType":"SearchHint"},{"SearchTitleString":"podcasts","SearchTitleType":"SearchHint"},{"SearchTitleString":"streaming","SearchTitleType":"SearchHint"},{"SearchTitleString":"soundcloud","SearchTitleType":"SearchHint"}],"Language":"en-us","Markets":["US","DZ","AR","AU","AT","BH","BD","BE","BR","BG","CA","CL","CN","CO","CR","HR","CY","CZ","DK","EG","EE","FI","FR","DE","GR","GT","HK","HU","IS","IN","ID","IQ","IE","IL","IT","JP","JO","KZ","KE","KW","LV","LB","LI","LT","LU","MY","MT","MR","MX","MA","NL","NZ","NG","NO","OM","PK","PE","PH","PL","PT","QA","RO","RU","SA","RS","SG","SK","SI","ZA","KR","ES","SE","CH","TW","TH","TT","TN","TR","UA","AE","GB","VN","YE","LY","LK","UY","VE","AF","AX","AL","AS","AO","AI","AQ","AG","AM","AW","BO","BQ","BA","BW","BV","IO","BN","BF","BI","KH","CM","CV","KY","CF","TD","TL","DJ","DM","DO","EC","SV","GQ","ER","ET","FK","FO","FJ","GF","PF","TF","GA","GM","GE","GH","GI","GL","GD","GP","GU","GG","GN","GW","GY","HT","HM","HN","AZ","BS","BB","BY","BZ","BJ","BM","BT","KM","CG","CD","CK","CX","CC","CI","CW","JM","SJ","JE","KI","KG","LA","LS","LR","MO","MK","MG","MW","IM","MH","MQ","MU","YT","FM","MD","MN","MS","MZ","MM","NA","NR","NP","MV","ML","NC","NI","NE","NU","NF","PW","PS","PA","PG","PY","RE","RW","BL","MF","WS","ST","SN","MP","PN","SX","SB","SO","SC","SL","GS","SH","KN","LC","PM","VC","TJ","TZ","TG","TK","TO","TM","TC","TV","UM","UG","VI","VG","WF","EH","ZM","ZW","UZ","VU","SR","SZ","AD","MC","SM","ME","VA","NEUTRAL"]}],"MarketProperties":[{"RelatedProducts":[],"Markets":["US"]}],"ProductASchema":"Product;3","ProductBSchema":"ProductUnifiedApp;3","ProductId":"9NCBCSZSJRSB","Properties":{"PackageFamilyName":"SpotifyAB.SpotifyMusic_zpdnekdrzrea0","PackageIdentityName":"SpotifyAB.SpotifyMusic","PublisherCertificateName":"CN=453637B3-4E12-4CDF-B0D3-2A3C863BF6EF","XboxCrossGenSetId":null,"XboxConsoleGenOptimized":null,"XboxConsoleGenCompatible":null},"AlternateIds":[{"IdType":"LegacyWindowsStoreProductId","Value":"ceac5d3f-8a4f-40e1-9a67-76d9108c7cb5"},{"IdType":"LegacyWindowsPhoneProductId","Value":"caac1b9d-621b-4f96-b143-e10e1397740a"},{"IdType":"XboxTitleId","Value":"1681279293"}],"IngestionSource":"DCE","IsMicrosoftProduct":false,"PreferredSkuId":"0010","ProductType":"Application","ValidationData":{"PassedValidation":false,"RevisionId":"2022-01-07T11:33:20.1626869Z||.||d5cdcec3-04df-404e-ba07-3240047c89f9||1152921505694348672||Null||fullrelease","ValidationResultUri":""},"MerchandizingTags":[],"PartD":"","ProductFamily":"Apps","ProductKind":"Application","DisplaySkuAvailab
                      Source: svchost.exe, 0000001F.00000003.445790114.0000020122FA3000.00000004.00000001.sdmp, svchost.exe, 0000001F.00000003.445770498.0000020122F92000.00000004.00000001.sdmpString found in binary or memory: Try it free for 30 days, no strings attached\r\n\r\nLike us on Facebook: http://www.facebook.com/spotify \r\nFollow us on Twitter: http://twitter.com/spotify","ProductTitle":"Spotify - Music and Podcasts","SearchTitles":[{"SearchTitleString":"Spotify","SearchTitleType":"SearchHint"},{"SearchTitleString":"Music","SearchTitleType":"SearchHint"},{"SearchTitleString":"music apps","SearchTitleType":"SearchHint"},{"SearchTitleString":"free music","SearchTitleType":"SearchHint"},{"SearchTitleString":"podcasts","SearchTitleType":"SearchHint"},{"SearchTitleString":"streaming","SearchTitleType":"SearchHint"},{"SearchTitleString":"soundcloud","SearchTitleType":"SearchHint"}],"Language":"en-us","Markets":["US","DZ","AR","AU","AT","BH","BD","BE","BR","BG","CA","CL","CN","CO","CR","HR","CY","CZ","DK","EG","EE","FI","FR","DE","GR","GT","HK","HU","IS","IN","ID","IQ","IE","IL","IT","JP","JO","KZ","KE","KW","LV","LB","LI","LT","LU","MY","MT","MR","MX","MA","NL","NZ","NG","NO","OM","PK","PE","PH","PL","PT","QA","RO","RU","SA","RS","SG","SK","SI","ZA","KR","ES","SE","CH","TW","TH","TT","TN","TR","UA","AE","GB","VN","YE","LY","LK","UY","VE","AF","AX","AL","AS","AO","AI","AQ","AG","AM","AW","BO","BQ","BA","BW","BV","IO","BN","BF","BI","KH","CM","CV","KY","CF","TD","TL","DJ","DM","DO","EC","SV","GQ","ER","ET","FK","FO","FJ","GF","PF","TF","GA","GM","GE","GH","GI","GL","GD","GP","GU","GG","GN","GW","GY","HT","HM","HN","AZ","BS","BB","BY","BZ","BJ","BM","BT","KM","CG","CD","CK","CX","CC","CI","CW","JM","SJ","JE","KI","KG","LA","LS","LR","MO","MK","MG","MW","IM","MH","MQ","MU","YT","FM","MD","MN","MS","MZ","MM","NA","NR","NP","MV","ML","NC","NI","NE","NU","NF","PW","PS","PA","PG","PY","RE","RW","BL","MF","WS","ST","SN","MP","PN","SX","SB","SO","SC","SL","GS","SH","KN","LC","PM","VC","TJ","TZ","TG","TK","TO","TM","TC","TV","UM","UG","VI","VG","WF","EH","ZM","ZW","UZ","VU","SR","SZ","AD","MC","SM","ME","VA","NEUTRAL"]}],"MarketProperties":[{"RelatedProducts":[],"Markets":["US"]}],"ProductASchema":"Product;3","ProductBSchema":"ProductUnifiedApp;3","ProductId":"9NCBCSZSJRSB","Properties":{"PackageFamilyName":"SpotifyAB.SpotifyMusic_zpdnekdrzrea0","PackageIdentityName":"SpotifyAB.SpotifyMusic","PublisherCertificateName":"CN=453637B3-4E12-4CDF-B0D3-2A3C863BF6EF","XboxCrossGenSetId":null,"XboxConsoleGenOptimized":null,"XboxConsoleGenCompatible":null},"AlternateIds":[{"IdType":"LegacyWindowsStoreProductId","Value":"ceac5d3f-8a4f-40e1-9a67-76d9108c7cb5"},{"IdType":"LegacyWindowsPhoneProductId","Value":"caac1b9d-621b-4f96-b143-e10e1397740a"},{"IdType":"XboxTitleId","Value":"1681279293"}],"IngestionSource":"DCE","IsMicrosoftProduct":false,"PreferredSkuId":"0010","ProductType":"Application","ValidationData":{"PassedValidation":false,"RevisionId":"2022-01-07T11:33:20.1626869Z||.||d5cdcec3-04df-404e-ba07-3240047c89f9||1152921505694348672||Null||fullrelease","ValidationResultUri":""},"MerchandizingTags":[],"PartD":"","ProductFamily":"Apps","ProductKind":"Application","DisplaySkuAvailab
                      Source: svchost.exe, 0000001F.00000003.445770498.0000020122F92000.00000004.00000001.sdmpString found in binary or memory: Mstrings attached\r\n\r\nLike us on Facebook: http://www.facebook.com/spotify \r\nFollow us on Twitter: http://twitter.com/spotify","SkuTitle":"Spotify - Music and Podcasts","Language":"en-us","Markets":["US","DZ","AR","AU","AT","BH","BD","BE","BR","BG","CA","CL","CN","CO","CR","HR","CY","CZ","DK","EG","EE","FI","FR","DE","GR","GT","HK","HU","IS","IN","ID","IQ","IE","IL","IT","JP","JO","KZ","KE","KW","LV","LB","LI","LT","LU","MY","MT","MR","MX","MA","NL","NZ","NG","NO","OM","PK","PE","PH","PL","PT","QA","RO","RU","SA","RS","SG","SK","SI","ZA","KR","ES","SE","CH","TW","TH","TT","TN","TR","UA","AE","GB","VN","YE","LY","LK","UY","VE","AF","AX","AL","AS","AO","AI","AQ","AG","AM","AW","BO","BQ","BA","BW","BV","IO","BN","BF","BI","KH","CM","CV","KY","CF","TD","TL","DJ","DM","DO","EC","SV","GQ","ER","ET","FK","FO","FJ","GF","PF","TF","GA","GM","GE","GH","GI","GL","GD","GP","GU","GG","GN","GW","GY","HT","HM","HN","AZ","BS","BB","BY","BZ","BJ","BM","BT","KM","CG","CD","CK","CX","CC","CI","CW","JM","SJ","JE","KI","KG","LA","LS","LR","MO","MK","MG","MW","IM","MH","MQ","MU","YT","FM","MD","MN","MS","MZ","MM","NA","NR","NP","MV","ML","NC","NI","NE","NU","NF","PW","PS","PA","PG","PY","RE","RW","BL","MF","WS","ST","SN","MP","PN","SX","SB","SO","SC","SL","GS","SH","KN","LC","PM","VC","TJ","TZ","TG","TK","TO","TM","TC","TV","UM","UG","VI","VG","WF","EH","ZM","ZW","UZ","VU","SR","SZ","AD","MC","SM","ME","VA","NEUTRAL"]}],"ProductId":"9NCBCSZSJRSB","Properties":{"FulfillmentData":{"ProductId":"9NCBCSZSJRSB","WuCategoryId":"5c353b9c-7ac7-4d27-af07-923e7d9aa2e2","PackageFamilyName":"SpotifyAB.SpotifyMusic_zpdnekdrzrea0","SkuId":"0011"},"FulfillmentType":"WindowsUpdate","FulfillmentPluginId":null,"Packages":[{"Applications":[{"ApplicationId":"Spotify"}],"Architectures":["x86"],"Capabilities":["internetClient","runFullTrust","Microsoft.storeFilter.core.notSupported_8wekyb3d8bbwe"],"ExperienceIds":[],"MaxDownloadSizeInBytes":104380919,"MaxInstallSizeInBytes":203345920,"PackageFormat":"Appx","PackageFamilyName":"SpotifyAB.SpotifyMusic_zpdnekdrzrea0","MainPackageFamilyNameForDlc":null,"PackageFullName":"SpotifyAB.SpotifyMusic_1.176.447.0_x86__zpdnekdrzrea0","PackageId":"3fbafb47-f476-4c26-4445-49acb9a726e6-X86","PackageRank":30001,"PlatformDependencies":[{"MaxTested":2814750754275328,"MinVersion":2814750710366559,"PlatformName":"Windows.Desktop"}],"PlatformDependencyXmlBlob":"{\"blob.version\":1688867040526336,\"content.isMain\":false,\"content.packageId\":\"SpotifyAB.SpotifyMusic_1.176.447.0_x86__zpdnekdrzrea0\",\"content.productId\":\"caac1b9d-621b-4f96-b143-e10e1397740a\",\"content.targetPlatforms\":[{\"platform.maxVersionTested\":2814750754275328,\"platform.minVersion\":2814750710366559,\"platform.target\":3}],\"content.type\":7,\"policy\":{\"category.first\":\"app\",\"category.second\":\"Music\",\"optOut.backupRestore\":true,\"optOut.removeableMedia\":false},\"policy2\":{\"ageRating\":3,\"optOut.DVR\":false,\"thirdPartyAppRatings\":[{\"level\":9,\"systemId\":3},{\"le
                      Source: svchost.exe, 0000001F.00000003.445770498.0000020122F92000.00000004.00000001.sdmpString found in binary or memory: Mstrings attached\r\n\r\nLike us on Facebook: http://www.facebook.com/spotify \r\nFollow us on Twitter: http://twitter.com/spotify","SkuTitle":"Spotify - Music and Podcasts","Language":"en-us","Markets":["US","DZ","AR","AU","AT","BH","BD","BE","BR","BG","CA","CL","CN","CO","CR","HR","CY","CZ","DK","EG","EE","FI","FR","DE","GR","GT","HK","HU","IS","IN","ID","IQ","IE","IL","IT","JP","JO","KZ","KE","KW","LV","LB","LI","LT","LU","MY","MT","MR","MX","MA","NL","NZ","NG","NO","OM","PK","PE","PH","PL","PT","QA","RO","RU","SA","RS","SG","SK","SI","ZA","KR","ES","SE","CH","TW","TH","TT","TN","TR","UA","AE","GB","VN","YE","LY","LK","UY","VE","AF","AX","AL","AS","AO","AI","AQ","AG","AM","AW","BO","BQ","BA","BW","BV","IO","BN","BF","BI","KH","CM","CV","KY","CF","TD","TL","DJ","DM","DO","EC","SV","GQ","ER","ET","FK","FO","FJ","GF","PF","TF","GA","GM","GE","GH","GI","GL","GD","GP","GU","GG","GN","GW","GY","HT","HM","HN","AZ","BS","BB","BY","BZ","BJ","BM","BT","KM","CG","CD","CK","CX","CC","CI","CW","JM","SJ","JE","KI","KG","LA","LS","LR","MO","MK","MG","MW","IM","MH","MQ","MU","YT","FM","MD","MN","MS","MZ","MM","NA","NR","NP","MV","ML","NC","NI","NE","NU","NF","PW","PS","PA","PG","PY","RE","RW","BL","MF","WS","ST","SN","MP","PN","SX","SB","SO","SC","SL","GS","SH","KN","LC","PM","VC","TJ","TZ","TG","TK","TO","TM","TC","TV","UM","UG","VI","VG","WF","EH","ZM","ZW","UZ","VU","SR","SZ","AD","MC","SM","ME","VA","NEUTRAL"]}],"ProductId":"9NCBCSZSJRSB","Properties":{"FulfillmentData":{"ProductId":"9NCBCSZSJRSB","WuCategoryId":"5c353b9c-7ac7-4d27-af07-923e7d9aa2e2","PackageFamilyName":"SpotifyAB.SpotifyMusic_zpdnekdrzrea0","SkuId":"0011"},"FulfillmentType":"WindowsUpdate","FulfillmentPluginId":null,"Packages":[{"Applications":[{"ApplicationId":"Spotify"}],"Architectures":["x86"],"Capabilities":["internetClient","runFullTrust","Microsoft.storeFilter.core.notSupported_8wekyb3d8bbwe"],"ExperienceIds":[],"MaxDownloadSizeInBytes":104380919,"MaxInstallSizeInBytes":203345920,"PackageFormat":"Appx","PackageFamilyName":"SpotifyAB.SpotifyMusic_zpdnekdrzrea0","MainPackageFamilyNameForDlc":null,"PackageFullName":"SpotifyAB.SpotifyMusic_1.176.447.0_x86__zpdnekdrzrea0","PackageId":"3fbafb47-f476-4c26-4445-49acb9a726e6-X86","PackageRank":30001,"PlatformDependencies":[{"MaxTested":2814750754275328,"MinVersion":2814750710366559,"PlatformName":"Windows.Desktop"}],"PlatformDependencyXmlBlob":"{\"blob.version\":1688867040526336,\"content.isMain\":false,\"content.packageId\":\"SpotifyAB.SpotifyMusic_1.176.447.0_x86__zpdnekdrzrea0\",\"content.productId\":\"caac1b9d-621b-4f96-b143-e10e1397740a\",\"content.targetPlatforms\":[{\"platform.maxVersionTested\":2814750754275328,\"platform.minVersion\":2814750710366559,\"platform.target\":3}],\"content.type\":7,\"policy\":{\"category.first\":\"app\",\"category.second\":\"Music\",\"optOut.backupRestore\":true,\"optOut.removeableMedia\":false},\"policy2\":{\"ageRating\":3,\"optOut.DVR\":false,\"thirdPartyAppRatings\":[{\"level\":9,\"systemId\":3},{\"le
                      Source: svchost.exe, 00000006.00000002.605909216.000002862B800000.00000004.00000001.sdmp, svchost.exe, 0000001F.00000002.468338657.0000020122F00000.00000004.00000001.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
                      Source: svchost.exe, 00000006.00000002.606054502.000002862B86F000.00000004.00000001.sdmp, svchost.exe, 0000001F.00000002.468183652.00000201226F2000.00000004.00000001.sdmp, svchost.exe, 0000001F.00000003.438323248.00000201226F2000.00000004.00000001.sdmp, svchost.exe, 0000001F.00000003.438202775.00000201226F2000.00000004.00000001.sdmp, svchost.exe, 0000001F.00000003.439895742.00000201226F2000.00000004.00000001.sdmpString found in binary or memory: http://crl.ver)
                      Source: 77EC63BDA74BD0D0E0426DC8F80085060.21.drString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
                      Source: svchost.exe, 0000001F.00000003.438357353.0000020122F65000.00000004.00000001.sdmp, svchost.exe, 0000001F.00000003.438039962.0000020123403000.00000004.00000001.sdmp, svchost.exe, 0000001F.00000003.438019016.0000020123402000.00000004.00000001.sdmp, svchost.exe, 0000001F.00000003.437990261.0000020122F97000.00000004.00000001.sdmpString found in binary or memory: http://help.disneyplus.com.
                      Source: svchost.exe, 00000006.00000002.605731158.00000286262B2000.00000004.00000001.sdmp, svchost.exe, 00000006.00000003.605257783.00000286262AD000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/0
                      Source: Amcache.hve.10.drString found in binary or memory: http://upx.sf.net
                      Source: svchost.exe, 0000000E.00000002.317874297.0000027DDB213000.00000004.00000001.sdmpString found in binary or memory: http://www.bingmapsportal.com
                      Source: svchost.exe, 0000000C.00000002.780502610.000001715323D000.00000004.00000001.sdmpString found in binary or memory: https://%s.dnet.xboxlive.com
                      Source: svchost.exe, 0000000C.00000002.780502610.000001715323D000.00000004.00000001.sdmpString found in binary or memory: https://%s.xboxlive.com
                      Source: svchost.exe, 0000000C.00000002.780502610.000001715323D000.00000004.00000001.sdmpString found in binary or memory: https://activity.windows.com
                      Source: svchost.exe, 0000000E.00000003.315431600.0000027DDB260000.00000004.00000001.sdmpString found in binary or memory: https://appexmapsappupdate.blob.core.windows.net
                      Source: svchost.exe, 0000000C.00000002.780502610.000001715323D000.00000004.00000001.sdmpString found in binary or memory: https://bn2.notify.windows.com/v2/register/xplatform/device
                      Source: svchost.exe, 0000000C.00000002.780502610.000001715323D000.00000004.00000001.sdmpString found in binary or memory: https://co4-df.notify.windows.com/v2/register/xplatform/device
                      Source: svchost.exe, 0000000E.00000003.315527076.0000027DDB249000.00000004.00000001.sdmpString found in binary or memory: https://dev.ditu.live.com/REST/v1/Imagery/Copyright/
                      Source: svchost.exe, 0000000E.00000003.315431600.0000027DDB260000.00000004.00000001.sdmpString found in binary or memory: https://dev.ditu.live.com/REST/v1/Locations
                      Source: svchost.exe, 0000000E.00000002.318066079.0000027DDB23D000.00000004.00000001.sdmpString found in binary or memory: https://dev.ditu.live.com/REST/v1/Routes/
                      Source: svchost.exe, 0000000E.00000002.318216228.0000027DDB269000.00000004.00000001.sdmp, svchost.exe, 0000000E.00000003.315380905.0000027DDB267000.00000004.00000001.sdmpString found in binary or memory: https://dev.ditu.live.com/REST/v1/Transit/Stops/
                      Source: svchost.exe, 0000000E.00000003.315431600.0000027DDB260000.00000004.00000001.sdmpString found in binary or memory: https://dev.ditu.live.com/mapcontrol/logging.ashx
                      Source: svchost.exe, 0000000E.00000003.315710943.0000027DDB24F000.00000004.00000001.sdmp, svchost.exe, 0000000E.00000003.315466244.0000027DDB24D000.00000004.00000001.sdmpString found in binary or memory: https://dev.ditu.live.com/mapcontrol/mapconfiguration.ashx?name=native&v=
                      Source: svchost.exe, 0000000E.00000003.293603660.0000027DDB230000.00000004.00000001.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/JsonFilter/VenueMaps/data/
                      Source: svchost.exe, 0000000E.00000002.318066079.0000027DDB23D000.00000004.00000001.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Routes/
                      Source: svchost.exe, 0000000E.00000003.315431600.0000027DDB260000.00000004.00000001.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Routes/Driving
                      Source: svchost.exe, 0000000E.00000003.315431600.0000027DDB260000.00000004.00000001.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Routes/Transit
                      Source: svchost.exe, 0000000E.00000003.315431600.0000027DDB260000.00000004.00000001.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Routes/Walking
                      Source: svchost.exe, 0000000E.00000003.293603660.0000027DDB230000.00000004.00000001.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Traffic/Incidents/
                      Source: svchost.exe, 0000000E.00000003.315640761.0000027DDB241000.00000004.00000001.sdmp, svchost.exe, 0000000E.00000002.318084456.0000027DDB242000.00000004.00000001.sdmp, svchost.exe, 0000000E.00000003.315574324.0000027DDB240000.00000004.00000001.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Transit/Schedules/
                      Source: svchost.exe, 0000000E.00000003.315640761.0000027DDB241000.00000004.00000001.sdmp, svchost.exe, 0000000E.00000002.318084456.0000027DDB242000.00000004.00000001.sdmp, svchost.exe, 0000000E.00000003.315574324.0000027DDB240000.00000004.00000001.sdmpString found in binary or memory: https://dev.virtualearth.net/mapcontrol/HumanScaleServices/GetBubbles.ashx?n=
                      Source: svchost.exe, 0000000E.00000003.315431600.0000027DDB260000.00000004.00000001.sdmpString found in binary or memory: https://dev.virtualearth.net/mapcontrol/logging.ashx
                      Source: svchost.exe, 0000000E.00000003.315527076.0000027DDB249000.00000004.00000001.sdmp, svchost.exe, 0000000E.00000002.318111308.0000027DDB24B000.00000004.00000001.sdmp, svchost.exe, 0000000E.00000003.315574324.0000027DDB240000.00000004.00000001.sdmpString found in binary or memory: https://dev.virtualearth.net/webservices/v1/LoggingService/LoggingService.svc/Log?
                      Source: svchost.exe, 0000000E.00000003.293603660.0000027DDB230000.00000004.00000001.sdmpString found in binary or memory: https://dev.virtualearth.net/webservices/v1/LoggingService/LoggingService.svc/Log?entry=
                      Source: svchost.exe, 0000001F.00000003.438357353.0000020122F65000.00000004.00000001.sdmp, svchost.exe, 0000001F.00000003.438039962.0000020123403000.00000004.00000001.sdmp, svchost.exe, 0000001F.00000003.438019016.0000020123402000.00000004.00000001.sdmp, svchost.exe, 0000001F.00000003.437990261.0000020122F97000.00000004.00000001.sdmpString found in binary or memory: https://disneyplus.com/legal.
                      Source: svchost.exe, 0000000E.00000003.315527076.0000027DDB249000.00000004.00000001.sdmpString found in binary or memory: https://dynamic.api.tiles.ditu.live.com/odvs/gd?pv=1&r=
                      Source: svchost.exe, 0000000E.00000003.315527076.0000027DDB249000.00000004.00000001.sdmp, svchost.exe, 0000000E.00000002.318111308.0000027DDB24B000.00000004.00000001.sdmpString found in binary or memory: https://dynamic.api.tiles.ditu.live.com/odvs/gdi?pv=1&r=
                      Source: svchost.exe, 0000000E.00000003.315527076.0000027DDB249000.00000004.00000001.sdmp, svchost.exe, 0000000E.00000002.318111308.0000027DDB24B000.00000004.00000001.sdmpString found in binary or memory: https://dynamic.api.tiles.ditu.live.com/odvs/gdv?pv=1&r=
                      Source: svchost.exe, 0000000E.00000003.315466244.0000027DDB24D000.00000004.00000001.sdmpString found in binary or memory: https://dynamic.t
                      Source: svchost.exe, 0000000E.00000003.315431600.0000027DDB260000.00000004.00000001.sdmpString found in binary or memory: https://dynamic.t0.tiles.ditu.live.com/comp/gen.ashx
                      Source: svchost.exe, 0000000E.00000003.293603660.0000027DDB230000.00000004.00000001.sdmp, svchost.exe, 0000000E.00000002.318066079.0000027DDB23D000.00000004.00000001.sdmpString found in binary or memory: https://ecn.dev.virtualearth.net/REST/v1/Imagery/Copyright/
                      Source: svchost.exe, 0000000E.00000003.293603660.0000027DDB230000.00000004.00000001.sdmpString found in binary or memory: https://ecn.dev.virtualearth.net/mapcontrol/mapconfiguration.ashx?name=native&v=
                      Source: svchost.exe, 0000000E.00000002.318066079.0000027DDB23D000.00000004.00000001.sdmpString found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/comp/gen.ashx
                      Source: svchost.exe, 0000000E.00000002.318066079.0000027DDB23D000.00000004.00000001.sdmp, svchost.exe, 0000000E.00000002.317874297.0000027DDB213000.00000004.00000001.sdmpString found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gd?pv=1&r=
                      Source: svchost.exe, 0000000E.00000003.315624929.0000027DDB245000.00000004.00000001.sdmp, svchost.exe, 0000000E.00000003.315574324.0000027DDB240000.00000004.00000001.sdmpString found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdi?pv=1&r=
                      Source: svchost.exe, 0000000E.00000003.315624929.0000027DDB245000.00000004.00000001.sdmp, svchost.exe, 0000000E.00000003.315574324.0000027DDB240000.00000004.00000001.sdmpString found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdv?pv=1&r=
                      Source: svchost.exe, 0000000E.00000003.293603660.0000027DDB230000.00000004.00000001.sdmpString found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gri?pv=1&r=
                      Source: svchost.exe, 0000000E.00000003.315665164.0000027DDB239000.00000004.00000001.sdmp, svchost.exe, 0000000E.00000003.293603660.0000027DDB230000.00000004.00000001.sdmpString found in binary or memory: https://t0.ssl.ak.tiles.virtualearth.net/tiles/gen
                      Source: svchost.exe, 0000000E.00000003.315710943.0000027DDB24F000.00000004.00000001.sdmp, svchost.exe, 0000000E.00000003.315466244.0000027DDB24D000.00000004.00000001.sdmpString found in binary or memory: https://t0.tiles.ditu.live.com/tiles/gen
                      Source: svchost.exe, 0000001F.00000003.438357353.0000020122F65000.00000004.00000001.sdmp, svchost.exe, 0000001F.00000003.438039962.0000020123403000.00000004.00000001.sdmp, svchost.exe, 0000001F.00000003.438019016.0000020123402000.00000004.00000001.sdmp, svchost.exe, 0000001F.00000003.437990261.0000020122F97000.00000004.00000001.sdmpString found in binary or memory: https://www.disneyplus.com/legal/privacy-policy
                      Source: svchost.exe, 0000001F.00000003.438357353.0000020122F65000.00000004.00000001.sdmp, svchost.exe, 0000001F.00000003.438039962.0000020123403000.00000004.00000001.sdmp, svchost.exe, 0000001F.00000003.438019016.0000020123402000.00000004.00000001.sdmp, svchost.exe, 0000001F.00000003.437990261.0000020122F97000.00000004.00000001.sdmpString found in binary or memory: https://www.disneyplus.com/legal/your-california-privacy-rights
                      Source: svchost.exe, 0000001F.00000003.439771045.0000020122F86000.00000004.00000001.sdmp, svchost.exe, 0000001F.00000003.439928882.0000020123419000.00000004.00000001.sdmp, svchost.exe, 0000001F.00000003.439947599.0000020123402000.00000004.00000001.sdmpString found in binary or memory: https://www.tiktok.com/legal/report/feedback
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_10001280 recvfrom,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_10027958 GetKeyState,GetKeyState,GetKeyState,GetKeyState,SendMessageA,

                      E-Banking Fraud:

                      barindex
                      Yara detected EmotetShow sources
                      Source: Yara matchFile source: 5.2.rundll32.exe.11e0000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.rundll32.exe.1190000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.regsvr32.exe.3450000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.loaddll32.exe.2410000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.0.loaddll32.exe.2410000.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.0.loaddll32.exe.2410000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 18.2.rundll32.exe.4f10000.7.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 18.2.rundll32.exe.4ea0000.5.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.0.loaddll32.exe.2440000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.0.loaddll32.exe.2410000.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 18.2.rundll32.exe.4ee0000.6.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.710000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.710000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 19.2.rundll32.exe.1080000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.rundll32.exe.1190000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.0.loaddll32.exe.2410000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.regsvr32.exe.3450000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.rundll32.exe.5220000.6.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 19.2.rundll32.exe.1080000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 18.2.rundll32.exe.1100000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.rundll32.exe.50c0000.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.rundll32.exe.5280000.8.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 18.2.rundll32.exe.4e70000.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.loaddll32.exe.2440000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 18.2.rundll32.exe.d90000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 18.2.rundll32.exe.4ee0000.6.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 18.2.rundll32.exe.4e70000.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.rundll32.exe.5280000.8.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 18.2.rundll32.exe.1200000.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.rundll32.exe.50c0000.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.0.loaddll32.exe.2440000.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.rundll32.exe.4fe0000.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.rundll32.exe.4fe0000.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 18.2.rundll32.exe.d90000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.rundll32.exe.5250000.7.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 18.2.rundll32.exe.1200000.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.loaddll32.exe.2410000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.7d0000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 19.2.rundll32.exe.10b0000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.regsvr32.exe.3600000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.rundll32.exe.5220000.6.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 18.2.rundll32.exe.4d90000.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.rundll32.exe.50f0000.5.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.rundll32.exe.5010000.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000001.00000002.295170355.0000000002441000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.319311816.0000000004FE0000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.264232474.0000000003450000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.264445003.0000000003601000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000001.00000000.271674594.0000000002441000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.311419094.0000000000710000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.318504064.00000000011E1000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000012.00000002.317746254.0000000001101000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.319427752.00000000050C0000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000012.00000002.318779993.0000000004EE0000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.319564676.0000000005251000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000013.00000002.351346080.00000000010B1000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000012.00000002.318608097.0000000004D91000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000012.00000002.317543692.0000000000D90000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.319602388.0000000005280000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000012.00000002.317818773.0000000001200000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000001.00000000.269063962.0000000002410000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000001.00000000.269192745.0000000002441000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.319530979.0000000005220000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000001.00000002.295121036.0000000002410000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000013.00000002.351308553.0000000001080000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000001.00000000.271620291.0000000002410000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000012.00000002.318684339.0000000004E70000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.319354268.0000000005011000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000012.00000002.318831787.0000000004F11000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000012.00000002.318726166.0000000004EA1000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.311608118.00000000007D1000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.318456425.0000000001190000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.319460126.00000000050F1000.00000020.00000001.sdmp, type: MEMORY

                      System Summary:

                      barindex
                      Source: 4NBdOVqTyL.dllStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE, DLL
                      Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 5652 -ip 5652
                      Source: C:\Windows\SysWOW64\rundll32.exeFile deleted: C:\Windows\SysWOW64\Qpmpohowskn\yxodzrkk.uat:Zone.IdentifierJump to behavior
                      Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Windows\SysWOW64\Qpmpohowskn\Jump to behavior
                      Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_0245EFDD
                      Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_0244A445
                      Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_02454244
                      Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_0244E640
                      Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_0245F840
                      Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_02447442
                      Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_0245B257
                      Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_02452E5D
                      Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_02460A64
                      Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_02454A66
                      Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_02463263
                      Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_0244DE74
                      Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_0245A474
                      Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_0245DC71
                      Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_0244A871
                      Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_02447078
                      Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_02447E79
                      Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_0245567B
                      Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_02458806
                      Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_02459A01
                      Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_02457A0F
                      Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_02462009
                      Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_0244B820
                      Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_02448636
                      Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_02443431
                      Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_024480C0
                      Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_0245CAD5
                      Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_0245CCD9
                      Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_0245D8DB
                      Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_0245E4E5
                      Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_024600EF
                      Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_0244F0E9
                      Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_02463EE9
                      Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_0245BEFD
                      Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_0245A2A5
                      Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_02441CA1
                      Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_024636AA
                      Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_0244BAA9
                      Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_02453EAA
                      Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_02450EBC
                      Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_024646BD
                      Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_0244C6B8
                      Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_02450ABA
                      Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_02452142
                      Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_0244D14C
                      Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_0245654A
                      Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_0245E955
                      Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_02462D53
                      Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_0245FF58
                      Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_02457D5B
                      Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_0244F369
                      Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_02454F74
                      Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_02459774
                      Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_02455779
                      Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_02446B7A
                      Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_0245017B
                      Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_0245437A
                      Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_0244EF0C
                      Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_0245AD08
                      Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_02462B09
                      Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_0244670B
                      Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_02455515
                      Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_02455333
                      Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_02458D3D
                      Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_02441F38
                      Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_0245C5D5
                      Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_0244E7DE
                      Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_0245FBDE
                      Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_0244C5D8
                      Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_024567E6
                      Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_02459DF5
                      Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_024507F4
                      Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_02444BFC
                      Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_024585FF
                      Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_024455FF
                      Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_024527F9
                      Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_0245E1F8
                      Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_02453D85
                      Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_02456187
                      Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_02450F86
                      Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_0244238C
                      Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_0244FB8E
                      Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_02442194
                      Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_024477A3
                      Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_02458FAE
                      Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_024607AA
                      Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_0245D1BC
                      Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_0244BFBE
                      Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_024617BD
                      Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_024457B8
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_1004091B
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_100291F6
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_1002EACF
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_100403D7
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_1004250B
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_10041557
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_10035D96
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_100395A1
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_10040E5F
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_100291F6
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_1002F378
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_100403D7
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_1004250B
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_10041557
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_100395A1
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_1002F784
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_1004091B
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_1002EACF
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_1002FBA4
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_10035D96
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_10040E5F
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_1002EFA4
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_011E670B
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_011FAD08
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_011FFF58
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_011FE955
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_011F654A
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_011F2142
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_012017BD
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_011FEFDD
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_011EC5D8
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_011F85FF
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_011E91F6
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_011F7A0F
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_01202009
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_011FB257
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_011EDE74
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_011F4A66
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_011F5515
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_011EEF0C
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_011F8D3D
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_011E1F38
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_01202B09
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_011F5333
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_011F7D5B
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_011ED14C
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_011F017B
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_011E6B7A
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_011F437A
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_011F5779
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_011F9774
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_011F4F74
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_01202D53
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_011EF369
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_011E2194
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_012007AA
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_011EFB8E
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_011E238C
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_011F6187
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_011F0F86
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_011F3D85
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_011EBFBE
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_011FD1BC
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_011E57B8
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_011F8FAE
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_011E77A3
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_011EE7DE
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_011FFBDE
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_011FC5D5
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_011E55FF
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_011E4BFC
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_011F27F9
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_011FE1F8
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_011F9DF5
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_011F07F4
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_011F67E6
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_011F8806
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_011F9A01
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_011E3431
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_011EB820
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_011F2E5D
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_01203263
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_01200A64
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_011F4244
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_011EA445
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_011E7442
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_011EE640
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_011FF840
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_011F567B
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_011E7078
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_011E7E79
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_011FA474
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_011FDC71
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_011EA871
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_012036AA
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_012046BD
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_011F0EBC
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_011F0ABA
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_011EC6B8
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_011F3EAA
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_011EBAA9
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_011FA2A5
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_011E1CA1
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_011FD8DB
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_011FCCD9
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_01203EE9
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_011FCAD5
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_012000EF
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_011E80C0
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_011FBEFD
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_011EF0E9
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_011FE4E5
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: String function: 10030E38 appears 49 times
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: String function: 10030535 appears 32 times
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: String function: 10030E38 appears 55 times
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: String function: 10030535 appears 86 times
                      Source: 4NBdOVqTyL.dllStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                      Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: sfc.dll
                      Source: C:\Windows\System32\svchost.exeSection loaded: xboxlivetitleid.dll
                      Source: C:\Windows\System32\svchost.exeSection loaded: cdpsgshims.dll
                      Source: 4NBdOVqTyL.dllVirustotal: Detection: 16%
                      Source: 4NBdOVqTyL.dllReversingLabs: Detection: 16%
                      Source: 4NBdOVqTyL.dllStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                      Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                      Source: unknownProcess created: C:\Windows\System32\loaddll32.exe loaddll32.exe "C:\Users\user\Desktop\4NBdOVqTyL.dll"
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\4NBdOVqTyL.dll",#1
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\4NBdOVqTyL.dll
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\4NBdOVqTyL.dll",#1
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\4NBdOVqTyL.dll,DllRegisterServer
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
                      Source: C:\Windows\SysWOW64\regsvr32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\rundll32.exe "C:\Users\user\Desktop\4NBdOVqTyL.dll",DllRegisterServer
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k WerSvcGroup
                      Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 5652 -ip 5652
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 5652 -s 524
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe c:\windows\system32\svchost.exe -k localservice -p -s CDPSvc
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe c:\windows\system32\svchost.exe -k networkservice -p -s DoSvc
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k NetworkService -p
                      Source: unknownProcess created: C:\Windows\System32\SgrmBroker.exe C:\Windows\system32\SgrmBroker.exe
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe c:\windows\system32\svchost.exe -k localservicenetworkrestricted -p -s wscsvc
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\rundll32.exe "C:\Users\user\Desktop\4NBdOVqTyL.dll",DllRegisterServer
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Qpmpohowskn\yxodzrkk.uat",KEPxusHldvFY
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\rundll32.exe "C:\Windows\System32\Qpmpohowskn\yxodzrkk.uat",DllRegisterServer
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p
                      Source: C:\Windows\System32\svchost.exeProcess created: C:\Program Files\Windows Defender\MpCmdRun.exe "C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable
                      Source: C:\Program Files\Windows Defender\MpCmdRun.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\4NBdOVqTyL.dll",#1
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\4NBdOVqTyL.dll
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\4NBdOVqTyL.dll,DllRegisterServer
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\4NBdOVqTyL.dll",#1
                      Source: C:\Windows\SysWOW64\regsvr32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\rundll32.exe "C:\Users\user\Desktop\4NBdOVqTyL.dll",DllRegisterServer
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\rundll32.exe "C:\Users\user\Desktop\4NBdOVqTyL.dll",DllRegisterServer
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Qpmpohowskn\yxodzrkk.uat",KEPxusHldvFY
                      Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 5652 -ip 5652
                      Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 5652 -s 524
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess created: unknown unknown
                      Source: C:\Windows\System32\svchost.exeProcess created: C:\Program Files\Windows Defender\MpCmdRun.exe "C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\rundll32.exe "C:\Windows\System32\Qpmpohowskn\yxodzrkk.uat",DllRegisterServer
                      Source: C:\Windows\SysWOW64\rundll32.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32
                      Source: C:\Windows\System32\svchost.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\WER1253.tmpJump to behavior
                      Source: classification engineClassification label: mal100.troj.evad.winDLL@36/17@0/29
                      Source: C:\Windows\SysWOW64\rundll32.exeFile read: C:\Users\desktop.iniJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\4NBdOVqTyL.dll",#1
                      Source: C:\Windows\System32\conhost.exeMutant created: \BaseNamedObjects\Local\SM0:800:120:WilError_01
                      Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess5652
                      Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \BaseNamedObjects\Local\SM0:2132:64:WilError_01
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_10021183 LoadResource,LockResource,SizeofResource,
                      Source: C:\Windows\System32\svchost.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Windows\SysWOW64\rundll32.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile read: C:\Windows\System32\drivers\etc\hosts
                      Source: C:\Windows\System32\svchost.exeFile read: C:\Windows\System32\drivers\etc\hosts
                      Source: Binary string: ws2_32.pdb source: WerFault.exe, 0000000A.00000003.279991245.0000000005588000.00000004.00000040.sdmp, WerFault.exe, 0000000A.00000003.279928465.0000000005588000.00000004.00000040.sdmp
                      Source: Binary string: winspool.pdb source: WerFault.exe, 0000000A.00000003.279976362.0000000005580000.00000004.00000040.sdmp
                      Source: Binary string: wgdi32full.pdb source: WerFault.exe, 0000000A.00000003.279908980.0000000004EC1000.00000004.00000001.sdmp
                      Source: Binary string: wkernel32.pdb source: WerFault.exe, 0000000A.00000003.276091697.0000000004BA4000.00000004.00000001.sdmp, WerFault.exe, 0000000A.00000003.279908980.0000000004EC1000.00000004.00000001.sdmp
                      Source: Binary string: bcrypt.pdb source: WerFault.exe, 0000000A.00000003.279991245.0000000005588000.00000004.00000040.sdmp, WerFault.exe, 0000000A.00000003.279928465.0000000005588000.00000004.00000040.sdmp
                      Source: Binary string: sechost.pdb source: WerFault.exe, 0000000A.00000003.279919547.0000000005582000.00000004.00000040.sdmp
                      Source: Binary string: iphlpapi.pdb source: WerFault.exe, 0000000A.00000003.279991245.0000000005588000.00000004.00000040.sdmp, WerFault.exe, 0000000A.00000003.279928465.0000000005588000.00000004.00000040.sdmp
                      Source: Binary string: ucrtbase.pdb source: WerFault.exe, 0000000A.00000003.279908980.0000000004EC1000.00000004.00000001.sdmp
                      Source: Binary string: msvcrt.pdb source: WerFault.exe, 0000000A.00000003.279908980.0000000004EC1000.00000004.00000001.sdmp
                      Source: Binary string: propsys.pdb source: WerFault.exe, 0000000A.00000003.279991245.0000000005588000.00000004.00000040.sdmp, WerFault.exe, 0000000A.00000003.279928465.0000000005588000.00000004.00000040.sdmp
                      Source: Binary string: wrpcrt4.pdb source: WerFault.exe, 0000000A.00000003.279984565.0000000005585000.00000004.00000040.sdmp, WerFault.exe, 0000000A.00000003.279919547.0000000005582000.00000004.00000040.sdmp
                      Source: Binary string: wntdll.pdb source: WerFault.exe, 0000000A.00000003.279908980.0000000004EC1000.00000004.00000001.sdmp
                      Source: Binary string: wrpcrt4.pdbk source: WerFault.exe, 0000000A.00000003.279984565.0000000005585000.00000004.00000040.sdmp, WerFault.exe, 0000000A.00000003.279919547.0000000005582000.00000004.00000040.sdmp
                      Source: Binary string: shcore.pdb source: WerFault.exe, 0000000A.00000003.279991245.0000000005588000.00000004.00000040.sdmp, WerFault.exe, 0000000A.00000003.279928465.0000000005588000.00000004.00000040.sdmp
                      Source: Binary string: wgdi32.pdb source: WerFault.exe, 0000000A.00000003.279908980.0000000004EC1000.00000004.00000001.sdmp
                      Source: Binary string: advapi32.pdb source: WerFault.exe, 0000000A.00000003.279908980.0000000004EC1000.00000004.00000001.sdmp
                      Source: Binary string: wsspicli.pdb source: WerFault.exe, 0000000A.00000003.279976362.0000000005580000.00000004.00000040.sdmp
                      Source: Binary string: Kernel.Appcore.pdb source: WerFault.exe, 0000000A.00000003.279976362.0000000005580000.00000004.00000040.sdmp
                      Source: Binary string: msvcp_win.pdb source: WerFault.exe, 0000000A.00000003.279908980.0000000004EC1000.00000004.00000001.sdmp
                      Source: Binary string: cryptbase.pdb source: WerFault.exe, 0000000A.00000003.279976362.0000000005580000.00000004.00000040.sdmp
                      Source: Binary string: wimm32.pdb source: WerFault.exe, 0000000A.00000003.279991245.0000000005588000.00000004.00000040.sdmp, WerFault.exe, 0000000A.00000003.279928465.0000000005588000.00000004.00000040.sdmp
                      Source: Binary string: wkernelbase.pdb source: WerFault.exe, 0000000A.00000003.279908980.0000000004EC1000.00000004.00000001.sdmp
                      Source: Binary string: sechost.pdbk source: WerFault.exe, 0000000A.00000003.279919547.0000000005582000.00000004.00000040.sdmp
                      Source: Binary string: shlwapi.pdb source: WerFault.exe, 0000000A.00000003.279991245.0000000005588000.00000004.00000040.sdmp, WerFault.exe, 0000000A.00000003.279928465.0000000005588000.00000004.00000040.sdmp
                      Source: Binary string: bcryptprimitives.pdb source: WerFault.exe, 0000000A.00000003.279976362.0000000005580000.00000004.00000040.sdmp
                      Source: Binary string: wwin32u.pdb source: WerFault.exe, 0000000A.00000003.279908980.0000000004EC1000.00000004.00000001.sdmp
                      Source: Binary string: combase.pdb source: WerFault.exe, 0000000A.00000003.279991245.0000000005588000.00000004.00000040.sdmp, WerFault.exe, 0000000A.00000003.279928465.0000000005588000.00000004.00000040.sdmp
                      Source: Binary string: oleaut32.pdb source: WerFault.exe, 0000000A.00000003.279991245.0000000005588000.00000004.00000040.sdmp, WerFault.exe, 0000000A.00000003.279928465.0000000005588000.00000004.00000040.sdmp
                      Source: Binary string: apphelp.pdb source: WerFault.exe, 0000000A.00000003.279908980.0000000004EC1000.00000004.00000001.sdmp
                      Source: Binary string: wuser32.pdb source: WerFault.exe, 0000000A.00000003.279908980.0000000004EC1000.00000004.00000001.sdmp
                      Source: Binary string: awnjrznCReportStore::Prune: MaxReportCount=%d MaxSizeInMb=%dRSDSwkernel32.pdb source: WerFault.exe, 0000000A.00000002.294194625.0000000002B12000.00000004.00000001.sdmp
                      Source: 4NBdOVqTyL.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                      Source: 4NBdOVqTyL.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                      Source: 4NBdOVqTyL.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                      Source: 4NBdOVqTyL.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                      Source: 4NBdOVqTyL.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
                      Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_02441195 push cs; iretd
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_1003060D push ecx; ret
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_10030E7D push ecx; ret
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_1003060D push ecx; ret
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_10030E7D push ecx; ret
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_011E1195 push cs; iretd
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_1003E278 LoadLibraryA,GetProcAddress,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,__decode_pointer,__decode_pointer,__decode_pointer,__decode_pointer,__decode_pointer,
                      Source: 4NBdOVqTyL.dllStatic PE information: real checksum: 0x970bf should be: 0x9bc74
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\4NBdOVqTyL.dll
                      Source: C:\Windows\SysWOW64\rundll32.exePE file moved: C:\Windows\SysWOW64\Qpmpohowskn\yxodzrkk.uatJump to behavior

                      Hooking and other Techniques for Hiding and Protection:

                      barindex
                      Hides that the sample has been downloaded from the Internet (zone.identifier)Show sources
                      Source: C:\Windows\SysWOW64\rundll32.exeFile opened: C:\Windows\SysWOW64\Qpmpohowskn\yxodzrkk.uat:Zone.Identifier read attributes | delete
                      Source: C:\Windows\SysWOW64\rundll32.exeFile opened: C:\Windows\SysWOW64\Rfvwwqpmezfct\nnxyp.oiy:Zone.Identifier read attributes | delete
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_100250A3 IsIconic,GetWindowPlacement,GetWindowRect,
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_1001DFC0 IsIconic,SendMessageA,GetSystemMetrics,GetSystemMetrics,GetClientRect,DrawIcon,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_100250A3 IsIconic,GetWindowPlacement,GetWindowRect,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_1001DFC0 IsIconic,SendMessageA,GetSystemMetrics,GetSystemMetrics,GetClientRect,DrawIcon,
                      Source: C:\Windows\System32\svchost.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX

                      Malware Analysis System Evasion:

                      barindex
                      Found evasive API chain (may stop execution after reading information in the PEB, e.g. number of processors)Show sources
                      Source: C:\Windows\SysWOW64\rundll32.exeEvasive API call chain: GetPEB, DecisionNodes, ExitProcess
                      Source: C:\Windows\System32\svchost.exe TID: 4808Thread sleep time: -30000s >= -30000s
                      Source: C:\Windows\System32\svchost.exe TID: 5860Thread sleep time: -30000s >= -30000s
                      Source: C:\Windows\System32\svchost.exe TID: 5828Thread sleep time: -30000s >= -30000s
                      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                      Source: C:\Windows\SysWOW64\regsvr32.exeEvasive API call chain: GetModuleFileName,DecisionNodes,Sleep
                      Source: C:\Windows\SysWOW64\regsvr32.exeEvasive API call chain: GetModuleFileName,DecisionNodes,ExitProcess
                      Source: C:\Windows\SysWOW64\rundll32.exeEvasive API call chain: GetModuleFileName,DecisionNodes,Sleep
                      Source: C:\Windows\SysWOW64\rundll32.exeEvasive API call chain: GetModuleFileName,DecisionNodes,ExitProcess
                      Source: C:\Windows\System32\svchost.exeFile opened: PhysicalDrive0
                      Source: C:\Windows\SysWOW64\regsvr32.exeAPI coverage: 5.5 %
                      Source: C:\Windows\SysWOW64\rundll32.exeAPI coverage: 5.3 %
                      Source: C:\Windows\System32\svchost.exeProcess information queried: ProcessInformation
                      Source: C:\Windows\SysWOW64\regsvr32.exeAPI call chain: ExitProcess graph end node
                      Source: C:\Windows\SysWOW64\rundll32.exeAPI call chain: ExitProcess graph end node
                      Source: C:\Windows\SysWOW64\rundll32.exeFile Volume queried: C:\ FullSizeInformation
                      Source: svchost.exe, 00000006.00000002.605605024.0000028626229000.00000004.00000001.sdmpBinary or memory string: Hyper-V RAW ?
                      Source: Amcache.hve.10.drBinary or memory string: VMware
                      Source: Amcache.hve.10.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/5&1ec51bf7&0&000000
                      Source: svchost.exe, 00000006.00000002.606037381.000002862B861000.00000004.00000001.sdmpBinary or memory string: "@Hyper-V RAW(@
                      Source: Amcache.hve.10.drBinary or memory string: @scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/5&280b647&0&000000
                      Source: Amcache.hve.10.drBinary or memory string: VMware Virtual USB Mouse
                      Source: Amcache.hve.10.drBinary or memory string: VMware, Inc.
                      Source: Amcache.hve.10.drBinary or memory string: VMware Virtual disk SCSI Disk Devicehbin
                      Source: Amcache.hve.10.drBinary or memory string: Microsoft Hyper-V Generation Counter
                      Source: Amcache.hve.10.drBinary or memory string: VMware7,1
                      Source: Amcache.hve.10.drBinary or memory string: NECVMWar VMware SATA CD00
                      Source: Amcache.hve.10.drBinary or memory string: VMware Virtual disk SCSI Disk Device
                      Source: Amcache.hve.10.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW71.00V.13989454.B64.1906190538,BiosReleaseDate:06/19/2019,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware7,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
                      Source: svchost.exe, 00000006.00000002.606008946.000002862B854000.00000004.00000001.sdmp, svchost.exe, 0000001F.00000002.468183652.00000201226F2000.00000004.00000001.sdmp, svchost.exe, 0000001F.00000003.438323248.00000201226F2000.00000004.00000001.sdmp, svchost.exe, 0000001F.00000002.468067650.0000020122670000.00000004.00000001.sdmp, svchost.exe, 0000001F.00000003.438202775.00000201226F2000.00000004.00000001.sdmp, svchost.exe, 0000001F.00000003.439895742.00000201226F2000.00000004.00000001.sdmpBinary or memory string: Hyper-V RAW
                      Source: Amcache.hve.10.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
                      Source: Amcache.hve.10.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
                      Source: Amcache.hve.10.drBinary or memory string: VMware, Inc.me
                      Source: Amcache.hve.10.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/5&280b647&0&000000
                      Source: Amcache.hve.10.drBinary or memory string: VMware-42 35 44 6e 75 85 11 47-bd a2 bb ed 21 43 9f 89
                      Source: svchost.exe, 0000000C.00000002.780502610.000001715323D000.00000004.00000001.sdmp, svchost.exe, 0000000D.00000002.780556656.00000237F9E29000.00000004.00000001.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                      Source: Amcache.hve.10.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/5&1ec51bf7&0&000000
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_1002DB0D IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_1003E278 LoadLibraryA,GetProcAddress,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,__decode_pointer,__decode_pointer,__decode_pointer,__decode_pointer,__decode_pointer,
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_10002D40 SetLastError,SetLastError,SetLastError,SetLastError,GetNativeSystemInfo,SetLastError,VirtualAlloc,VirtualAlloc,SetLastError,GetProcessHeap,HeapAlloc,VirtualFree,SetLastError,VirtualAlloc,SetLastError,
                      Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_0244F7F7 mov eax, dword ptr fs:[00000030h]
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_011EF7F7 mov eax, dword ptr fs:[00000030h]
                      Source: C:\Windows\System32\loaddll32.exeProcess queried: DebugPort
                      Source: C:\Windows\System32\loaddll32.exeProcess queried: DebugPort
                      Source: C:\Windows\System32\loaddll32.exeProcess queried: DebugPort
                      Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_0244EC31 LdrInitializeThunk,
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_1003A8D4 __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_1002DB0D IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_10032CB9 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_1003A8D4 __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_1002DB0D IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_10032CB9 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,

                      HIPS / PFW / Operating System Protection Evasion:

                      barindex
                      System process connects to network (likely due to code injection or exploit)Show sources
                      Source: C:\Windows\SysWOW64\rundll32.exeNetwork Connect: 69.16.218.101 144
                      Source: C:\Windows\SysWOW64\rundll32.exeNetwork Connect: 45.138.98.34 80
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\4NBdOVqTyL.dll",#1
                      Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 5652 -ip 5652
                      Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 5652 -s 524
                      Source: loaddll32.exe, 00000001.00000000.271456102.0000000000E60000.00000002.00020000.sdmp, loaddll32.exe, 00000001.00000000.268957280.0000000000E60000.00000002.00020000.sdmpBinary or memory string: uProgram Manager
                      Source: loaddll32.exe, 00000001.00000000.271456102.0000000000E60000.00000002.00020000.sdmp, loaddll32.exe, 00000001.00000000.268957280.0000000000E60000.00000002.00020000.sdmpBinary or memory string: Shell_TrayWnd
                      Source: loaddll32.exe, 00000001.00000000.271456102.0000000000E60000.00000002.00020000.sdmp, loaddll32.exe, 00000001.00000000.268957280.0000000000E60000.00000002.00020000.sdmpBinary or memory string: Progman
                      Source: loaddll32.exe, 00000001.00000000.271456102.0000000000E60000.00000002.00020000.sdmp, loaddll32.exe, 00000001.00000000.268957280.0000000000E60000.00000002.00020000.sdmpBinary or memory string: Progmanlock
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformation
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm VolumeInformation
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformation
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformation
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformation
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformation
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation
                      Source: C:\Windows\SysWOW64\rundll32.exeQueries volume information: C:\ VolumeInformation
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: GetLocaleInfoA,
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: __calloc_crt,__malloc_crt,__malloc_crt,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___free_lconv_mon,InterlockedDecrement,InterlockedDecrement,
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: __getptd,_LcidFromHexString,GetLocaleInfoA,
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: GetLocaleInfoA,_LcidFromHexString,_GetPrimaryLen,_strlen,
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: __getptd,_LcidFromHexString,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,_strlen,GetLocaleInfoA,_strlen,_TestDefaultLanguage,
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: GetLocaleInfoA,_LocaleUpdate::_LocaleUpdate,___ascii_strnicmp,__tolower_l,__tolower_l,
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: _LocaleUpdate::_LocaleUpdate,GetLocaleInfoW,
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: _strcpy_s,GetLocaleInfoA,__snwprintf_s,LoadLibraryA,
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLastError,GetLocaleInfoW,_malloc,GetLocaleInfoW,WideCharToMultiByte,__freea,GetLocaleInfoA,
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: ___getlocaleinfo,__malloc_crt,__calloc_crt,__calloc_crt,__calloc_crt,__calloc_crt,GetCPInfo,___crtGetStringTypeA,___crtLCMapStringA,___crtLCMapStringA,InterlockedDecrement,InterlockedDecrement,
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: __getptd,_LcidFromHexString,GetLocaleInfoA,_TestDefaultLanguage,
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: _LocaleUpdate::_LocaleUpdate,__crtGetLocaleInfoA_stat,
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: _strlen,_strlen,_GetPrimaryLen,EnumSystemLocalesA,
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: _strlen,_GetPrimaryLen,EnumSystemLocalesA,
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: __getptd,_TranslateName,_GetLcidFromLangCountry,_GetLcidFromLanguage,_TranslateName,_GetLcidFromLangCountry,_GetLcidFromLanguage,_strlen,EnumSystemLocalesA,GetUserDefaultLCID,_ProcessCodePage,IsValidCodePage,IsValidLocale,GetLocaleInfoA,_strcpy_s,__invoke_watson,GetLocaleInfoA,GetLocaleInfoA,__itoa_s,
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: ___crtGetLocaleInfoA,GetLastError,___crtGetLocaleInfoA,__calloc_crt,___crtGetLocaleInfoA,__calloc_crt,__invoke_watson,___crtGetLocaleInfoW,
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: __calloc_crt,__malloc_crt,__malloc_crt,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___free_lconv_num,InterlockedDecrement,InterlockedDecrement,InterlockedDecrement,
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: GetLocaleInfoA,GetLocaleInfoA,GetACP,
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: ___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetLocaleInfoA,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: __calloc_crt,__malloc_crt,__malloc_crt,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___free_lconv_mon,InterlockedDecrement,InterlockedDecrement,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: _strcpy_s,GetLocaleInfoA,__snwprintf_s,LoadLibraryA,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: ___getlocaleinfo,__malloc_crt,__calloc_crt,__calloc_crt,__calloc_crt,__calloc_crt,GetCPInfo,___crtGetStringTypeA,___crtLCMapStringA,___crtLCMapStringA,InterlockedDecrement,InterlockedDecrement,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: ___crtGetLocaleInfoA,GetLastError,___crtGetLocaleInfoA,__calloc_crt,___crtGetLocaleInfoA,__calloc_crt,__invoke_watson,___crtGetLocaleInfoW,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetLocaleInfoA,GetLocaleInfoA,GetACP,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: ___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: __getptd,_LcidFromHexString,GetLocaleInfoA,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetLocaleInfoA,_LcidFromHexString,_GetPrimaryLen,_strlen,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: __getptd,_LcidFromHexString,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,_strlen,GetLocaleInfoA,_strlen,_TestDefaultLanguage,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetLocaleInfoA,_LocaleUpdate::_LocaleUpdate,___ascii_strnicmp,__tolower_l,__tolower_l,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: _LocaleUpdate::_LocaleUpdate,GetLocaleInfoW,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLastError,GetLocaleInfoW,__alloca_probe_16,_malloc,GetLocaleInfoW,WideCharToMultiByte,__freea,GetLocaleInfoA,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: __getptd,_LcidFromHexString,GetLocaleInfoA,_TestDefaultLanguage,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: _LocaleUpdate::_LocaleUpdate,__crtGetLocaleInfoA_stat,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: _strlen,_strlen,_GetPrimaryLen,EnumSystemLocalesA,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: _strlen,_GetPrimaryLen,EnumSystemLocalesA,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: __getptd,_TranslateName,_GetLcidFromLangCountry,_GetLcidFromLanguage,_TranslateName,_GetLcidFromLangCountry,_GetLcidFromLanguage,_strlen,EnumSystemLocalesA,GetUserDefaultLCID,_ProcessCodePage,IsValidCodePage,IsValidLocale,GetLocaleInfoA,_strcpy_s,__invoke_watson,GetLocaleInfoA,GetLocaleInfoA,__itoa_s,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: __calloc_crt,__malloc_crt,__malloc_crt,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___free_lconv_num,InterlockedDecrement,InterlockedDecrement,InterlockedDecrement,
                      Source: C:\Windows\SysWOW64\rundll32.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_1003732F GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter,
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_10024F01 _memset,GetVersionExA,

                      Lowering of HIPS / PFW / Operating System Security Settings:

                      barindex
                      Changes security center settings (notifications, updates, antivirus, firewall)Show sources
                      Source: C:\Windows\System32\svchost.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center cvalJump to behavior
                      Source: C:\Windows\System32\svchost.exeWMI Queries: IWbemServices::ExecNotificationQuery - ROOT\SecurityCenter : SELECT * FROM __InstanceOperationEvent WHERE TargetInstance ISA 'AntiVirusProduct' OR TargetInstance ISA 'FirewallProduct' OR TargetInstance ISA 'AntiSpywareProduct'
                      Source: C:\Windows\System32\svchost.exeWMI Queries: IWbemServices::CreateInstanceEnum - ROOT\SecurityCenter2 : FirewallProduct
                      Source: C:\Windows\System32\svchost.exeWMI Queries: IWbemServices::CreateInstanceEnum - ROOT\SecurityCenter2 : AntiVirusProduct
                      Source: C:\Windows\System32\svchost.exeWMI Queries: IWbemServices::CreateInstanceEnum - ROOT\SecurityCenter2 : AntiSpywareProduct
                      Source: svchost.exe, 00000010.00000002.780637344.0000027F36434000.00000004.00000001.sdmpBinary or memory string: ender\MsMpeng.exe
                      Source: Amcache.hve.10.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
                      Source: svchost.exe, 00000010.00000002.780668076.0000027F3643D000.00000004.00000001.sdmpBinary or memory string: (@V%ProgramFiles%\Windows Defender\MsMpeng.exe
                      Source: svchost.exe, 00000010.00000002.780727749.0000027F36502000.00000004.00000001.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe

                      Stealing of Sensitive Information:

                      barindex
                      Yara detected EmotetShow sources
                      Source: Yara matchFile source: 5.2.rundll32.exe.11e0000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.rundll32.exe.1190000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.regsvr32.exe.3450000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.loaddll32.exe.2410000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.0.loaddll32.exe.2410000.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.0.loaddll32.exe.2410000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 18.2.rundll32.exe.4f10000.7.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 18.2.rundll32.exe.4ea0000.5.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.0.loaddll32.exe.2440000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.0.loaddll32.exe.2410000.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 18.2.rundll32.exe.4ee0000.6.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.710000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.710000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 19.2.rundll32.exe.1080000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.rundll32.exe.1190000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.0.loaddll32.exe.2410000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.regsvr32.exe.3450000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.rundll32.exe.5220000.6.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 19.2.rundll32.exe.1080000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 18.2.rundll32.exe.1100000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.rundll32.exe.50c0000.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.rundll32.exe.5280000.8.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 18.2.rundll32.exe.4e70000.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.loaddll32.exe.2440000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 18.2.rundll32.exe.d90000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 18.2.rundll32.exe.4ee0000.6.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 18.2.rundll32.exe.4e70000.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.rundll32.exe.5280000.8.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 18.2.rundll32.exe.1200000.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.rundll32.exe.50c0000.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.0.loaddll32.exe.2440000.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.rundll32.exe.4fe0000.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.rundll32.exe.4fe0000.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 18.2.rundll32.exe.d90000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.rundll32.exe.5250000.7.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 18.2.rundll32.exe.1200000.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.loaddll32.exe.2410000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.7d0000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 19.2.rundll32.exe.10b0000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.regsvr32.exe.3600000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.rundll32.exe.5220000.6.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 18.2.rundll32.exe.4d90000.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.rundll32.exe.50f0000.5.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.rundll32.exe.5010000.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000001.00000002.295170355.0000000002441000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.319311816.0000000004FE0000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.264232474.0000000003450000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.264445003.0000000003601000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000001.00000000.271674594.0000000002441000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.311419094.0000000000710000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.318504064.00000000011E1000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000012.00000002.317746254.0000000001101000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.319427752.00000000050C0000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000012.00000002.318779993.0000000004EE0000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.319564676.0000000005251000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000013.00000002.351346080.00000000010B1000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000012.00000002.318608097.0000000004D91000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000012.00000002.317543692.0000000000D90000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.319602388.0000000005280000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000012.00000002.317818773.0000000001200000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000001.00000000.269063962.0000000002410000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000001.00000000.269192745.0000000002441000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.319530979.0000000005220000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000001.00000002.295121036.0000000002410000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000013.00000002.351308553.0000000001080000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000001.00000000.271620291.0000000002410000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000012.00000002.318684339.0000000004E70000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.319354268.0000000005011000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000012.00000002.318831787.0000000004F11000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000012.00000002.318726166.0000000004EA1000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.311608118.00000000007D1000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.318456425.0000000001190000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.319460126.00000000050F1000.00000020.00000001.sdmp, type: MEMORY
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_10001160 WSAStartup,_memset,htonl,htons,socket,bind,setsockopt,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_10001160 WSAStartup,_memset,htonl,htons,socket,bind,setsockopt,

                      Mitre Att&ck Matrix

                      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                      Valid AccountsWindows Management Instrumentation1DLL Side-Loading1DLL Side-Loading1Disable or Modify Tools1Input Capture1System Time Discovery1Remote ServicesArchive Collected Data1Exfiltration Over Other Network MediumIngress Tool Transfer1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                      Default AccountsNative API12Boot or Logon Initialization ScriptsProcess Injection112Deobfuscate/Decode Files or Information1LSASS MemoryFile and Directory Discovery1Remote Desktop ProtocolInput Capture1Exfiltration Over BluetoothEncrypted Channel1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                      Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Obfuscated Files or Information2Security Account ManagerSystem Information Discovery35SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationNon-Standard Port1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                      Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)DLL Side-Loading1NTDSQuery Registry1Distributed Component Object ModelInput CaptureScheduled TransferApplication Layer Protocol1SIM Card SwapCarrier Billing Fraud
                      Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptFile Deletion1LSA SecretsSecurity Software Discovery61SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                      Replication Through Removable MediaLaunchdRc.commonRc.commonMasquerading2Cached Domain CredentialsVirtualization/Sandbox Evasion3VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                      External Remote ServicesScheduled TaskStartup ItemsStartup ItemsVirtualization/Sandbox Evasion3DCSyncProcess Discovery2Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                      Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobProcess Injection112Proc FilesystemApplication Window Discovery1Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
                      Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)Hidden Files and Directories1/etc/passwd and /etc/shadowRemote System Discovery1Software Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
                      Supply Chain CompromiseAppleScriptAt (Windows)At (Windows)Regsvr321Network SniffingProcess DiscoveryTaint Shared ContentLocal Data StagingExfiltration Over Unencrypted/Obfuscated Non-C2 ProtocolFile Transfer ProtocolsData Encrypted for Impact
                      Compromise Software Dependencies and Development ToolsWindows Command ShellCronCronRundll321Input CapturePermission Groups DiscoveryReplication Through Removable MediaRemote Data StagingExfiltration Over Physical MediumMail ProtocolsService Stop

                      Behavior Graph

                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet
                      behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 553378 Sample: 4NBdOVqTyL Startdate: 14/01/2022 Architecture: WINDOWS Score: 100 47 210.57.209.142 UNAIR-AS-IDUniversitasAirlanggaID Indonesia 2->47 49 85.214.67.203 STRATOSTRATOAGDE Germany 2->49 51 23 other IPs or domains 2->51 63 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->63 65 Found malware configuration 2->65 67 Multi AV Scanner detection for submitted file 2->67 69 3 other signatures 2->69 9 loaddll32.exe 1 2->9         started        11 svchost.exe 2->11         started        14 svchost.exe 9 1 2->14         started        17 9 other processes 2->17 signatures3 process4 dnsIp5 19 rundll32.exe 2 9->19         started        22 cmd.exe 1 9->22         started        24 regsvr32.exe 9->24         started        26 WerFault.exe 3 9 9->26         started        77 Changes security center settings (notifications, updates, antivirus, firewall) 11->77 28 MpCmdRun.exe 11->28         started        57 127.0.0.1 unknown unknown 14->57 59 192.168.2.1 unknown unknown 14->59 30 WerFault.exe 17->30         started        signatures6 process7 signatures8 71 Hides that the sample has been downloaded from the Internet (zone.identifier) 19->71 32 rundll32.exe 19->32         started        34 rundll32.exe 22->34         started        37 rundll32.exe 24->37         started        39 conhost.exe 28->39         started        process9 signatures10 41 rundll32.exe 32->41         started        61 Found evasive API chain (may stop execution after reading information in the PEB, e.g. number of processors) 34->61 45 rundll32.exe 2 34->45         started        process11 dnsIp12 53 45.138.98.34, 49769, 80 M247GB Germany 41->53 55 69.16.218.101, 49775, 8080 LIQUIDWEBUS United States 41->55 73 System process connects to network (likely due to code injection or exploit) 41->73 75 Hides that the sample has been downloaded from the Internet (zone.identifier) 45->75 signatures13

                      Screenshots

                      Thumbnails

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.

                      windows-stand

                      Antivirus, Machine Learning and Genetic Malware Detection

                      Initial Sample

                      SourceDetectionScannerLabelLink
                      4NBdOVqTyL.dll17%VirustotalBrowse
                      4NBdOVqTyL.dll16%ReversingLabs

                      Dropped Files

                      No Antivirus matches

                      Unpacked PE Files

                      SourceDetectionScannerLabelLinkDownload
                      5.2.rundll32.exe.1190000.0.unpack100%AviraHEUR/AGEN.1145233Download File
                      5.2.rundll32.exe.11e0000.1.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      18.2.rundll32.exe.4ea0000.5.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      1.0.loaddll32.exe.2410000.0.unpack100%AviraHEUR/AGEN.1145233Download File
                      18.2.rundll32.exe.4f10000.7.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      1.0.loaddll32.exe.2410000.3.unpack100%AviraHEUR/AGEN.1145233Download File
                      4.2.rundll32.exe.710000.0.unpack100%AviraHEUR/AGEN.1145233Download File
                      3.2.regsvr32.exe.3450000.0.unpack100%AviraHEUR/AGEN.1145233Download File
                      19.2.rundll32.exe.1080000.0.unpack100%AviraHEUR/AGEN.1145233Download File
                      1.0.loaddll32.exe.2440000.1.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      18.2.rundll32.exe.1100000.1.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      5.2.rundll32.exe.50c0000.4.unpack100%AviraHEUR/AGEN.1145233Download File
                      18.2.rundll32.exe.4e70000.4.unpack100%AviraHEUR/AGEN.1145233Download File
                      1.2.loaddll32.exe.2440000.1.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      18.2.rundll32.exe.4ee0000.6.unpack100%AviraHEUR/AGEN.1145233Download File
                      18.2.rundll32.exe.1200000.2.unpack100%AviraHEUR/AGEN.1145233Download File
                      5.2.rundll32.exe.5280000.8.unpack100%AviraHEUR/AGEN.1145233Download File
                      1.0.loaddll32.exe.2440000.4.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      5.2.rundll32.exe.4fe0000.2.unpack100%AviraHEUR/AGEN.1145233Download File
                      5.2.rundll32.exe.5250000.7.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      18.2.rundll32.exe.d90000.0.unpack100%AviraHEUR/AGEN.1145233Download File
                      1.2.loaddll32.exe.2410000.0.unpack100%AviraHEUR/AGEN.1145233Download File
                      4.2.rundll32.exe.7d0000.1.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      5.2.rundll32.exe.52b0000.9.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      19.2.rundll32.exe.10b0000.1.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      5.2.rundll32.exe.5220000.6.unpack100%AviraHEUR/AGEN.1145233Download File
                      3.2.regsvr32.exe.3600000.1.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      5.2.rundll32.exe.50f0000.5.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      18.2.rundll32.exe.4d90000.3.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      5.2.rundll32.exe.5010000.3.unpack100%AviraTR/Crypt.XPACK.GenDownload File

                      Domains

                      No Antivirus matches

                      URLs

                      SourceDetectionScannerLabelLink
                      https://www.disneyplus.com/legal/your-california-privacy-rights0%URL Reputationsafe
                      http://crl.ver)0%Avira URL Cloudsafe
                      https://www.tiktok.com/legal/report/feedback0%URL Reputationsafe
                      https://%s.xboxlive.com0%URL Reputationsafe
                      https://www.disneyplus.com/legal/privacy-policy0%URL Reputationsafe
                      https://dynamic.t0%URL Reputationsafe
                      https://disneyplus.com/legal.0%URL Reputationsafe
                      http://help.disneyplus.com.0%URL Reputationsafe
                      https://%s.dnet.xboxlive.com0%URL Reputationsafe

                      Domains and IPs

                      Contacted Domains

                      No contacted domains info

                      URLs from Memory and Binaries

                      NameSourceMaliciousAntivirus DetectionReputation
                      https://dynamic.t0.tiles.ditu.live.com/comp/gen.ashxsvchost.exe, 0000000E.00000003.315431600.0000027DDB260000.00000004.00000001.sdmpfalse
                        high
                        https://www.disneyplus.com/legal/your-california-privacy-rightssvchost.exe, 0000001F.00000003.438357353.0000020122F65000.00000004.00000001.sdmp, svchost.exe, 0000001F.00000003.438039962.0000020123403000.00000004.00000001.sdmp, svchost.exe, 0000001F.00000003.438019016.0000020123402000.00000004.00000001.sdmp, svchost.exe, 0000001F.00000003.437990261.0000020122F97000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdv?pv=1&r=svchost.exe, 0000000E.00000003.315624929.0000027DDB245000.00000004.00000001.sdmp, svchost.exe, 0000000E.00000003.315574324.0000027DDB240000.00000004.00000001.sdmpfalse
                          high
                          https://dev.ditu.live.com/REST/v1/Routes/svchost.exe, 0000000E.00000002.318066079.0000027DDB23D000.00000004.00000001.sdmpfalse
                            high
                            https://dev.virtualearth.net/REST/v1/Routes/Drivingsvchost.exe, 0000000E.00000003.315431600.0000027DDB260000.00000004.00000001.sdmpfalse
                              high
                              https://t0.ssl.ak.dynamic.tiles.virtualearth.net/comp/gen.ashxsvchost.exe, 0000000E.00000002.318066079.0000027DDB23D000.00000004.00000001.sdmpfalse
                                high
                                https://dev.ditu.live.com/REST/v1/Transit/Stops/svchost.exe, 0000000E.00000002.318216228.0000027DDB269000.00000004.00000001.sdmp, svchost.exe, 0000000E.00000003.315380905.0000027DDB267000.00000004.00000001.sdmpfalse
                                  high
                                  https://t0.tiles.ditu.live.com/tiles/gensvchost.exe, 0000000E.00000003.315710943.0000027DDB24F000.00000004.00000001.sdmp, svchost.exe, 0000000E.00000003.315466244.0000027DDB24D000.00000004.00000001.sdmpfalse
                                    high
                                    https://dev.virtualearth.net/REST/v1/Routes/svchost.exe, 0000000E.00000002.318066079.0000027DDB23D000.00000004.00000001.sdmpfalse
                                      high
                                      https://dev.virtualearth.net/REST/v1/Traffic/Incidents/svchost.exe, 0000000E.00000003.293603660.0000027DDB230000.00000004.00000001.sdmpfalse
                                        high
                                        https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdi?pv=1&r=svchost.exe, 0000000E.00000003.315624929.0000027DDB245000.00000004.00000001.sdmp, svchost.exe, 0000000E.00000003.315574324.0000027DDB240000.00000004.00000001.sdmpfalse
                                          high
                                          https://dev.virtualearth.net/REST/v1/Routes/Walkingsvchost.exe, 0000000E.00000003.315431600.0000027DDB260000.00000004.00000001.sdmpfalse
                                            high
                                            http://crl.ver)svchost.exe, 00000006.00000002.606054502.000002862B86F000.00000004.00000001.sdmp, svchost.exe, 0000001F.00000002.468183652.00000201226F2000.00000004.00000001.sdmp, svchost.exe, 0000001F.00000003.438323248.00000201226F2000.00000004.00000001.sdmp, svchost.exe, 0000001F.00000003.438202775.00000201226F2000.00000004.00000001.sdmp, svchost.exe, 0000001F.00000003.439895742.00000201226F2000.00000004.00000001.sdmpfalse
                                            • Avira URL Cloud: safe
                                            low
                                            https://dev.virtualearth.net/webservices/v1/LoggingService/LoggingService.svc/Log?svchost.exe, 0000000E.00000003.315527076.0000027DDB249000.00000004.00000001.sdmp, svchost.exe, 0000000E.00000002.318111308.0000027DDB24B000.00000004.00000001.sdmp, svchost.exe, 0000000E.00000003.315574324.0000027DDB240000.00000004.00000001.sdmpfalse
                                              high
                                              http://upx.sf.netAmcache.hve.10.drfalse
                                                high
                                                https://www.tiktok.com/legal/report/feedbacksvchost.exe, 0000001F.00000003.439771045.0000020122F86000.00000004.00000001.sdmp, svchost.exe, 0000001F.00000003.439928882.0000020123419000.00000004.00000001.sdmp, svchost.exe, 0000001F.00000003.439947599.0000020123402000.00000004.00000001.sdmpfalse
                                                • URL Reputation: safe
                                                unknown
                                                http://schemas.xmlsoap.org/ws/2004/0svchost.exe, 00000006.00000002.605731158.00000286262B2000.00000004.00000001.sdmp, svchost.exe, 00000006.00000003.605257783.00000286262AD000.00000004.00000001.sdmpfalse
                                                  high
                                                  https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gd?pv=1&r=svchost.exe, 0000000E.00000002.318066079.0000027DDB23D000.00000004.00000001.sdmp, svchost.exe, 0000000E.00000002.317874297.0000027DDB213000.00000004.00000001.sdmpfalse
                                                    high
                                                    https://dev.virtualearth.net/mapcontrol/HumanScaleServices/GetBubbles.ashx?n=svchost.exe, 0000000E.00000003.315640761.0000027DDB241000.00000004.00000001.sdmp, svchost.exe, 0000000E.00000002.318084456.0000027DDB242000.00000004.00000001.sdmp, svchost.exe, 0000000E.00000003.315574324.0000027DDB240000.00000004.00000001.sdmpfalse
                                                      high
                                                      https://%s.xboxlive.comsvchost.exe, 0000000C.00000002.780502610.000001715323D000.00000004.00000001.sdmpfalse
                                                      • URL Reputation: safe
                                                      low
                                                      https://dev.ditu.live.com/mapcontrol/mapconfiguration.ashx?name=native&v=svchost.exe, 0000000E.00000003.315710943.0000027DDB24F000.00000004.00000001.sdmp, svchost.exe, 0000000E.00000003.315466244.0000027DDB24D000.00000004.00000001.sdmpfalse
                                                        high
                                                        https://ecn.dev.virtualearth.net/mapcontrol/mapconfiguration.ashx?name=native&v=svchost.exe, 0000000E.00000003.293603660.0000027DDB230000.00000004.00000001.sdmpfalse
                                                          high
                                                          https://dev.virtualearth.net/mapcontrol/logging.ashxsvchost.exe, 0000000E.00000003.315431600.0000027DDB260000.00000004.00000001.sdmpfalse
                                                            high
                                                            https://dev.ditu.live.com/mapcontrol/logging.ashxsvchost.exe, 0000000E.00000003.315431600.0000027DDB260000.00000004.00000001.sdmpfalse
                                                              high
                                                              https://dev.ditu.live.com/REST/v1/Imagery/Copyright/svchost.exe, 0000000E.00000003.315527076.0000027DDB249000.00000004.00000001.sdmpfalse
                                                                high
                                                                https://dev.virtualearth.net/webservices/v1/LoggingService/LoggingService.svc/Log?entry=svchost.exe, 0000000E.00000003.293603660.0000027DDB230000.00000004.00000001.sdmpfalse
                                                                  high
                                                                  https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gri?pv=1&r=svchost.exe, 0000000E.00000003.293603660.0000027DDB230000.00000004.00000001.sdmpfalse
                                                                    high
                                                                    https://dynamic.api.tiles.ditu.live.com/odvs/gdi?pv=1&r=svchost.exe, 0000000E.00000003.315527076.0000027DDB249000.00000004.00000001.sdmp, svchost.exe, 0000000E.00000002.318111308.0000027DDB24B000.00000004.00000001.sdmpfalse
                                                                      high
                                                                      https://www.disneyplus.com/legal/privacy-policysvchost.exe, 0000001F.00000003.438357353.0000020122F65000.00000004.00000001.sdmp, svchost.exe, 0000001F.00000003.438039962.0000020123403000.00000004.00000001.sdmp, svchost.exe, 0000001F.00000003.438019016.0000020123402000.00000004.00000001.sdmp, svchost.exe, 0000001F.00000003.437990261.0000020122F97000.00000004.00000001.sdmpfalse
                                                                      • URL Reputation: safe
                                                                      unknown
                                                                      https://dev.virtualearth.net/REST/v1/JsonFilter/VenueMaps/data/svchost.exe, 0000000E.00000003.293603660.0000027DDB230000.00000004.00000001.sdmpfalse
                                                                        high
                                                                        https://dev.virtualearth.net/REST/v1/Transit/Schedules/svchost.exe, 0000000E.00000003.315640761.0000027DDB241000.00000004.00000001.sdmp, svchost.exe, 0000000E.00000002.318084456.0000027DDB242000.00000004.00000001.sdmp, svchost.exe, 0000000E.00000003.315574324.0000027DDB240000.00000004.00000001.sdmpfalse
                                                                          high
                                                                          https://dynamic.tsvchost.exe, 0000000E.00000003.315466244.0000027DDB24D000.00000004.00000001.sdmpfalse
                                                                          • URL Reputation: safe
                                                                          unknown
                                                                          https://dev.virtualearth.net/REST/v1/Routes/Transitsvchost.exe, 0000000E.00000003.315431600.0000027DDB260000.00000004.00000001.sdmpfalse
                                                                            high
                                                                            https://disneyplus.com/legal.svchost.exe, 0000001F.00000003.438357353.0000020122F65000.00000004.00000001.sdmp, svchost.exe, 0000001F.00000003.438039962.0000020123403000.00000004.00000001.sdmp, svchost.exe, 0000001F.00000003.438019016.0000020123402000.00000004.00000001.sdmp, svchost.exe, 0000001F.00000003.437990261.0000020122F97000.00000004.00000001.sdmpfalse
                                                                            • URL Reputation: safe
                                                                            unknown
                                                                            https://t0.ssl.ak.tiles.virtualearth.net/tiles/gensvchost.exe, 0000000E.00000003.315665164.0000027DDB239000.00000004.00000001.sdmp, svchost.exe, 0000000E.00000003.293603660.0000027DDB230000.00000004.00000001.sdmpfalse
                                                                              high
                                                                              https://dynamic.api.tiles.ditu.live.com/odvs/gdv?pv=1&r=svchost.exe, 0000000E.00000003.315527076.0000027DDB249000.00000004.00000001.sdmp, svchost.exe, 0000000E.00000002.318111308.0000027DDB24B000.00000004.00000001.sdmpfalse
                                                                                high
                                                                                https://activity.windows.comsvchost.exe, 0000000C.00000002.780502610.000001715323D000.00000004.00000001.sdmpfalse
                                                                                  high
                                                                                  http://www.bingmapsportal.comsvchost.exe, 0000000E.00000002.317874297.0000027DDB213000.00000004.00000001.sdmpfalse
                                                                                    high
                                                                                    https://dev.ditu.live.com/REST/v1/Locationssvchost.exe, 0000000E.00000003.315431600.0000027DDB260000.00000004.00000001.sdmpfalse
                                                                                      high
                                                                                      http://help.disneyplus.com.svchost.exe, 0000001F.00000003.438357353.0000020122F65000.00000004.00000001.sdmp, svchost.exe, 0000001F.00000003.438039962.0000020123403000.00000004.00000001.sdmp, svchost.exe, 0000001F.00000003.438019016.0000020123402000.00000004.00000001.sdmp, svchost.exe, 0000001F.00000003.437990261.0000020122F97000.00000004.00000001.sdmpfalse
                                                                                      • URL Reputation: safe
                                                                                      unknown
                                                                                      https://ecn.dev.virtualearth.net/REST/v1/Imagery/Copyright/svchost.exe, 0000000E.00000003.293603660.0000027DDB230000.00000004.00000001.sdmp, svchost.exe, 0000000E.00000002.318066079.0000027DDB23D000.00000004.00000001.sdmpfalse
                                                                                        high
                                                                                        https://%s.dnet.xboxlive.comsvchost.exe, 0000000C.00000002.780502610.000001715323D000.00000004.00000001.sdmpfalse
                                                                                        • URL Reputation: safe
                                                                                        low
                                                                                        https://dynamic.api.tiles.ditu.live.com/odvs/gd?pv=1&r=svchost.exe, 0000000E.00000003.315527076.0000027DDB249000.00000004.00000001.sdmpfalse
                                                                                          high

                                                                                          Contacted IPs

                                                                                          • No. of IPs < 25%
                                                                                          • 25% < No. of IPs < 50%
                                                                                          • 50% < No. of IPs < 75%
                                                                                          • 75% < No. of IPs

                                                                                          Public

                                                                                          IPDomainCountryFlagASNASN NameMalicious
                                                                                          207.148.81.119
                                                                                          unknownUnited States
                                                                                          20473AS-CHOOPAUStrue
                                                                                          104.131.62.48
                                                                                          unknownUnited States
                                                                                          14061DIGITALOCEAN-ASNUStrue
                                                                                          85.214.67.203
                                                                                          unknownGermany
                                                                                          6724STRATOSTRATOAGDEtrue
                                                                                          191.252.103.16
                                                                                          unknownBrazil
                                                                                          27715LocawebServicosdeInternetSABRtrue
                                                                                          168.197.250.14
                                                                                          unknownArgentina
                                                                                          264776OmarAnselmoRipollTDCNETARtrue
                                                                                          66.42.57.149
                                                                                          unknownUnited States
                                                                                          20473AS-CHOOPAUStrue
                                                                                          185.148.168.15
                                                                                          unknownGermany
                                                                                          44780EVERSCALE-ASDEtrue
                                                                                          51.210.242.234
                                                                                          unknownFrance
                                                                                          16276OVHFRtrue
                                                                                          217.182.143.207
                                                                                          unknownFrance
                                                                                          16276OVHFRtrue
                                                                                          69.16.218.101
                                                                                          unknownUnited States
                                                                                          32244LIQUIDWEBUStrue
                                                                                          159.69.237.188
                                                                                          unknownGermany
                                                                                          24940HETZNER-ASDEtrue
                                                                                          45.138.98.34
                                                                                          unknownGermany
                                                                                          9009M247GBtrue
                                                                                          116.124.128.206
                                                                                          unknownKorea Republic of
                                                                                          9318SKB-ASSKBroadbandCoLtdKRtrue
                                                                                          78.46.73.125
                                                                                          unknownGermany
                                                                                          24940HETZNER-ASDEtrue
                                                                                          37.59.209.141
                                                                                          unknownFrance
                                                                                          16276OVHFRtrue
                                                                                          210.57.209.142
                                                                                          unknownIndonesia
                                                                                          38142UNAIR-AS-IDUniversitasAirlanggaIDtrue
                                                                                          185.148.168.220
                                                                                          unknownGermany
                                                                                          44780EVERSCALE-ASDEtrue
                                                                                          54.37.228.122
                                                                                          unknownFrance
                                                                                          16276OVHFRtrue
                                                                                          190.90.233.66
                                                                                          unknownColombia
                                                                                          18678INTERNEXASAESPCOtrue
                                                                                          142.4.219.173
                                                                                          unknownCanada
                                                                                          16276OVHFRtrue
                                                                                          54.38.242.185
                                                                                          unknownFrance
                                                                                          16276OVHFRtrue
                                                                                          195.154.146.35
                                                                                          unknownFrance
                                                                                          12876OnlineSASFRtrue
                                                                                          195.77.239.39
                                                                                          unknownSpain
                                                                                          60493FICOSA-ASEStrue
                                                                                          78.47.204.80
                                                                                          unknownGermany
                                                                                          24940HETZNER-ASDEtrue
                                                                                          37.44.244.177
                                                                                          unknownGermany
                                                                                          47583AS-HOSTINGERLTtrue
                                                                                          62.171.178.147
                                                                                          unknownUnited Kingdom
                                                                                          51167CONTABODEtrue
                                                                                          128.199.192.135
                                                                                          unknownUnited Kingdom
                                                                                          14061DIGITALOCEAN-ASNUStrue

                                                                                          Private

                                                                                          IP
                                                                                          192.168.2.1
                                                                                          127.0.0.1

                                                                                          General Information

                                                                                          Joe Sandbox Version:34.0.0 Boulder Opal
                                                                                          Analysis ID:553378
                                                                                          Start date:14.01.2022
                                                                                          Start time:19:31:39
                                                                                          Joe Sandbox Product:CloudBasic
                                                                                          Overall analysis duration:0h 14m 50s
                                                                                          Hypervisor based Inspection enabled:false
                                                                                          Report type:light
                                                                                          Sample file name:4NBdOVqTyL (renamed file extension from none to dll)
                                                                                          Cookbook file name:default.jbs
                                                                                          Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                                                                          Number of analysed new started processes analysed:35
                                                                                          Number of new started drivers analysed:0
                                                                                          Number of existing processes analysed:0
                                                                                          Number of existing drivers analysed:0
                                                                                          Number of injected processes analysed:0
                                                                                          Technologies:
                                                                                          • HCA enabled
                                                                                          • EGA enabled
                                                                                          • HDC enabled
                                                                                          • AMSI enabled
                                                                                          Analysis Mode:default
                                                                                          Analysis stop reason:Timeout
                                                                                          Detection:MAL
                                                                                          Classification:mal100.troj.evad.winDLL@36/17@0/29
                                                                                          EGA Information:
                                                                                          • Successful, ratio: 100%
                                                                                          HDC Information:
                                                                                          • Successful, ratio: 57.3% (good quality ratio 53.9%)
                                                                                          • Quality average: 73.7%
                                                                                          • Quality standard deviation: 26.4%
                                                                                          HCA Information:
                                                                                          • Successful, ratio: 67%
                                                                                          • Number of executed functions: 0
                                                                                          • Number of non-executed functions: 0
                                                                                          Cookbook Comments:
                                                                                          • Adjust boot time
                                                                                          • Enable AMSI
                                                                                          • Override analysis time to 240s for rundll32
                                                                                          Warnings:
                                                                                          Show All
                                                                                          • Exclude process from analysis (whitelisted): audiodg.exe, BackgroundTransferHost.exe, WMIADAP.exe, backgroundTaskHost.exe, wuapihost.exe
                                                                                          • Excluded IPs from analysis (whitelisted): 23.3.108.67, 8.238.85.254, 8.248.117.254, 8.253.145.49, 8.241.126.249, 8.248.115.254, 40.91.112.76, 20.54.110.249
                                                                                          • Excluded domains from analysis (whitelisted): client.wns.windows.com, fg.download.windowsupdate.com.c.footprint.net, displaycatalog-rp-uswest.md.mp.microsoft.com.akadns.net, fs.microsoft.com, displaycatalog-rp-europe.md.mp.microsoft.com.akadns.net, wu-shim.trafficmanager.net, neu-displaycatalogrp.useroor.bigcatalog.commerce.microsoft.com, e1723.g.akamaiedge.net, ctldl.windowsupdate.com, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, wus2-displaycatalogrp.useroor.bigcatalog.commerce.microsoft.com, arc.msn.com, ris.api.iris.microsoft.com, consumer-displaycatalogrp-aks2aks-europe.md.mp.microsoft.com.akadns.net, consumer-displaycatalogrp-aks2aks-uswest.md.mp.microsoft.com.akadns.net, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, prod.fs.microsoft.com.akadns.net, displaycatalog-rp.md.mp.microsoft.com.akadns.net
                                                                                          • Not all processes where analyzed, report is missing behavior information
                                                                                          • Report creation exceeded maximum time and may have missing disassembly code information.
                                                                                          • Report size exceeded maximum capacity and may have missing behavior information.
                                                                                          • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                                          • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                                                          • Report size getting too big, too many NtQueryValueKey calls found.

                                                                                          Simulations

                                                                                          Behavior and APIs

                                                                                          TimeTypeDescription
                                                                                          19:32:45API Interceptor10x Sleep call for process: svchost.exe modified
                                                                                          19:34:03API Interceptor1x Sleep call for process: MpCmdRun.exe modified

                                                                                          Joe Sandbox View / Context

                                                                                          IPs

                                                                                          No context

                                                                                          Domains

                                                                                          No context

                                                                                          ASN

                                                                                          No context

                                                                                          JA3 Fingerprints

                                                                                          No context

                                                                                          Dropped Files

                                                                                          No context

                                                                                          Created / dropped Files

                                                                                          C:\ProgramData\Microsoft\Network\Downloader\edb.chk
                                                                                          Process:C:\Windows\System32\svchost.exe
                                                                                          File Type:data
                                                                                          Category:dropped
                                                                                          Size (bytes):8192
                                                                                          Entropy (8bit):0.3593198815979092
                                                                                          Encrypted:false
                                                                                          SSDEEP:12:SnaaD0JcaaD0JwQQU2naaD0JcaaD0JwQQU:4tgJctgJw/tgJctgJw
                                                                                          MD5:BF1DC7D5D8DAD7478F426DF8B3F8BAA6
                                                                                          SHA1:C6B0BDE788F553F865D65F773D8F6A3546887E42
                                                                                          SHA-256:BE47C764C38CA7A90A345BE183F5261E89B98743B5E35989E9A8BE0DA498C0F2
                                                                                          SHA-512:00F2412AA04E09EA19A8315D80BE66D2727C713FC0F5AE6A9334BABA539817F568A98CA3A45B2673282BDD325B8B0E2840A393A4DCFADCB16473F5EAF2AF3180
                                                                                          Malicious:false
                                                                                          Preview: .............*..........3...w..................C:\ProgramData\Microsoft\Network\Downloader\.........................................................................................................................................................................................................................C:\ProgramData\Microsoft\Network\Downloader\..........................................................................................................................................................................................................................0u..................@...@......................................................*.............................................................................................................................................................................................................................................................................................................................................................
                                                                                          C:\ProgramData\Microsoft\Network\Downloader\edb.log
                                                                                          Process:C:\Windows\System32\svchost.exe
                                                                                          File Type:MPEG-4 LOAS
                                                                                          Category:dropped
                                                                                          Size (bytes):1310720
                                                                                          Entropy (8bit):0.24944833428701443
                                                                                          Encrypted:false
                                                                                          SSDEEP:1536:BJiRdfVzkZm3lyf49uyc0ga04PdHS9LrM/oVMUdSRU4J:BJiRdwfu2SRU4J
                                                                                          MD5:55686B32674428642BBC795D959857EA
                                                                                          SHA1:D8F1BC68B500849E80E98744DFF796EF0889F274
                                                                                          SHA-256:A9CD587E2411E1AA24BBE9E2171E9CB75C047953C263320C850B36894F18D4C7
                                                                                          SHA-512:615B92A7C9C01EA1548A32C60B3A7B8BD39FE96E59A72CEF7A158ABEC9131066FBC772A8206278E53F5619A063129F458FEF8BCE63121D600E3889BD646B733E
                                                                                          Malicious:false
                                                                                          Preview: V.d.........@..@.3...w...........................3...w..................C:\ProgramData\Microsoft\Network\Downloader\.........................................................................................................................................................................................................................C:\ProgramData\Microsoft\Network\Downloader\..........................................................................................................................................................................................................................0u..................@...@.........................................d#.................................................................................................................................................................................................................................................................................................................................................
                                                                                          C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
                                                                                          Process:C:\Windows\System32\svchost.exe
                                                                                          File Type:Extensible storage engine DataBase, version 0x620, checksum 0x68df5540, page size 16384, Windows version 10.0
                                                                                          Category:dropped
                                                                                          Size (bytes):786432
                                                                                          Entropy (8bit):0.2506032826153132
                                                                                          Encrypted:false
                                                                                          SSDEEP:384:D/A+W0StseCJ48EApW0StseCJ48E2rTSjlK/ebmLerYSRSY1J2:D/fSB2nSB2RSjlK/+mLesOj1J2
                                                                                          MD5:9FC4FEC6A7BC4CEF63BFA6D9B86BB987
                                                                                          SHA1:87A4CC250167CA4D7BD0CEDBCF85CBD9248948BC
                                                                                          SHA-256:CBD67808BC18D3F7DC6476D2D7F652AD74DC2E2E5F392D88EABC62588DCEFBBB
                                                                                          SHA-512:8666F89D5A2D6C0B7048A659ACEF0C92775AD0A1FB1B08FA0243F4E02963A6B172BF4638D68C9D4D6D01974BA28B9A606AA8472C52AD80EB959BEC92326D1209
                                                                                          Malicious:false
                                                                                          Preview: h.U@... ................e.f.3...w........................).....7#...z..- ...z..h.(.....7#...z....)..............3...w...........................................................................................................B...........@...................................................................................................... ....................................................................................................................................................................................................................................................9..7#...z..................Z.t*7#...z..........................................................................................................................................................................................................................................................................................................................................................................................
                                                                                          C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
                                                                                          Process:C:\Windows\System32\svchost.exe
                                                                                          File Type:data
                                                                                          Category:dropped
                                                                                          Size (bytes):16384
                                                                                          Entropy (8bit):0.07692722651967188
                                                                                          Encrypted:false
                                                                                          SSDEEP:3:zm//T7vIFFgsWWtllDmqke1RI7/jmGtllall3Vkttlmlnl:zWrrIQWXbkeHIRXA3
                                                                                          MD5:C2B0D7F1250DD8E20FD91D401E0531E0
                                                                                          SHA1:C444C0C78C44B7158DDBCD3AD2439A7CA0D18903
                                                                                          SHA-256:33AFD3B366529D403F2946C14F39BE5190F789B9401B615680F3F4DE4A9CC36E
                                                                                          SHA-512:F180A980DC641E61C835681DFA55245A1C9078B698015655773348D2C51F4117D244C7A3304E8AEF1CA68DDB2DA7B268BECF3453583A45A36EC23746A7631AFC
                                                                                          Malicious:false
                                                                                          Preview: +.......................................3...w..- ...z..7#...z..........7#...z..7#...z...O..7#...zc.................Z.t*7#...z..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                          C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_loaddll32.exe_1c231079c1eee0bd6cde4039f77d852b16453f3a_7cac0383_0cc6464d\Report.wer
                                                                                          Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                          File Type:Little-endian UTF-16 Unicode text, with CRLF line terminators
                                                                                          Category:dropped
                                                                                          Size (bytes):65536
                                                                                          Entropy (8bit):0.7990377920593476
                                                                                          Encrypted:false
                                                                                          SSDEEP:96:qhdZtnYyny9haol7JfjpXIQcQSc6mcEUcw3/s+a+z+HbHgilVG4rmMoVazWbYLsh:onyHsieryjuq/u7sgS274ItW
                                                                                          MD5:BB4B99D405692C46A14C803E0900C7A6
                                                                                          SHA1:3AF2DEEA96C031260C2398DF0C97F29F606B1E23
                                                                                          SHA-256:0323B70581D8F7A943283C86D54FDCFAAF72AD3F2DF448FA7611E45E5F52D52A
                                                                                          SHA-512:56C93F8D4B23C4449C01111F2A69A42002B1563DB9E9AC559F0BEEE59C2113FD9F1FDEBB6F696B234AD2080B1EF7BBCB64C86A93552021A14B510F9635DA6F9C
                                                                                          Malicious:false
                                                                                          Preview: ..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.2.8.6.6.9.1.1.7.3.3.9.5.2.9.6.6.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.1.e.f.a.f.1.f.9.-.7.b.8.5.-.4.8.1.8.-.b.7.7.c.-.2.c.1.a.1.b.e.a.9.0.7.c.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.d.0.c.b.d.c.d.f.-.e.7.e.8.-.4.e.6.a.-.a.8.b.9.-.a.b.3.c.9.7.0.f.4.1.0.7.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.l.o.a.d.d.l.l.3.2...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.6.1.4.-.0.0.0.1.-.0.0.1.7.-.e.2.8.9.-.e.b.8.d.c.0.0.9.d.8.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.d.a.3.9.a.3.e.e.5.e.6.b.4.b.0.d.3.2.5.5.b.f.e.f.9.5.6.0.1.8.9.0.a.f.d.8.0.7.0.9.!.0.0.0.0.d.a.3.9.a.3.e.e.5.e.6.b.4.b.0.d.3.2.5.5.b.f.e.f.9.5.6.0.1.8.9.0.a.f.d.8.0.7.0.9.!.l.o.a.d.d.l.l.3.2...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.2.0.2.1././.1.2././.1.3.:.0.9.:.0.7.:.1.6.!.0.!.l.o.a.d.d.l.l.3.2...e.x.e.....B.o.o.t.I.d.=.4.2.9.4.
                                                                                          C:\ProgramData\Microsoft\Windows\WER\Temp\WER1253.tmp.csv
                                                                                          Process:C:\Windows\System32\svchost.exe
                                                                                          File Type:data
                                                                                          Category:dropped
                                                                                          Size (bytes):49512
                                                                                          Entropy (8bit):3.054935850860695
                                                                                          Encrypted:false
                                                                                          SSDEEP:768:fzHepRE9ffKH2YRDCqen3s+wFlLA0+Qlf:fzHepCfCH2YRDCqen3s+QlLA0Pf
                                                                                          MD5:4B8EAC1DB51195E040CCBA76EDEE61E1
                                                                                          SHA1:3AA308A718DD8D9676D0D43B731F7269778C292D
                                                                                          SHA-256:853F6BDEE9EE00C836A8CA2B73BAD763530C295CF67111A97B0FD3D6872D6A68
                                                                                          SHA-512:C5E3581F72E90C95DC94679A838B0ABFC48B4CC03383E19A74262577A2B7B320AE81440BA82B19E88884D0384B1FBA96FDCD97076726CC503D6059235564C468
                                                                                          Malicious:false
                                                                                          Preview: I.m.a.g.e.N.a.m.e.,.U.n.i.q.u.e.P.r.o.c.e.s.s.I.d.,.N.u.m.b.e.r.O.f.T.h.r.e.a.d.s.,.W.o.r.k.i.n.g.S.e.t.P.r.i.v.a.t.e.S.i.z.e.,.H.a.r.d.F.a.u.l.t.C.o.u.n.t.,.N.u.m.b.e.r.O.f.T.h.r.e.a.d.s.H.i.g.h.W.a.t.e.r.m.a.r.k.,.C.y.c.l.e.T.i.m.e.,.C.r.e.a.t.e.T.i.m.e.,.U.s.e.r.T.i.m.e.,.K.e.r.n.e.l.T.i.m.e.,.B.a.s.e.P.r.i.o.r.i.t.y.,.P.e.a.k.V.i.r.t.u.a.l.S.i.z.e.,.V.i.r.t.u.a.l.S.i.z.e.,.P.a.g.e.F.a.u.l.t.C.o.u.n.t.,.W.o.r.k.i.n.g.S.e.t.S.i.z.e.,.P.e.a.k.W.o.r.k.i.n.g.S.e.t.S.i.z.e.,.Q.u.o.t.a.P.e.a.k.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.Q.u.o.t.a.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.Q.u.o.t.a.P.e.a.k.N.o.n.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.Q.u.o.t.a.N.o.n.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.P.a.g.e.f.i.l.e.U.s.a.g.e.,.P.e.a.k.P.a.g.e.f.i.l.e.U.s.a.g.e.,.P.r.i.v.a.t.e.P.a.g.e.C.o.u.n.t.,.R.e.a.d.O.p.e.r.a.t.i.o.n.C.o.u.n.t.,.W.r.i.t.e.O.p.e.r.a.t.i.o.n.C.o.u.n.t.,.O.t.h.e.r.O.p.e.r.a.t.i.o.n.C.o.u.n.t.,.R.e.a.d.T.r.a.n.s.f.e.r.C.o.u.n.t.,.W.r.i.t.e.T.r.a.n.s.f.e.r.C.o.u.n.t.,.O.t.h.e.r.T.r.a.n.s.f.e.r.C.o.u.n.t.,.H.a.n.
                                                                                          C:\ProgramData\Microsoft\Windows\WER\Temp\WER18FB.tmp.txt
                                                                                          Process:C:\Windows\System32\svchost.exe
                                                                                          File Type:data
                                                                                          Category:dropped
                                                                                          Size (bytes):13340
                                                                                          Entropy (8bit):2.6949028084307014
                                                                                          Encrypted:false
                                                                                          SSDEEP:96:9GiZYWfJIdE9YTYkBW4BiHNUYEZjuUBtk0iFoeDkXwReoy2pcaDS5kgJIwV3:9jZDHUDXWewcaDS5kg2wV3
                                                                                          MD5:DF90D7A1471C9A47867DB77871A9435B
                                                                                          SHA1:49987F21AE601D9D235F85FF3F5152165C66DDB6
                                                                                          SHA-256:16E820472FA9BB609306FA51745C655FFE167E17BCABFFB84569CC7EA150989A
                                                                                          SHA-512:D314431CA6ACF88D26DE48AF163FD5AC760E196A108F8F537F4F83C444D6F2771974B6A6D3DBF70CA1E8596EDE9AA3B8D2EB4B60E71A237CD1E74DB243883745
                                                                                          Malicious:false
                                                                                          Preview: B...T.i.m.e.r.R.e.s.o.l.u.t.i.o.n. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1.5.6.2.5.0.....B...P.a.g.e.S.i.z.e. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4.0.9.6.....B...N.u.m.b.e.r.O.f.P.h.y.s.i.c.a.l.P.a.g.e.s. . . . . . . . . . . . . . . . . . . . . . . . . . .1.0.4.8.3.1.5.....B...L.o.w.e.s.t.P.h.y.s.i.c.a.l.P.a.g.e.N.u.m.b.e.r. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1.....B...H.i.g.h.e.s.t.P.h.y.s.i.c.a.l.P.a.g.e.N.u.m.b.e.r. . . . . . . . . . . . . . . . . . . . . . .1.3.1.0.7.1.9.....B...A.l.l.o.c.a.t.i.o.n.G.r.a.n.u.l.a.r.i.t.y. . . . . . . . . . . . . . . . . . . . . . . . . . . . .6.5.5.3.6.....B...M.i.n.i.m.u.m.U.s.e.r.M.o.d.e.A.d.d.r.e.s.s. . . . . . . . . . . . . . . . . . . . . . . . . . . .6.5.5.3.6.....B...M.a.x.i.m.u.m.U.s.e.r.M.o.d.e.A.d.d.r.e.s.s. . . . . . . . . . . . . . . . . .1.4.0.7.3.7.4.8.8.2.8.9.7.9.1.....B...A.c.t.i.v.e.P.r.o.c.e.s.s.o.r.s.A.f.f.i.n.i.t.y.M.a.s.k. . . . . . .
                                                                                          C:\ProgramData\Microsoft\Windows\WER\Temp\WER3045.tmp.dmp
                                                                                          Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                          File Type:Mini DuMP crash report, 15 streams, Sat Jan 15 03:32:54 2022, 0x1205a4 type
                                                                                          Category:dropped
                                                                                          Size (bytes):42736
                                                                                          Entropy (8bit):2.1957726440759067
                                                                                          Encrypted:false
                                                                                          SSDEEP:192:vIItv+phOImNhlj25rylw/YCvsN4g2bvA/X+KF6mrAXbn:PHICLDlw/YuM4jbvA/xK
                                                                                          MD5:29A612CE84AC47FA35E4D98A7C1C26A2
                                                                                          SHA1:BCCA78414A2AD7E0BDCBBF15AE56A65F63E1EA7C
                                                                                          SHA-256:B3D3FA09280C1C1A5558DCA693343E98D295A5E7851EEF6C9CAD5CD38088DA3D
                                                                                          SHA-512:E928C3F69203D4DDF6A8602D3C1AADB775E9D82DC22272918E680C94CEB3080B891EBE458E56BB7679EEBCE47DBD2A5190BD5822BDAAE614BC036FBF101D275F
                                                                                          Malicious:false
                                                                                          Preview: MDMP....... .......f@.a....................................$...T............%..........`.......8...........T..........................x...........d....................................................................U...........B..............GenuineIntelW...........T...........Z@.a.............................0..................P.a.c.i.f.i.c. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................P.a.c.i.f.i.c. .D.a.y.l.i.g.h.t. .T.i.m.e...........................................1.7.1.3.4...1...x.8.6.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.........................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                          C:\ProgramData\Microsoft\Windows\WER\Temp\WER367F.tmp.WERInternalMetadata.xml
                                                                                          Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                          File Type:XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
                                                                                          Category:dropped
                                                                                          Size (bytes):8346
                                                                                          Entropy (8bit):3.703109259427115
                                                                                          Encrypted:false
                                                                                          SSDEEP:192:Rrl7r3GLNiOC6vd8rZ6YgaSUgKPgmfgSwGdCpBW89bP5sfHFm:RrlsNiD6vKrZ6YtSUgKPgmfgSwpPSfo
                                                                                          MD5:6EE214D2730130B59E38960E3B18746C
                                                                                          SHA1:468D7D69E2B5613006A276879D4249354D3E45D3
                                                                                          SHA-256:6FBFF4D9451F13EDDEEE8078AC902AAB613223B9B2D537066E3D48E73E407245
                                                                                          SHA-512:CF929055C61D240A2790861CDBC4C656BC2AB04BC17B7D0C0D1E0695958E814E698A8823DE0CF7435E56C3CB86407964C69330A147D1EB40679D586FDBC1C570
                                                                                          Malicious:false
                                                                                          Preview: ..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.7.1.3.4.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.7.1.3.4...1...a.m.d.6.4.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.1.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.1.0.3.3.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.5.6.5.2.<./.P.i.d.>.......
                                                                                          C:\ProgramData\Microsoft\Windows\WER\Temp\WER3AF5.tmp.xml
                                                                                          Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                          File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                          Category:dropped
                                                                                          Size (bytes):4598
                                                                                          Entropy (8bit):4.4745270709003035
                                                                                          Encrypted:false
                                                                                          SSDEEP:48:cvIwSD8zsFJgtWI9LLWSC8Bz8fm8M4J2+hZFa+L+q84pUUKcQIcQw01d:uITffE6SNeJbeyOUKkw01d
                                                                                          MD5:7B05A9EB5BF8B4F035A087F2164F9AD9
                                                                                          SHA1:1730909832988505691C3E946BDFDC2931BD6AFB
                                                                                          SHA-256:560C858943AE6BE4B555A6A7EFAC25C981D475F824EA234184BE1FDF13A057E5
                                                                                          SHA-512:D839AB50B1C2A62CE9B1287D63E39E4B971B3CB3B7C22827932C822F56DBDAD0EF9689F3252F9C7C8579DA8EDBDAB2BBA3F41B27946B549C9D929829826837F4
                                                                                          Malicious:false
                                                                                          Preview: <?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="17134" />.. <arg nm="vercsdbld" val="1" />.. <arg nm="verqfe" val="1" />.. <arg nm="csdbld" val="1" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="1033" />.. <arg nm="geoid" val="244" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="1342843" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.1.17134.0-11.0.47" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="4096" />..
                                                                                          C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
                                                                                          Process:C:\Windows\SysWOW64\rundll32.exe
                                                                                          File Type:Microsoft Cabinet archive data, 61414 bytes, 1 file
                                                                                          Category:dropped
                                                                                          Size (bytes):61414
                                                                                          Entropy (8bit):7.995245868798237
                                                                                          Encrypted:true
                                                                                          SSDEEP:1536:EysgU6qmzixT64jYMZ8HbVPGfVDwm/xLZ9rP:wF6qmeo4eH1m9wmLvrP
                                                                                          MD5:ACAEDA60C79C6BCAC925EEB3653F45E0
                                                                                          SHA1:2AAAE490BCDACCC6172240FF1697753B37AC5578
                                                                                          SHA-256:6B0CECCF0103AFD89844761417C1D23ACC41F8AEBF3B7230765209B61EEE5658
                                                                                          SHA-512:FEAA6E7ED7DDA1583739B3E531AB5C562A222EE6ECD042690AE7DCFF966717C6E968469A7797265A11F6E899479AE0F3031E8CF5BEBE1492D5205E9C59690900
                                                                                          Malicious:false
                                                                                          Preview: MSCF............,...................I.......;w........RSNj .authroot.stl..>.(.5..CK..8T....c_.d...A.K...+.d.H..*i.RJJ.IQIR..$t)Kd.-[..T\{..ne......<.w......A..B........c...wi......D....c.0D,L........fy....Rg...=........i,3.3..Z....~^ve<...TF.*...f.zy.,...m.@.0.0...m.3..I(..+..v#...(.2....e...L..*y..V.......~U...."<ke.....l.X:Dt..R<7.5\A7L0=..T.V...IDr..8<....r&...I-.^..b.b.".Af....E.._..r.>.`;,.Hob..S.....7'..\.R$.".g..+..64..@nP.....k3...B.`.G..@D.....L.....`^...#OpW.....!....`.....rf:.}.R.@....gR.#7....l..H.#...d.Qh..3..fCX....==#..M.l..~&....[.J9.\..Ww.....Tx.%....]..a4E...q.+...#.*a..x..O..V.t..Y1!.T..`U...-...< _@...|(.....0..3.`.LU...E0.Gu.4KN....5...?.....I.p..'..........N<.d.O..dH@c1t...[w/...T....cYK.X>.0..Z.....O>..9.3.#9X.%.b...5.YK.E.V.....`./.3.._..nN]..=..M.o.F.._..z....._...gY..!Z..?l....vp.l.:.d.Z..W.....~...N.._.k...&.....$......i.F.d.....D!e.....Y..,.E..m.;.1... $.F..O.F.o_}.uG....,.%.>,.Zx.......o....c../.;....g&.....
                                                                                          C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
                                                                                          Process:C:\Windows\SysWOW64\rundll32.exe
                                                                                          File Type:data
                                                                                          Category:modified
                                                                                          Size (bytes):328
                                                                                          Entropy (8bit):3.116057753988458
                                                                                          Encrypted:false
                                                                                          SSDEEP:6:kKoVLk8SN+SkQlPlEGYRMY9z+4KlDA3RUeYlUmlUR/t:IL9kPlE99SNxAhUeYlUSA/t
                                                                                          MD5:82BFD5476A02AB3CEB5DF1B89199273E
                                                                                          SHA1:FF3097527830DCCBA32C17559010963CF7D58196
                                                                                          SHA-256:0B73615D826682F7998580900B4041A2594CE277C4BE64B28AAA2AF1B1D856AC
                                                                                          SHA-512:0B3E633FB4F28B4AB669BEB13E45EBB655F30502819216975B1684B730567840F9F8DED8EF37BB167B468ECF96C9083449CA3420DBDAD918676E361CFFF10035
                                                                                          Malicious:false
                                                                                          Preview: p...... ........+.".....(....................................................... ........q.\].......&...............h.t.t.p.:././.c.t.l.d.l...w.i.n.d.o.w.s.u.p.d.a.t.e...c.o.m./.m.s.d.o.w.n.l.o.a.d./.u.p.d.a.t.e./.v.3./.s.t.a.t.i.c./.t.r.u.s.t.e.d.r./.e.n./.a.u.t.h.r.o.o.t.s.t.l...c.a.b...".0.7.1.e.1.5.c.5.d.c.4.d.7.1.:.0."...
                                                                                          C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
                                                                                          Process:C:\Windows\System32\svchost.exe
                                                                                          File Type:ASCII text, with no line terminators
                                                                                          Category:dropped
                                                                                          Size (bytes):55
                                                                                          Entropy (8bit):4.306461250274409
                                                                                          Encrypted:false
                                                                                          SSDEEP:3:YDQRWu83XfAw2fHbY:YMRl83Xt2f7Y
                                                                                          MD5:DCA83F08D448911A14C22EBCACC5AD57
                                                                                          SHA1:91270525521B7FE0D986DB19747F47D34B6318AD
                                                                                          SHA-256:2B4B2D4A06044AD0BD2AE3287CFCBECD90B959FEB2F503AC258D7C0A235D6FE9
                                                                                          SHA-512:96F3A02DC4AE302A30A376FC7082002065C7A35ECB74573DE66254EFD701E8FD9E9D867A2C8ABEB4C482738291B715D4965A0D2412663FDF1EE6CBC0BA9FBACA
                                                                                          Malicious:false
                                                                                          Preview: {"fontSetUri":"fontset-2017-04.json","baseUri":"fonts"}
                                                                                          C:\Windows\ServiceProfiles\LocalService\AppData\Local\Temp\MpCmdRun.log
                                                                                          Process:C:\Program Files\Windows Defender\MpCmdRun.exe
                                                                                          File Type:Little-endian UTF-16 Unicode text, with CRLF, CR line terminators
                                                                                          Category:modified
                                                                                          Size (bytes):9062
                                                                                          Entropy (8bit):3.1669419155385645
                                                                                          Encrypted:false
                                                                                          SSDEEP:192:cY+38+DJDD+iDtJC+iw3+gF+O5+6tw+EStN+Ej5+u:j+s+5D+Me+X+u+M+j+l+q+u
                                                                                          MD5:6E940B12B18E836E87AB9AC520D4EE40
                                                                                          SHA1:0922F9CACAC95835DFDE82F826D431387E6E2885
                                                                                          SHA-256:25790EDB7F5805CE0154F57E32507A63461D54E50F74465D962636C1DF440D1C
                                                                                          SHA-512:FB64DC556A1B09CAB38C3F37C2F2EFD1007652B2AC665200488D7C0AB3E14185107F9407EF91EC76E2F89B14AF78F88191BF7DCF79E79B18F2A4E9FF20C7E29C
                                                                                          Malicious:false
                                                                                          Preview: ..........-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.....M.p.C.m.d.R.u.n.:. .C.o.m.m.a.n.d. .L.i.n.e.:. .".C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.W.i.n.d.o.w.s. .D.e.f.e.n.d.e.r.\.m.p.c.m.d.r.u.n...e.x.e.". .-.w.d.e.n.a.b.l.e..... .S.t.a.r.t. .T.i.m.e.:. .. T.h.u. .. J.u.n. .. 2.7. .. 2.0.1.9. .0.1.:.2.9.:.4.9.........M.p.E.n.s.u.r.e.P.r.o.c.e.s.s.M.i.t.i.g.a.t.i.o.n.P.o.l.i.c.y.:. .h.r. .=. .0.x.1.....W.D.E.n.a.b.l.e.....E.R.R.O.R.:. .M.p.W.D.E.n.a.b.l.e.(.T.R.U.E.). .f.a.i.l.e.d. .(.8.0.0.7.0.4.E.C.).....M.p.C.m.d.R.u.n.:. .E.n.d. .T.i.m.e.:. .. T.h.u. .. J.u.n. .. 2.7. .. 2.0.1.9. .0.1.:.2.9.:.4.9.....-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.............-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.
                                                                                          C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Windows\DeliveryOptimization\Logs\dosvc.20220115_033259_038.etl
                                                                                          Process:C:\Windows\System32\svchost.exe
                                                                                          File Type:data
                                                                                          Category:dropped
                                                                                          Size (bytes):12288
                                                                                          Entropy (8bit):3.7812292948230986
                                                                                          Encrypted:false
                                                                                          SSDEEP:96:eyCJCgpo+xU5pDY9D/YQECuCI2ljfkmc4l+T2/jFzjNMCk6JR9avlY5PtDUMCBl5:qxxLTo2RORCXdtrCiC9CRCRCo
                                                                                          MD5:F329110B10B665A14EA2F28B1DDC3253
                                                                                          SHA1:D3BE41460CD5DE843AF1FD4299A3CA16E8B16F39
                                                                                          SHA-256:E65CB23B920917FAE150408855C0A5D2FE79EDADB318A0D23438DF1DF5C63182
                                                                                          SHA-512:3A84C2AF9819CBC08460E46BFB59916581699F58A11CE34A85A1DABAC3A17BD69B8EEBC34566FCF68CAFF52F99F434DFA813F4D92A995C6151FEC8DBCAE31D3C
                                                                                          Malicious:false
                                                                                          Preview: .... ... ....................................... ...!...............................|...o.@......................B..............Zb... ... ..........................................@.t.z.r.e.s...d.l.l.,.-.2.1.2.......................................................@.t.z.r.e.s...d.l.l.,.-.2.1.1...........................................................N...=..... .....|R..............8.6.9.6.E.A.C.4.-.1.2.8.8.-.4.2.8.8.-.A.4.E.E.-.4.9.E.E.4.3.1.B.0.A.D.9...C.:.\.W.i.n.d.o.w.s.\.S.e.r.v.i.c.e.P.r.o.f.i.l.e.s.\.N.e.t.w.o.r.k.S.e.r.v.i.c.e.\.A.p.p.D.a.t.a.\.L.o.c.a.l.\.M.i.c.r.o.s.o.f.t.\.W.i.n.d.o.w.s.\.D.e.l.i.v.e.r.y.O.p.t.i.m.i.z.a.t.i.o.n.\.L.o.g.s.\.d.o.s.v.c...2.0.2.2.0.1.1.5._.0.3.3.2.5.9._.0.3.8...e.t.l.........P.P.....|...o.@.....................................................................................................................................................................................................................................................................
                                                                                          C:\Windows\appcompat\Programs\Amcache.hve
                                                                                          Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                          File Type:MS Windows registry file, NT/2000 or above
                                                                                          Category:dropped
                                                                                          Size (bytes):1572864
                                                                                          Entropy (8bit):4.27551128097261
                                                                                          Encrypted:false
                                                                                          SSDEEP:12288:3Z9iF6EeYumlmLYhzf9OK6dahkEkad6mWQdSdzmSuy2ijjtwOS:J8F6EeYumlmLYhE/1EC
                                                                                          MD5:85338E02E4C5D4045493B837D3142D71
                                                                                          SHA1:502265428823535B0A7F8FD98BD082B81863BD03
                                                                                          SHA-256:707584926ACB800EC190BB243CED094A93D9BC9E24AF756E44F9A8359FFA48A5
                                                                                          SHA-512:DAFC75970075C44C79974D47B94D8CA86E2F1A71E64913A1B911DEAA8068987D702EC2AE1210CFE2A429CF1865D272C9554429CB60ED299E774A9A765D100868
                                                                                          Malicious:false
                                                                                          Preview: regfW...W...p.\..,.................. ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e...4............E.4............E.....5............E.rmtm.:..............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                          C:\Windows\appcompat\Programs\Amcache.hve.LOG1
                                                                                          Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                          File Type:MS Windows registry file, NT/2000 or above
                                                                                          Category:dropped
                                                                                          Size (bytes):16384
                                                                                          Entropy (8bit):3.500054622859792
                                                                                          Encrypted:false
                                                                                          SSDEEP:192:6pNA/j1mci33B+YC5FSE02n5w3na56iS3KPtKFptQOakvWsadV:42r5+ns9SaPtSptQOa6XadV
                                                                                          MD5:4C13D5EE6A73A620C968B707DEF35488
                                                                                          SHA1:0A6241F39FDC15EE7BDE6C7AB5CC7BA2DDE5117A
                                                                                          SHA-256:A8B59C186AF456DA868CA5605AD7ED2A4F8EE67CC6BAC51F3AD3EF37C6C3DDB4
                                                                                          SHA-512:D6B032DA098050247C71C3AB3994704EC665EEF87960F168C04AF857820F0C234F5655A691BFBCEC3F978F107FC043AD7CAA28C59957A101DBF2BA55D9C560A1
                                                                                          Malicious:false
                                                                                          Preview: regfV...V...p.\..,.................. ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e...4............E.4............E.....5............E.rmtm.:......................................................................................................................................................................................................................................................................................................................................................HvLE.>......V...................oge.&..........0..............hbin................p.\..,..........nk,.i....................................... ...........................&...{ad79c032-a2ea-f756-e377-72fb9332c3ae}......nk .i........... ...........8~.............. .......Z.......................Root........lf......Root....nk .i...................................... ...............*...............DeviceCensus.......................vk..................WritePermissionsCheck.......p...

                                                                                          Static File Info

                                                                                          General

                                                                                          File type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                          Entropy (8bit):6.7675984006769445
                                                                                          TrID:
                                                                                          • Win32 Dynamic Link Library (generic) (1002004/3) 98.32%
                                                                                          • Windows Screen Saver (13104/52) 1.29%
                                                                                          • Generic Win/DOS Executable (2004/3) 0.20%
                                                                                          • DOS Executable Generic (2002/1) 0.20%
                                                                                          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                                          File name:4NBdOVqTyL.dll
                                                                                          File size:588288
                                                                                          MD5:2b23fdac0d28360136a616b2803c286f
                                                                                          SHA1:5e730fa1ccfc04c44a34fd385dadc3d03d72d9b3
                                                                                          SHA256:cd5cb5b1c82dd0f301aac47ab966f00b4abc69a24a6a8c789ee7362a2c128537
                                                                                          SHA512:5824084d2051cd5f03ffc6170ef3fc62c08e8c984ff3a3e7b8e70f7d59cab37aac1c2a7becd6925bd0f10e48d8506d51e9eaa61554bc77f0f5b307f6b34cd04e
                                                                                          SSDEEP:6144:cNU5LwA22222GgngDrDRVyYli/ci2tEGW78ODQiEmtvOSk5DKXOW14IkFxVFgY4E:x5w7YM/cYVV7EfOpOJyvnHtytFyQ
                                                                                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........m.......................................^F......^P.n....^W.t....^Y......^A......^G......^B.....Rich....................PE..L..

                                                                                          File Icon

                                                                                          Icon Hash:71b018ccc6577131

                                                                                          Static PE Info

                                                                                          General

                                                                                          Entrypoint:0x1002eaac
                                                                                          Entrypoint Section:.text
                                                                                          Digitally signed:false
                                                                                          Imagebase:0x10000000
                                                                                          Subsystem:windows gui
                                                                                          Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE, DLL
                                                                                          DLL Characteristics:
                                                                                          Time Stamp:0x61E03DE6 [Thu Jan 13 14:57:42 2022 UTC]
                                                                                          TLS Callbacks:
                                                                                          CLR (.Net) Version:
                                                                                          OS Version Major:5
                                                                                          OS Version Minor:0
                                                                                          File Version Major:5
                                                                                          File Version Minor:0
                                                                                          Subsystem Version Major:5
                                                                                          Subsystem Version Minor:0
                                                                                          Import Hash:7f57698bb210fa88a6b01b1feaf20957

                                                                                          Entrypoint Preview

                                                                                          Instruction
                                                                                          mov edi, edi
                                                                                          push ebp
                                                                                          mov ebp, esp
                                                                                          cmp dword ptr [ebp+0Ch], 01h
                                                                                          jne 00007FF42CAF7BD7h
                                                                                          call 00007FF42CB00448h
                                                                                          push dword ptr [ebp+08h]
                                                                                          mov ecx, dword ptr [ebp+10h]
                                                                                          mov edx, dword ptr [ebp+0Ch]
                                                                                          call 00007FF42CAF7AC1h
                                                                                          pop ecx
                                                                                          pop ebp
                                                                                          retn 000Ch
                                                                                          mov edi, edi
                                                                                          push ebp
                                                                                          mov ebp, esp
                                                                                          push esi
                                                                                          push edi
                                                                                          mov edi, dword ptr [ebp+10h]
                                                                                          mov eax, edi
                                                                                          sub eax, 00000000h
                                                                                          je 00007FF42CAF91BBh
                                                                                          dec eax
                                                                                          je 00007FF42CAF91A3h
                                                                                          dec eax
                                                                                          je 00007FF42CAF916Eh
                                                                                          dec eax
                                                                                          je 00007FF42CAF911Fh
                                                                                          dec eax
                                                                                          je 00007FF42CAF908Fh
                                                                                          mov ecx, dword ptr [ebp+0Ch]
                                                                                          mov eax, dword ptr [ebp+08h]
                                                                                          push ebx
                                                                                          push 00000020h
                                                                                          pop edx
                                                                                          jmp 00007FF42CAF8047h
                                                                                          mov esi, dword ptr [eax]
                                                                                          cmp esi, dword ptr [ecx]
                                                                                          je 00007FF42CAF7C4Eh
                                                                                          movzx esi, byte ptr [eax]
                                                                                          movzx ebx, byte ptr [ecx]
                                                                                          sub esi, ebx
                                                                                          je 00007FF42CAF7BE7h
                                                                                          xor ebx, ebx
                                                                                          test esi, esi
                                                                                          setnle bl
                                                                                          lea ebx, dword ptr [ebx+ebx-01h]
                                                                                          mov esi, ebx
                                                                                          test esi, esi
                                                                                          jne 00007FF42CAF803Fh
                                                                                          movzx esi, byte ptr [eax+01h]
                                                                                          movzx ebx, byte ptr [ecx+01h]
                                                                                          sub esi, ebx
                                                                                          je 00007FF42CAF7BE7h
                                                                                          xor ebx, ebx
                                                                                          test esi, esi
                                                                                          setnle bl
                                                                                          lea ebx, dword ptr [ebx+ebx-01h]
                                                                                          mov esi, ebx
                                                                                          test esi, esi
                                                                                          jne 00007FF42CAF801Eh
                                                                                          movzx esi, byte ptr [eax+02h]
                                                                                          movzx ebx, byte ptr [ecx+02h]
                                                                                          sub esi, ebx
                                                                                          je 00007FF42CAF7BE7h
                                                                                          xor ebx, ebx
                                                                                          test esi, esi
                                                                                          setnle bl
                                                                                          lea ebx, dword ptr [ebx+ebx-01h]
                                                                                          mov esi, ebx
                                                                                          test esi, esi
                                                                                          jne 00007FF42CAF7FFDh

                                                                                          Rich Headers

                                                                                          Programming Language:
                                                                                          • [ C ] VS2008 build 21022
                                                                                          • [LNK] VS2008 build 21022
                                                                                          • [ C ] VS2005 build 50727
                                                                                          • [ASM] VS2008 build 21022
                                                                                          • [IMP] VS2005 build 50727
                                                                                          • [RES] VS2008 build 21022
                                                                                          • [EXP] VS2008 build 21022
                                                                                          • [C++] VS2008 build 21022

                                                                                          Data Directories

                                                                                          NameVirtual AddressVirtual Size Is in Section
                                                                                          IMAGE_DIRECTORY_ENTRY_EXPORT0x50bc00x50.rdata
                                                                                          IMAGE_DIRECTORY_ENTRY_IMPORT0x4f5380xb4.rdata
                                                                                          IMAGE_DIRECTORY_ENTRY_RESOURCE0x890000x3410.rsrc
                                                                                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                          IMAGE_DIRECTORY_ENTRY_BASERELOC0x8d0000x415c.reloc
                                                                                          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x4bd000x40.rdata
                                                                                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                          IMAGE_DIRECTORY_ENTRY_IAT0x470000x454.rdata
                                                                                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x4f4b00x40.rdata
                                                                                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                                                                          Sections

                                                                                          NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                          .text0x10000x45bb90x45c00False0.379756804435data6.37093799262IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                                                                          .rdata0x470000x9c100x9e00False0.357347705696data5.22172135219IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                          .data0x510000x3735c0x33800False0.741035535498data6.11335979295IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                                                                                          .rsrc0x890000x34100x3600False0.306640625data4.34913645958IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                          .reloc0x8d0000x8c340x8e00False0.346308318662data4.00973830682IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                                                                                          Resources

                                                                                          NameRVASizeTypeLanguageCountry
                                                                                          RT_CURSOR0x89ac00x134dataChineseChina
                                                                                          RT_CURSOR0x89bf40xb4dataChineseChina
                                                                                          RT_CURSOR0x89ca80x134AmigaOS bitmap fontChineseChina
                                                                                          RT_CURSOR0x89ddc0x134dataChineseChina
                                                                                          RT_CURSOR0x89f100x134dataChineseChina
                                                                                          RT_CURSOR0x8a0440x134dataChineseChina
                                                                                          RT_CURSOR0x8a1780x134dataChineseChina
                                                                                          RT_CURSOR0x8a2ac0x134dataChineseChina
                                                                                          RT_CURSOR0x8a3e00x134dataChineseChina
                                                                                          RT_CURSOR0x8a5140x134dataChineseChina
                                                                                          RT_CURSOR0x8a6480x134dataChineseChina
                                                                                          RT_CURSOR0x8a77c0x134dataChineseChina
                                                                                          RT_CURSOR0x8a8b00x134AmigaOS bitmap fontChineseChina
                                                                                          RT_CURSOR0x8a9e40x134dataChineseChina
                                                                                          RT_CURSOR0x8ab180x134dataChineseChina
                                                                                          RT_CURSOR0x8ac4c0x134dataChineseChina
                                                                                          RT_BITMAP0x8ad800xb8dataChineseChina
                                                                                          RT_BITMAP0x8ae380x144dataChineseChina
                                                                                          RT_ICON0x8af7c0x2e8dBase IV DBT of @.DBF, block length 512, next free block index 40, next free block 67108992, next used block 3293332676ChineseChina
                                                                                          RT_ICON0x8b2640x128GLS_BINARY_LSB_FIRSTChineseChina
                                                                                          RT_DIALOG0x8b38c0x33cdataChineseChina
                                                                                          RT_DIALOG0x8b6c80xe2dataChineseChina
                                                                                          RT_DIALOG0x8b7ac0x34dataChineseChina
                                                                                          RT_STRING0x8b7e00x4edataChineseChina
                                                                                          RT_STRING0x8b8300x2cdataChineseChina
                                                                                          RT_STRING0x8b85c0x82dataChineseChina
                                                                                          RT_STRING0x8b8e00x1d6dataChineseChina
                                                                                          RT_STRING0x8bab80x160dataChineseChina
                                                                                          RT_STRING0x8bc180x12edataChineseChina
                                                                                          RT_STRING0x8bd480x50dataChineseChina
                                                                                          RT_STRING0x8bd980x44dataChineseChina
                                                                                          RT_STRING0x8bddc0x68dataChineseChina
                                                                                          RT_STRING0x8be440x1b8dataChineseChina
                                                                                          RT_STRING0x8bffc0x104dataChineseChina
                                                                                          RT_STRING0x8c1000x24dataChineseChina
                                                                                          RT_STRING0x8c1240x30dataChineseChina
                                                                                          RT_GROUP_CURSOR0x8c1540x22Lotus unknown worksheet or configuration, revision 0x2ChineseChina
                                                                                          RT_GROUP_CURSOR0x8c1780x14Lotus unknown worksheet or configuration, revision 0x1ChineseChina
                                                                                          RT_GROUP_CURSOR0x8c18c0x14Lotus unknown worksheet or configuration, revision 0x1ChineseChina
                                                                                          RT_GROUP_CURSOR0x8c1a00x14Lotus unknown worksheet or configuration, revision 0x1ChineseChina
                                                                                          RT_GROUP_CURSOR0x8c1b40x14Lotus unknown worksheet or configuration, revision 0x1ChineseChina
                                                                                          RT_GROUP_CURSOR0x8c1c80x14Lotus unknown worksheet or configuration, revision 0x1ChineseChina
                                                                                          RT_GROUP_CURSOR0x8c1dc0x14Lotus unknown worksheet or configuration, revision 0x1ChineseChina
                                                                                          RT_GROUP_CURSOR0x8c1f00x14Lotus unknown worksheet or configuration, revision 0x1ChineseChina
                                                                                          RT_GROUP_CURSOR0x8c2040x14Lotus unknown worksheet or configuration, revision 0x1ChineseChina
                                                                                          RT_GROUP_CURSOR0x8c2180x14Lotus unknown worksheet or configuration, revision 0x1ChineseChina
                                                                                          RT_GROUP_CURSOR0x8c22c0x14Lotus unknown worksheet or configuration, revision 0x1ChineseChina
                                                                                          RT_GROUP_CURSOR0x8c2400x14Lotus unknown worksheet or configuration, revision 0x1ChineseChina
                                                                                          RT_GROUP_CURSOR0x8c2540x14Lotus unknown worksheet or configuration, revision 0x1ChineseChina
                                                                                          RT_GROUP_CURSOR0x8c2680x14Lotus unknown worksheet or configuration, revision 0x1ChineseChina
                                                                                          RT_GROUP_CURSOR0x8c27c0x14Lotus unknown worksheet or configuration, revision 0x1ChineseChina
                                                                                          RT_GROUP_ICON0x8c2900x22dataChineseChina
                                                                                          RT_MANIFEST0x8c2b40x15aASCII text, with CRLF line terminatorsEnglishUnited States

                                                                                          Imports

                                                                                          DLLImport
                                                                                          KERNEL32.dllGetOEMCP, GetCommandLineA, RtlUnwind, ExitProcess, HeapReAlloc, RaiseException, HeapSize, TerminateProcess, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsDebuggerPresent, GetACP, IsValidCodePage, LCMapStringA, LCMapStringW, HeapCreate, HeapDestroy, GetStdHandle, GetCPInfo, GetFileType, GetStartupInfoA, FreeEnvironmentStringsA, GetEnvironmentStrings, FreeEnvironmentStringsW, GetEnvironmentStringsW, QueryPerformanceCounter, GetTickCount, GetSystemTimeAsFileTime, InitializeCriticalSectionAndSpinCount, GetConsoleCP, GetConsoleMode, GetStringTypeA, GetStringTypeW, GetUserDefaultLCID, EnumSystemLocalesA, IsValidLocale, GetLocaleInfoW, SetStdHandle, WriteConsoleA, GetConsoleOutputCP, WriteConsoleW, GetModuleHandleW, CreateFileA, GetCurrentProcess, FlushFileBuffers, SetFilePointer, WriteFile, ReadFile, InterlockedIncrement, TlsFree, LocalReAlloc, TlsSetValue, TlsAlloc, GlobalHandle, GlobalReAlloc, TlsGetValue, LocalAlloc, WritePrivateProfileStringA, GlobalFlags, EnterCriticalSection, LeaveCriticalSection, DeleteCriticalSection, InitializeCriticalSection, GlobalGetAtomNameA, GlobalFindAtomA, lstrcmpW, GetVersionExA, FormatMessageA, LocalFree, lstrlenA, InterlockedDecrement, MulDiv, MultiByteToWideChar, GlobalUnlock, GlobalFree, FreeResource, GlobalAddAtomA, GetCurrentProcessId, GetLastError, GlobalDeleteAtom, GetCurrentThread, GetCurrentThreadId, ConvertDefaultLocale, EnumResourceLanguagesA, GetModuleFileNameA, GetLocaleInfoA, WideCharToMultiByte, CompareStringA, FindResourceA, LoadResource, LockResource, SizeofResource, InterlockedExchange, GlobalLock, lstrcmpA, GlobalAlloc, GetModuleHandleA, CreateThread, CloseHandle, VirtualProtect, LoadLibraryA, VirtualAlloc, GetProcAddress, SetLastError, Sleep, IsBadReadPtr, GetProcessHeap, VirtualFree, HeapFree, HeapAlloc, FreeLibrary, VirtualQuery, SetHandleCount, GetNativeSystemInfo
                                                                                          USER32.dllLoadCursorA, GetSysColorBrush, SetWindowTextA, IsDialogMessageA, SetDlgItemTextA, GetDlgItemTextA, RegisterWindowMessageA, SendDlgItemMessageA, WinHelpA, GetCapture, GetClassLongA, GetClassNameA, SetPropA, GetPropA, RemovePropA, GetForegroundWindow, GetTopWindow, GetMessageTime, GetMessagePos, MapWindowPoints, SetMenu, SetForegroundWindow, CreateWindowExA, GetClassInfoExA, GetClassInfoA, RegisterClassA, AdjustWindowRectEx, CopyRect, PtInRect, GetDlgCtrlID, DefWindowProcA, CallWindowProcA, SetWindowLongA, SetWindowPos, SystemParametersInfoA, GetWindowPlacement, GetWindowRect, GetMenuItemID, GetMenuItemCount, GetSubMenu, UnhookWindowsHookEx, GetSysColor, EndPaint, BeginPaint, ReleaseDC, GetDC, ClientToScreen, GrayStringA, DrawTextExA, DrawTextA, TabbedTextOutA, GetWindowTextLengthA, GetWindowTextA, GetWindow, SetFocus, GetDesktopWindow, SetActiveWindow, CreateDialogIndirectParamA, DestroyWindow, IsWindow, GetDlgItem, GetNextDlgTabItem, EndDialog, SetWindowsHookExA, CallNextHookEx, GetMessageA, DestroyMenu, UpdateWindow, TranslateMessage, DispatchMessageA, GetActiveWindow, IsWindowVisible, GetKeyState, PeekMessageA, GetCursorPos, ValidateRect, GetWindowThreadProcessId, GetWindowLongA, GetLastActivePopup, IsWindowEnabled, MessageBoxA, SetCursor, PostQuitMessage, SetMenuItemBitmaps, GetMenuCheckMarkDimensions, LoadBitmapA, GetFocus, GetParent, ModifyMenuA, GetMenuState, EnableMenuItem, CheckMenuItem, SetTimer, IsIconic, KillTimer, LoadIconA, DrawIcon, GetClientRect, SendMessageA, ShowWindow, PostMessageA, GetSystemMetrics, EnableWindow, GetMenu
                                                                                          GDI32.dllGetStockObject, SelectObject, GetDeviceCaps, DeleteDC, Escape, ExtTextOutA, TextOutA, RectVisible, ScaleWindowExtEx, SetWindowExtEx, ScaleViewportExtEx, SetViewportExtEx, OffsetViewportOrgEx, CreateBitmap, PtVisible, GetObjectA, DeleteObject, GetClipBox, SetMapMode, SetTextColor, SetBkColor, RestoreDC, SaveDC, SetViewportOrgEx
                                                                                          WINSPOOL.DRVDocumentPropertiesA, ClosePrinter, OpenPrinterA
                                                                                          ADVAPI32.dllRegSetValueExA, RegCreateKeyExA, RegQueryValueA, RegOpenKeyA, RegEnumKeyA, RegDeleteKeyA, RegOpenKeyExA, RegQueryValueExA, RegCloseKey
                                                                                          SHLWAPI.dllPathFindExtensionA
                                                                                          OLEAUT32.dllVariantClear, VariantChangeType, VariantInit
                                                                                          WS2_32.dllhtons, setsockopt, sendto, htonl, bind, socket, closesocket, inet_addr, recvfrom, WSACleanup, WSAStartup

                                                                                          Exports

                                                                                          NameOrdinalAddress
                                                                                          DllRegisterServer10x1001df20

                                                                                          Possible Origin

                                                                                          Language of compilation systemCountry where language is spokenMap
                                                                                          ChineseChina
                                                                                          EnglishUnited States

                                                                                          Network Behavior

                                                                                          Snort IDS Alerts

                                                                                          TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                                                                          01/14/22-19:33:53.790552TCP2404332ET CNC Feodo Tracker Reported CnC Server TCP group 174976980192.168.2.745.138.98.34
                                                                                          01/14/22-19:33:55.023841TCP2404338ET CNC Feodo Tracker Reported CnC Server TCP group 20497758080192.168.2.769.16.218.101

                                                                                          Network Port Distribution

                                                                                          TCP Packets

                                                                                          TimestampSource PortDest PortSource IPDest IP
                                                                                          Jan 14, 2022 19:33:53.790551901 CET4976980192.168.2.745.138.98.34
                                                                                          Jan 14, 2022 19:33:53.807516098 CET804976945.138.98.34192.168.2.7
                                                                                          Jan 14, 2022 19:33:54.387993097 CET4976980192.168.2.745.138.98.34
                                                                                          Jan 14, 2022 19:33:54.405014038 CET804976945.138.98.34192.168.2.7
                                                                                          Jan 14, 2022 19:33:54.997342110 CET4976980192.168.2.745.138.98.34
                                                                                          Jan 14, 2022 19:33:55.014169931 CET804976945.138.98.34192.168.2.7
                                                                                          Jan 14, 2022 19:33:55.023840904 CET497758080192.168.2.769.16.218.101
                                                                                          Jan 14, 2022 19:33:55.156256914 CET80804977569.16.218.101192.168.2.7
                                                                                          Jan 14, 2022 19:33:55.156343937 CET497758080192.168.2.769.16.218.101
                                                                                          Jan 14, 2022 19:33:55.188642979 CET497758080192.168.2.769.16.218.101
                                                                                          Jan 14, 2022 19:33:55.319691896 CET80804977569.16.218.101192.168.2.7
                                                                                          Jan 14, 2022 19:33:55.332912922 CET80804977569.16.218.101192.168.2.7
                                                                                          Jan 14, 2022 19:33:55.332936049 CET80804977569.16.218.101192.168.2.7
                                                                                          Jan 14, 2022 19:33:55.333009005 CET497758080192.168.2.769.16.218.101
                                                                                          Jan 14, 2022 19:34:02.024776936 CET497758080192.168.2.769.16.218.101
                                                                                          Jan 14, 2022 19:34:02.155714035 CET80804977569.16.218.101192.168.2.7
                                                                                          Jan 14, 2022 19:34:02.156224012 CET80804977569.16.218.101192.168.2.7
                                                                                          Jan 14, 2022 19:34:02.156313896 CET497758080192.168.2.769.16.218.101
                                                                                          Jan 14, 2022 19:34:02.161096096 CET497758080192.168.2.769.16.218.101
                                                                                          Jan 14, 2022 19:34:02.292124987 CET80804977569.16.218.101192.168.2.7
                                                                                          Jan 14, 2022 19:34:02.802906036 CET80804977569.16.218.101192.168.2.7
                                                                                          Jan 14, 2022 19:34:02.803010941 CET497758080192.168.2.769.16.218.101
                                                                                          Jan 14, 2022 19:34:05.807691097 CET80804977569.16.218.101192.168.2.7
                                                                                          Jan 14, 2022 19:34:05.807712078 CET80804977569.16.218.101192.168.2.7
                                                                                          Jan 14, 2022 19:34:05.807784081 CET497758080192.168.2.769.16.218.101
                                                                                          Jan 14, 2022 19:35:43.740935087 CET497758080192.168.2.769.16.218.101
                                                                                          Jan 14, 2022 19:35:43.741008997 CET497758080192.168.2.769.16.218.101

                                                                                          Code Manipulations

                                                                                          Statistics

                                                                                          Behavior

                                                                                          Click to jump to process

                                                                                          System Behavior

                                                                                          General

                                                                                          Start time:19:32:42
                                                                                          Start date:14/01/2022
                                                                                          Path:C:\Windows\System32\loaddll32.exe
                                                                                          Wow64 process (32bit):true
                                                                                          Commandline:loaddll32.exe "C:\Users\user\Desktop\4NBdOVqTyL.dll"
                                                                                          Imagebase:0x210000
                                                                                          File size:116736 bytes
                                                                                          MD5 hash:7DEB5DB86C0AC789123DEC286286B938
                                                                                          Has elevated privileges:true
                                                                                          Has administrator privileges:true
                                                                                          Programmed in:C, C++ or other language
                                                                                          Yara matches:
                                                                                          • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000001.00000002.295170355.0000000002441000.00000020.00000001.sdmp, Author: Joe Security
                                                                                          • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000001.00000000.271674594.0000000002441000.00000020.00000001.sdmp, Author: Joe Security
                                                                                          • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000001.00000000.269063962.0000000002410000.00000040.00000001.sdmp, Author: Joe Security
                                                                                          • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000001.00000000.269192745.0000000002441000.00000020.00000001.sdmp, Author: Joe Security
                                                                                          • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000001.00000002.295121036.0000000002410000.00000040.00000001.sdmp, Author: Joe Security
                                                                                          • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000001.00000000.271620291.0000000002410000.00000040.00000001.sdmp, Author: Joe Security
                                                                                          Reputation:moderate

                                                                                          General

                                                                                          Start time:19:32:43
                                                                                          Start date:14/01/2022
                                                                                          Path:C:\Windows\SysWOW64\cmd.exe
                                                                                          Wow64 process (32bit):true
                                                                                          Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\4NBdOVqTyL.dll",#1
                                                                                          Imagebase:0x870000
                                                                                          File size:232960 bytes
                                                                                          MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                                                                                          Has elevated privileges:true
                                                                                          Has administrator privileges:true
                                                                                          Programmed in:C, C++ or other language
                                                                                          Reputation:high

                                                                                          General

                                                                                          Start time:19:32:43
                                                                                          Start date:14/01/2022
                                                                                          Path:C:\Windows\SysWOW64\regsvr32.exe
                                                                                          Wow64 process (32bit):true
                                                                                          Commandline:regsvr32.exe /s C:\Users\user\Desktop\4NBdOVqTyL.dll
                                                                                          Imagebase:0x250000
                                                                                          File size:20992 bytes
                                                                                          MD5 hash:426E7499F6A7346F0410DEAD0805586B
                                                                                          Has elevated privileges:true
                                                                                          Has administrator privileges:true
                                                                                          Programmed in:C, C++ or other language
                                                                                          Yara matches:
                                                                                          • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000003.00000002.264232474.0000000003450000.00000040.00000001.sdmp, Author: Joe Security
                                                                                          • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000003.00000002.264445003.0000000003601000.00000020.00000001.sdmp, Author: Joe Security
                                                                                          Reputation:high

                                                                                          General

                                                                                          Start time:19:32:43
                                                                                          Start date:14/01/2022
                                                                                          Path:C:\Windows\SysWOW64\rundll32.exe
                                                                                          Wow64 process (32bit):true
                                                                                          Commandline:rundll32.exe "C:\Users\user\Desktop\4NBdOVqTyL.dll",#1
                                                                                          Imagebase:0x1230000
                                                                                          File size:61952 bytes
                                                                                          MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                                                                                          Has elevated privileges:true
                                                                                          Has administrator privileges:true
                                                                                          Programmed in:C, C++ or other language
                                                                                          Yara matches:
                                                                                          • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000004.00000002.311419094.0000000000710000.00000040.00000001.sdmp, Author: Joe Security
                                                                                          • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000004.00000002.311608118.00000000007D1000.00000020.00000001.sdmp, Author: Joe Security
                                                                                          Reputation:high

                                                                                          General

                                                                                          Start time:19:32:44
                                                                                          Start date:14/01/2022
                                                                                          Path:C:\Windows\SysWOW64\rundll32.exe
                                                                                          Wow64 process (32bit):true
                                                                                          Commandline:rundll32.exe C:\Users\user\Desktop\4NBdOVqTyL.dll,DllRegisterServer
                                                                                          Imagebase:0x1230000
                                                                                          File size:61952 bytes
                                                                                          MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                                                                                          Has elevated privileges:true
                                                                                          Has administrator privileges:true
                                                                                          Programmed in:C, C++ or other language
                                                                                          Yara matches:
                                                                                          • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000005.00000002.319311816.0000000004FE0000.00000040.00000001.sdmp, Author: Joe Security
                                                                                          • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000005.00000002.318504064.00000000011E1000.00000020.00000001.sdmp, Author: Joe Security
                                                                                          • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000005.00000002.319427752.00000000050C0000.00000040.00000001.sdmp, Author: Joe Security
                                                                                          • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000005.00000002.319564676.0000000005251000.00000020.00000001.sdmp, Author: Joe Security
                                                                                          • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000005.00000002.319602388.0000000005280000.00000040.00000001.sdmp, Author: Joe Security
                                                                                          • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000005.00000002.319530979.0000000005220000.00000040.00000001.sdmp, Author: Joe Security
                                                                                          • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000005.00000002.319354268.0000000005011000.00000020.00000001.sdmp, Author: Joe Security
                                                                                          • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000005.00000002.318456425.0000000001190000.00000040.00000001.sdmp, Author: Joe Security
                                                                                          • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000005.00000002.319460126.00000000050F1000.00000020.00000001.sdmp, Author: Joe Security
                                                                                          Reputation:high

                                                                                          General

                                                                                          Start time:19:32:44
                                                                                          Start date:14/01/2022
                                                                                          Path:C:\Windows\System32\svchost.exe
                                                                                          Wow64 process (32bit):false
                                                                                          Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
                                                                                          Imagebase:0x7ff641cd0000
                                                                                          File size:51288 bytes
                                                                                          MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                                          Has elevated privileges:true
                                                                                          Has administrator privileges:true
                                                                                          Programmed in:C, C++ or other language
                                                                                          Reputation:high

                                                                                          General

                                                                                          Start time:19:32:45
                                                                                          Start date:14/01/2022
                                                                                          Path:C:\Windows\SysWOW64\rundll32.exe
                                                                                          Wow64 process (32bit):true
                                                                                          Commandline:C:\Windows\SysWOW64\rundll32.exe "C:\Users\user\Desktop\4NBdOVqTyL.dll",DllRegisterServer
                                                                                          Imagebase:0x1230000
                                                                                          File size:61952 bytes
                                                                                          MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                                                                                          Has elevated privileges:true
                                                                                          Has administrator privileges:true
                                                                                          Programmed in:C, C++ or other language
                                                                                          Reputation:high

                                                                                          General

                                                                                          Start time:19:32:48
                                                                                          Start date:14/01/2022
                                                                                          Path:C:\Windows\System32\svchost.exe
                                                                                          Wow64 process (32bit):false
                                                                                          Commandline:C:\Windows\System32\svchost.exe -k WerSvcGroup
                                                                                          Imagebase:0x7ff641cd0000
                                                                                          File size:51288 bytes
                                                                                          MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                                          Has elevated privileges:true
                                                                                          Has administrator privileges:true
                                                                                          Programmed in:C, C++ or other language
                                                                                          Reputation:high

                                                                                          General

                                                                                          Start time:19:32:48
                                                                                          Start date:14/01/2022
                                                                                          Path:C:\Windows\SysWOW64\WerFault.exe
                                                                                          Wow64 process (32bit):true
                                                                                          Commandline:C:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 5652 -ip 5652
                                                                                          Imagebase:0x160000
                                                                                          File size:434592 bytes
                                                                                          MD5 hash:9E2B8ACAD48ECCA55C0230D63623661B
                                                                                          Has elevated privileges:true
                                                                                          Has administrator privileges:true
                                                                                          Programmed in:C, C++ or other language
                                                                                          Reputation:high

                                                                                          General

                                                                                          Start time:19:32:51
                                                                                          Start date:14/01/2022
                                                                                          Path:C:\Windows\SysWOW64\WerFault.exe
                                                                                          Wow64 process (32bit):true
                                                                                          Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 5652 -s 524
                                                                                          Imagebase:0x160000
                                                                                          File size:434592 bytes
                                                                                          MD5 hash:9E2B8ACAD48ECCA55C0230D63623661B
                                                                                          Has elevated privileges:true
                                                                                          Has administrator privileges:true
                                                                                          Programmed in:C, C++ or other language

                                                                                          General

                                                                                          Start time:19:32:51
                                                                                          Start date:14/01/2022
                                                                                          Path:C:\Windows\System32\svchost.exe
                                                                                          Wow64 process (32bit):false
                                                                                          Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p
                                                                                          Imagebase:0x7ff641cd0000
                                                                                          File size:51288 bytes
                                                                                          MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                                          Has elevated privileges:true
                                                                                          Has administrator privileges:true
                                                                                          Programmed in:C, C++ or other language

                                                                                          General

                                                                                          Start time:19:32:54
                                                                                          Start date:14/01/2022
                                                                                          Path:C:\Windows\System32\svchost.exe
                                                                                          Wow64 process (32bit):false
                                                                                          Commandline:c:\windows\system32\svchost.exe -k localservice -p -s CDPSvc
                                                                                          Imagebase:0x7ff641cd0000
                                                                                          File size:51288 bytes
                                                                                          MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                                          Has elevated privileges:true
                                                                                          Has administrator privileges:false
                                                                                          Programmed in:C, C++ or other language

                                                                                          General

                                                                                          Start time:19:32:56
                                                                                          Start date:14/01/2022
                                                                                          Path:C:\Windows\System32\svchost.exe
                                                                                          Wow64 process (32bit):false
                                                                                          Commandline:c:\windows\system32\svchost.exe -k networkservice -p -s DoSvc
                                                                                          Imagebase:0x7ff641cd0000
                                                                                          File size:51288 bytes
                                                                                          MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                                          Has elevated privileges:true
                                                                                          Has administrator privileges:false
                                                                                          Programmed in:C, C++ or other language

                                                                                          General

                                                                                          Start time:19:32:59
                                                                                          Start date:14/01/2022
                                                                                          Path:C:\Windows\System32\svchost.exe
                                                                                          Wow64 process (32bit):false
                                                                                          Commandline:C:\Windows\System32\svchost.exe -k NetworkService -p
                                                                                          Imagebase:0x7ff641cd0000
                                                                                          File size:51288 bytes
                                                                                          MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                                          Has elevated privileges:true
                                                                                          Has administrator privileges:false
                                                                                          Programmed in:C, C++ or other language

                                                                                          General

                                                                                          Start time:19:33:01
                                                                                          Start date:14/01/2022
                                                                                          Path:C:\Windows\System32\SgrmBroker.exe
                                                                                          Wow64 process (32bit):false
                                                                                          Commandline:C:\Windows\system32\SgrmBroker.exe
                                                                                          Imagebase:0x7ff6de5a0000
                                                                                          File size:163336 bytes
                                                                                          MD5 hash:D3170A3F3A9626597EEE1888686E3EA6
                                                                                          Has elevated privileges:true
                                                                                          Has administrator privileges:true
                                                                                          Programmed in:C, C++ or other language

                                                                                          General

                                                                                          Start time:19:33:01
                                                                                          Start date:14/01/2022
                                                                                          Path:C:\Windows\System32\svchost.exe
                                                                                          Wow64 process (32bit):false
                                                                                          Commandline:c:\windows\system32\svchost.exe -k localservicenetworkrestricted -p -s wscsvc
                                                                                          Imagebase:0x7ff641cd0000
                                                                                          File size:51288 bytes
                                                                                          MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                                          Has elevated privileges:true
                                                                                          Has administrator privileges:false
                                                                                          Programmed in:C, C++ or other language

                                                                                          General

                                                                                          Start time:19:33:07
                                                                                          Start date:14/01/2022
                                                                                          Path:C:\Windows\SysWOW64\rundll32.exe
                                                                                          Wow64 process (32bit):true
                                                                                          Commandline:C:\Windows\SysWOW64\rundll32.exe "C:\Users\user\Desktop\4NBdOVqTyL.dll",DllRegisterServer
                                                                                          Imagebase:0x1230000
                                                                                          File size:61952 bytes
                                                                                          MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                                                                                          Has elevated privileges:true
                                                                                          Has administrator privileges:true
                                                                                          Programmed in:C, C++ or other language
                                                                                          Yara matches:
                                                                                          • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000012.00000002.317746254.0000000001101000.00000020.00000001.sdmp, Author: Joe Security
                                                                                          • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000012.00000002.318779993.0000000004EE0000.00000040.00000001.sdmp, Author: Joe Security
                                                                                          • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000012.00000002.318608097.0000000004D91000.00000020.00000001.sdmp, Author: Joe Security
                                                                                          • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000012.00000002.317543692.0000000000D90000.00000040.00000001.sdmp, Author: Joe Security
                                                                                          • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000012.00000002.317818773.0000000001200000.00000040.00000001.sdmp, Author: Joe Security
                                                                                          • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000012.00000002.318684339.0000000004E70000.00000040.00000001.sdmp, Author: Joe Security
                                                                                          • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000012.00000002.318831787.0000000004F11000.00000020.00000001.sdmp, Author: Joe Security
                                                                                          • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000012.00000002.318726166.0000000004EA1000.00000020.00000001.sdmp, Author: Joe Security

                                                                                          General

                                                                                          Start time:19:33:10
                                                                                          Start date:14/01/2022
                                                                                          Path:C:\Windows\SysWOW64\rundll32.exe
                                                                                          Wow64 process (32bit):true
                                                                                          Commandline:C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Qpmpohowskn\yxodzrkk.uat",KEPxusHldvFY
                                                                                          Imagebase:0x1230000
                                                                                          File size:61952 bytes
                                                                                          MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                                                                                          Has elevated privileges:true
                                                                                          Has administrator privileges:true
                                                                                          Programmed in:C, C++ or other language
                                                                                          Yara matches:
                                                                                          • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000013.00000002.351346080.00000000010B1000.00000020.00000001.sdmp, Author: Joe Security
                                                                                          • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000013.00000002.351308553.0000000001080000.00000040.00000001.sdmp, Author: Joe Security

                                                                                          General

                                                                                          Start time:19:33:14
                                                                                          Start date:14/01/2022
                                                                                          Path:C:\Windows\System32\svchost.exe
                                                                                          Wow64 process (32bit):false
                                                                                          Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p
                                                                                          Imagebase:0x7ff641cd0000
                                                                                          File size:51288 bytes
                                                                                          MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                                          Has elevated privileges:true
                                                                                          Has administrator privileges:true
                                                                                          Programmed in:C, C++ or other language

                                                                                          General

                                                                                          Start time:19:33:26
                                                                                          Start date:14/01/2022
                                                                                          Path:C:\Windows\SysWOW64\rundll32.exe
                                                                                          Wow64 process (32bit):true
                                                                                          Commandline:C:\Windows\SysWOW64\rundll32.exe "C:\Windows\System32\Qpmpohowskn\yxodzrkk.uat",DllRegisterServer
                                                                                          Imagebase:0x1230000
                                                                                          File size:61952 bytes
                                                                                          MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                                                                                          Has elevated privileges:true
                                                                                          Has administrator privileges:true
                                                                                          Programmed in:C, C++ or other language

                                                                                          General

                                                                                          Start time:19:33:43
                                                                                          Start date:14/01/2022
                                                                                          Path:C:\Windows\System32\svchost.exe
                                                                                          Wow64 process (32bit):false
                                                                                          Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p
                                                                                          Imagebase:0x7ff641cd0000
                                                                                          File size:51288 bytes
                                                                                          MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                                          Has elevated privileges:true
                                                                                          Has administrator privileges:true
                                                                                          Programmed in:C, C++ or other language

                                                                                          General

                                                                                          Start time:19:34:02
                                                                                          Start date:14/01/2022
                                                                                          Path:C:\Program Files\Windows Defender\MpCmdRun.exe
                                                                                          Wow64 process (32bit):false
                                                                                          Commandline:"C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable
                                                                                          Imagebase:0x7ff69b260000
                                                                                          File size:455656 bytes
                                                                                          MD5 hash:A267555174BFA53844371226F482B86B
                                                                                          Has elevated privileges:true
                                                                                          Has administrator privileges:false
                                                                                          Programmed in:C, C++ or other language

                                                                                          General

                                                                                          Start time:19:34:02
                                                                                          Start date:14/01/2022
                                                                                          Path:C:\Windows\System32\conhost.exe
                                                                                          Wow64 process (32bit):false
                                                                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                          Imagebase:0x7ff774ee0000
                                                                                          File size:625664 bytes
                                                                                          MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                                          Has elevated privileges:true
                                                                                          Has administrator privileges:false
                                                                                          Programmed in:C, C++ or other language

                                                                                          General

                                                                                          Start time:19:34:05
                                                                                          Start date:14/01/2022
                                                                                          Path:C:\Windows\System32\svchost.exe
                                                                                          Wow64 process (32bit):false
                                                                                          Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p
                                                                                          Imagebase:0x7ff641cd0000
                                                                                          File size:51288 bytes
                                                                                          MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                                          Has elevated privileges:true
                                                                                          Has administrator privileges:true
                                                                                          Programmed in:C, C++ or other language

                                                                                          Disassembly

                                                                                          Code Analysis

                                                                                          Reset < >