Loading ...

Play interactive tourEdit tour

Windows Analysis Report PtBIxmYbK8.dll

Overview

General Information

Sample Name:PtBIxmYbK8.dll
Analysis ID:553387
MD5:cdf3dc30cd25f5dc97c5f7b9c2d1abe5
SHA1:2e60ddf31429088419bdd186f10ff5e2d437236c
SHA256:9b571f59abe91b0684fec7bc2311225630ee92c647cd91f37847cd5f8f1dc85c
Tags:32dllexe
Infos:

Most interesting Screenshot:

Detection

Emotet
Score:96
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Multi AV Scanner detection for submitted file
Yara detected Emotet
System process connects to network (likely due to code injection or exploit)
Changes security center settings (notifications, updates, antivirus, firewall)
Sigma detected: Suspicious Call by Ordinal
C2 URLs / IPs found in malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
One or more processes crash
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query locales information (e.g. system language)
Deletes files inside the Windows folder
May sleep (evasive loops) to hinder dynamic analysis
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Uses code obfuscation techniques (call, push, ret)
Creates files inside the system directory
Internet Provider seen in connection with other malware
Detected potential crypto function
Found potential string decryption / allocating functions
Sample execution stops while process was sleeping (likely an evasion)
Found evasive API chain (may stop execution after checking a module file name)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to dynamically determine API calls
Contains functionality which may be used to detect a debugger (GetProcessHeap)
IP address seen in connection with other malware
AV process strings found (often used to terminate AV products)
PE file contains an invalid checksum
PE file contains strange resources
Tries to load missing DLLs
Contains functionality to read the PEB
Drops PE files to the windows directory (C:\Windows)
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Detected TCP or UDP traffic on non-standard ports
Checks if the current process is being debugged
Connects to several IPs in different countries
Potential key logger detected (key state polling based)
Registers a DLL
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Found large amount of non-executed APIs
Creates a process in suspended mode (likely to inject code)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)

Classification

Process Tree

  • System is w10x64
  • SgrmBroker.exe (PID: 7136 cmdline: C:\Windows\system32\SgrmBroker.exe MD5: D3170A3F3A9626597EEE1888686E3EA6)
  • svchost.exe (PID: 5272 cmdline: c:\windows\system32\svchost.exe -k localservicenetworkrestricted -p -s wscsvc MD5: 32569E403279B3FD2EDB7EBD036273FA)
    • MpCmdRun.exe (PID: 808 cmdline: "C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable MD5: A267555174BFA53844371226F482B86B)
      • conhost.exe (PID: 4848 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • loaddll32.exe (PID: 6048 cmdline: loaddll32.exe "C:\Users\user\Desktop\PtBIxmYbK8.dll" MD5: 7DEB5DB86C0AC789123DEC286286B938)
    • cmd.exe (PID: 4552 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\PtBIxmYbK8.dll",#1 MD5: F3BDBE3BB6F734E357235F4D5898582D)
      • rundll32.exe (PID: 4520 cmdline: rundll32.exe "C:\Users\user\Desktop\PtBIxmYbK8.dll",#1 MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
        • rundll32.exe (PID: 6684 cmdline: C:\Windows\SysWOW64\rundll32.exe "C:\Users\user\Desktop\PtBIxmYbK8.dll",DllRegisterServer MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
    • regsvr32.exe (PID: 4592 cmdline: regsvr32.exe /s C:\Users\user\Desktop\PtBIxmYbK8.dll MD5: 426E7499F6A7346F0410DEAD0805586B)
      • rundll32.exe (PID: 924 cmdline: C:\Windows\SysWOW64\rundll32.exe "C:\Users\user\Desktop\PtBIxmYbK8.dll",DllRegisterServer MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
    • rundll32.exe (PID: 5648 cmdline: rundll32.exe C:\Users\user\Desktop\PtBIxmYbK8.dll,DllRegisterServer MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
      • rundll32.exe (PID: 6800 cmdline: C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Mjuakgeb\fhtvflqppfnv.wdg",DvMDRtCzK MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
        • rundll32.exe (PID: 1312 cmdline: C:\Windows\SysWOW64\rundll32.exe "C:\Windows\System32\Mjuakgeb\fhtvflqppfnv.wdg",DllRegisterServer MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
    • WerFault.exe (PID: 808 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 6048 -s 512 MD5: 9E2B8ACAD48ECCA55C0230D63623661B)
  • svchost.exe (PID: 4416 cmdline: C:\Windows\System32\svchost.exe -k WerSvcGroup MD5: 32569E403279B3FD2EDB7EBD036273FA)
    • WerFault.exe (PID: 6620 cmdline: C:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 6048 -ip 6048 MD5: 9E2B8ACAD48ECCA55C0230D63623661B)
  • svchost.exe (PID: 672 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 4528 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 4324 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 5644 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • cleanup

Malware Configuration

Threatname: Emotet

{"C2 list": ["45.138.98.34:80", "69.16.218.101:8080", "51.210.242.234:8080", "185.148.168.220:8080", "142.4.219.173:8080", "54.38.242.185:443", "191.252.103.16:80", "104.131.62.48:8080", "62.171.178.147:8080", "217.182.143.207:443", "168.197.250.14:80", "37.44.244.177:8080", "66.42.57.149:443", "210.57.209.142:8080", "159.69.237.188:443", "116.124.128.206:8080", "128.199.192.135:8080", "195.154.146.35:443", "185.148.168.15:8080", "195.77.239.39:8080", "207.148.81.119:8080", "85.214.67.203:8080", "190.90.233.66:443", "78.46.73.125:443", "78.47.204.80:443", "37.59.209.141:8080", "54.37.228.122:443"], "Public Key": ["RUNLMSAAAADYNZPXY4tQxd/N4Wn5sTYAm5tUOxY2ol1ELrI4MNhHNi640vSLasjYTHpFRBoG+o84vtr7AJachCzOHjaAJFCW", "RUNTMSAAAAD0LxqDNhonUYwk8sqo7IWuUllRdUiUBnACc6romsQoe1YJD7wIe4AheqYofpZFucPDXCZ0z9i+ooUffqeoLZU0"]}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000008.00000002.345243637.0000000004BC1000.00000020.00000001.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
    00000008.00000002.344911121.0000000004591000.00000020.00000001.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
      0000000F.00000002.385135770.0000000002DD1000.00000020.00000001.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
        00000008.00000002.345163882.0000000004AD1000.00000020.00000001.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
          0000000F.00000002.385727612.0000000004B70000.00000040.00000001.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
            Click to see the 24 entries

            Unpacked PEs

            SourceRuleDescriptionAuthorStrings
            17.2.rundll32.exe.49b0000.1.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
              15.2.rundll32.exe.4c00000.7.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
                8.2.rundll32.exe.4a90000.2.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
                  3.2.loaddll32.exe.10d0000.1.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
                    15.2.rundll32.exe.4b70000.4.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
                      Click to see the 39 entries

                      Sigma Overview

                      System Summary:

                      barindex
                      Sigma detected: Suspicious Call by OrdinalShow sources
                      Source: Process startedAuthor: Florian Roth: Data: Command: rundll32.exe "C:\Users\user\Desktop\PtBIxmYbK8.dll",#1, CommandLine: rundll32.exe "C:\Users\user\Desktop\PtBIxmYbK8.dll",#1, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\rundll32.exe, NewProcessName: C:\Windows\SysWOW64\rundll32.exe, OriginalFileName: C:\Windows\SysWOW64\rundll32.exe, ParentCommandLine: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\PtBIxmYbK8.dll",#1, ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 4552, ProcessCommandLine: rundll32.exe "C:\Users\user\Desktop\PtBIxmYbK8.dll",#1, ProcessId: 4520

                      Jbx Signature Overview

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection:

                      barindex
                      Found malware configurationShow sources
                      Source: 8.2.rundll32.exe.4bc0000.5.unpackMalware Configuration Extractor: Emotet {"C2 list": ["45.138.98.34:80", "69.16.218.101:8080", "51.210.242.234:8080", "185.148.168.220:8080", "142.4.219.173:8080", "54.38.242.185:443", "191.252.103.16:80", "104.131.62.48:8080", "62.171.178.147:8080", "217.182.143.207:443", "168.197.250.14:80", "37.44.244.177:8080", "66.42.57.149:443", "210.57.209.142:8080", "159.69.237.188:443", "116.124.128.206:8080", "128.199.192.135:8080", "195.154.146.35:443", "185.148.168.15:8080", "195.77.239.39:8080", "207.148.81.119:8080", "85.214.67.203:8080", "190.90.233.66:443", "78.46.73.125:443", "78.47.204.80:443", "37.59.209.141:8080", "54.37.228.122:443"], "Public Key": ["RUNLMSAAAADYNZPXY4tQxd/N4Wn5sTYAm5tUOxY2ol1ELrI4MNhHNi640vSLasjYTHpFRBoG+o84vtr7AJachCzOHjaAJFCW", "RUNTMSAAAAD0LxqDNhonUYwk8sqo7IWuUllRdUiUBnACc6romsQoe1YJD7wIe4AheqYofpZFucPDXCZ0z9i+ooUffqeoLZU0"]}
                      Multi AV Scanner detection for submitted fileShow sources
                      Source: PtBIxmYbK8.dllVirustotal: Detection: 15%Perma Link
                      Source: PtBIxmYbK8.dllStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE, DLL
                      Source: Binary string: ws2_32.pdb source: WerFault.exe, 0000000D.00000003.310285213.0000000005198000.00000004.00000040.sdmp, WerFault.exe, 0000000D.00000003.310219778.0000000005198000.00000004.00000040.sdmp
                      Source: Binary string: winspool.pdb source: WerFault.exe, 0000000D.00000003.310285213.0000000005198000.00000004.00000040.sdmp, WerFault.exe, 0000000D.00000003.310219778.0000000005198000.00000004.00000040.sdmp
                      Source: Binary string: wgdi32full.pdb source: WerFault.exe, 0000000D.00000003.310178934.0000000005051000.00000004.00000001.sdmp
                      Source: Binary string: wkernel32.pdb source: WerFault.exe, 0000000D.00000003.310178934.0000000005051000.00000004.00000001.sdmp, WerFault.exe, 0000000D.00000003.305787983.0000000004D37000.00000004.00000001.sdmp, WerFault.exe, 0000000D.00000003.306197869.0000000003223000.00000004.00000001.sdmp, WerFault.exe, 0000000D.00000003.305884024.0000000003223000.00000004.00000001.sdmp
                      Source: Binary string: bcrypt.pdb source: WerFault.exe, 0000000D.00000003.310285213.0000000005198000.00000004.00000040.sdmp, WerFault.exe, 0000000D.00000003.310219778.0000000005198000.00000004.00000040.sdmp
                      Source: Binary string: sechost.pdb source: WerFault.exe, 0000000D.00000003.310197280.0000000005192000.00000004.00000040.sdmp
                      Source: Binary string: iphlpapi.pdb source: WerFault.exe, 0000000D.00000003.310285213.0000000005198000.00000004.00000040.sdmp, WerFault.exe, 0000000D.00000003.310219778.0000000005198000.00000004.00000040.sdmp
                      Source: Binary string: ucrtbase.pdb source: WerFault.exe, 0000000D.00000003.310178934.0000000005051000.00000004.00000001.sdmp
                      Source: Binary string: msvcrt.pdb source: WerFault.exe, 0000000D.00000003.310178934.0000000005051000.00000004.00000001.sdmp
                      Source: Binary string: propsys.pdb source: WerFault.exe, 0000000D.00000003.310285213.0000000005198000.00000004.00000040.sdmp, WerFault.exe, 0000000D.00000003.310219778.0000000005198000.00000004.00000040.sdmp
                      Source: Binary string: nCReportStore::Prune: MaxReportCount=%d MaxSizeInMb=%dRSDSwkernel32.pdb source: WerFault.exe, 0000000D.00000002.320300111.0000000002EB2000.00000004.00000001.sdmp
                      Source: Binary string: wrpcrt4.pdb source: WerFault.exe, 0000000D.00000003.310197280.0000000005192000.00000004.00000040.sdmp, WerFault.exe, 0000000D.00000003.310279384.0000000005195000.00000004.00000040.sdmp
                      Source: Binary string: wntdll.pdb source: WerFault.exe, 0000000D.00000003.310178934.0000000005051000.00000004.00000001.sdmp, WerFault.exe, 0000000D.00000003.306329684.000000000321D000.00000004.00000001.sdmp, WerFault.exe, 0000000D.00000003.305873147.000000000321D000.00000004.00000001.sdmp
                      Source: Binary string: wrpcrt4.pdbk source: WerFault.exe, 0000000D.00000003.310197280.0000000005192000.00000004.00000040.sdmp, WerFault.exe, 0000000D.00000003.310279384.0000000005195000.00000004.00000040.sdmp
                      Source: Binary string: shcore.pdb source: WerFault.exe, 0000000D.00000003.310285213.0000000005198000.00000004.00000040.sdmp, WerFault.exe, 0000000D.00000003.310219778.0000000005198000.00000004.00000040.sdmp
                      Source: Binary string: wgdi32.pdb source: WerFault.exe, 0000000D.00000003.310178934.0000000005051000.00000004.00000001.sdmp
                      Source: Binary string: advapi32.pdb source: WerFault.exe, 0000000D.00000003.310178934.0000000005051000.00000004.00000001.sdmp
                      Source: Binary string: wsspicli.pdb source: WerFault.exe, 0000000D.00000003.310272488.0000000005190000.00000004.00000040.sdmp
                      Source: Binary string: Kernel.Appcore.pdb source: WerFault.exe, 0000000D.00000003.310272488.0000000005190000.00000004.00000040.sdmp
                      Source: Binary string: msvcp_win.pdb source: WerFault.exe, 0000000D.00000003.310178934.0000000005051000.00000004.00000001.sdmp
                      Source: Binary string: cryptbase.pdb source: WerFault.exe, 0000000D.00000003.310272488.0000000005190000.00000004.00000040.sdmp
                      Source: Binary string: wimm32.pdb source: WerFault.exe, 0000000D.00000003.310285213.0000000005198000.00000004.00000040.sdmp, WerFault.exe, 0000000D.00000003.310219778.0000000005198000.00000004.00000040.sdmp
                      Source: Binary string: wkernelbase.pdb source: WerFault.exe, 0000000D.00000003.310178934.0000000005051000.00000004.00000001.sdmp, WerFault.exe, 0000000D.00000003.306056486.0000000003229000.00000004.00000001.sdmp, WerFault.exe, 0000000D.00000003.305888368.0000000003229000.00000004.00000001.sdmp
                      Source: Binary string: sechost.pdbk source: WerFault.exe, 0000000D.00000003.310197280.0000000005192000.00000004.00000040.sdmp
                      Source: Binary string: bcryptprimitives.pdb source: WerFault.exe, 0000000D.00000003.310272488.0000000005190000.00000004.00000040.sdmp
                      Source: Binary string: shlwapi.pdb source: WerFault.exe, 0000000D.00000003.310272488.0000000005190000.00000004.00000040.sdmp
                      Source: Binary string: wkernelbase.pdb( source: WerFault.exe, 0000000D.00000003.306056486.0000000003229000.00000004.00000001.sdmp, WerFault.exe, 0000000D.00000003.305888368.0000000003229000.00000004.00000001.sdmp
                      Source: Binary string: wwin32u.pdb source: WerFault.exe, 0000000D.00000003.310178934.0000000005051000.00000004.00000001.sdmp
                      Source: Binary string: combase.pdb source: WerFault.exe, 0000000D.00000003.310285213.0000000005198000.00000004.00000040.sdmp, WerFault.exe, 0000000D.00000003.310219778.0000000005198000.00000004.00000040.sdmp
                      Source: Binary string: wkernel32.pdb( source: WerFault.exe, 0000000D.00000003.306197869.0000000003223000.00000004.00000001.sdmp, WerFault.exe, 0000000D.00000003.305884024.0000000003223000.00000004.00000001.sdmp
                      Source: Binary string: oleaut32.pdb source: WerFault.exe, 0000000D.00000003.310285213.0000000005198000.00000004.00000040.sdmp, WerFault.exe, 0000000D.00000003.310219778.0000000005198000.00000004.00000040.sdmp
                      Source: Binary string: apphelp.pdb source: WerFault.exe, 0000000D.00000003.310178934.0000000005051000.00000004.00000001.sdmp
                      Source: Binary string: wuser32.pdb source: WerFault.exe, 0000000D.00000003.310178934.0000000005051000.00000004.00000001.sdmp
                      Source: Binary string: wntdll.pdb( source: WerFault.exe, 0000000D.00000003.306329684.000000000321D000.00000004.00000001.sdmp, WerFault.exe, 0000000D.00000003.305873147.000000000321D000.00000004.00000001.sdmp

                      Networking:

                      barindex
                      Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)Show sources
                      Source: TrafficSnort IDS: 2404332 ET CNC Feodo Tracker Reported CnC Server TCP group 17 192.168.2.3:49743 -> 45.138.98.34:80
                      Source: TrafficSnort IDS: 2404338 ET CNC Feodo Tracker Reported CnC Server TCP group 20 192.168.2.3:49744 -> 69.16.218.101:8080
                      System process connects to network (likely due to code injection or exploit)Show sources
                      Source: C:\Windows\SysWOW64\rundll32.exeNetwork Connect: 69.16.218.101 144
                      Source: C:\Windows\SysWOW64\rundll32.exeNetwork Connect: 45.138.98.34 80
                      C2 URLs / IPs found in malware configurationShow sources
                      Source: Malware configuration extractorIPs: 45.138.98.34:80
                      Source: Malware configuration extractorIPs: 69.16.218.101:8080
                      Source: Malware configuration extractorIPs: 51.210.242.234:8080
                      Source: Malware configuration extractorIPs: 185.148.168.220:8080
                      Source: Malware configuration extractorIPs: 142.4.219.173:8080
                      Source: Malware configuration extractorIPs: 54.38.242.185:443
                      Source: Malware configuration extractorIPs: 191.252.103.16:80
                      Source: Malware configuration extractorIPs: 104.131.62.48:8080
                      Source: Malware configuration extractorIPs: 62.171.178.147:8080
                      Source: Malware configuration extractorIPs: 217.182.143.207:443
                      Source: Malware configuration extractorIPs: 168.197.250.14:80
                      Source: Malware configuration extractorIPs: 37.44.244.177:8080
                      Source: Malware configuration extractorIPs: 66.42.57.149:443
                      Source: Malware configuration extractorIPs: 210.57.209.142:8080
                      Source: Malware configuration extractorIPs: 159.69.237.188:443
                      Source: Malware configuration extractorIPs: 116.124.128.206:8080
                      Source: Malware configuration extractorIPs: 128.199.192.135:8080
                      Source: Malware configuration extractorIPs: 195.154.146.35:443
                      Source: Malware configuration extractorIPs: 185.148.168.15:8080
                      Source: Malware configuration extractorIPs: 195.77.239.39:8080
                      Source: Malware configuration extractorIPs: 207.148.81.119:8080
                      Source: Malware configuration extractorIPs: 85.214.67.203:8080
                      Source: Malware configuration extractorIPs: 190.90.233.66:443
                      Source: Malware configuration extractorIPs: 78.46.73.125:443
                      Source: Malware configuration extractorIPs: 78.47.204.80:443
                      Source: Malware configuration extractorIPs: 37.59.209.141:8080
                      Source: Malware configuration extractorIPs: 54.37.228.122:443
                      Source: Joe Sandbox ViewASN Name: AS-CHOOPAUS AS-CHOOPAUS
                      Source: Joe Sandbox ViewASN Name: DIGITALOCEAN-ASNUS DIGITALOCEAN-ASNUS
                      Source: Joe Sandbox ViewIP Address: 207.148.81.119 207.148.81.119
                      Source: Joe Sandbox ViewIP Address: 104.131.62.48 104.131.62.48
                      Source: global trafficTCP traffic: 192.168.2.3:49753 -> 69.16.218.101:8080
                      Source: unknownNetwork traffic detected: IP country count 11
                      Source: unknownTCP traffic detected without corresponding DNS query: 45.138.98.34
                      Source: unknownTCP traffic detected without corresponding DNS query: 45.138.98.34
                      Source: unknownTCP traffic detected without corresponding DNS query: 45.138.98.34
                      Source: unknownTCP traffic detected without corresponding DNS query: 69.16.218.101
                      Source: unknownTCP traffic detected without corresponding DNS query: 69.16.218.101
                      Source: unknownTCP traffic detected without corresponding DNS query: 69.16.218.101
                      Source: unknownTCP traffic detected without corresponding DNS query: 69.16.218.101
                      Source: unknownTCP traffic detected without corresponding DNS query: 69.16.218.101
                      Source: unknownTCP traffic detected without corresponding DNS query: 69.16.218.101
                      Source: unknownTCP traffic detected without corresponding DNS query: 69.16.218.101
                      Source: unknownTCP traffic detected without corresponding DNS query: 69.16.218.101
                      Source: unknownTCP traffic detected without corresponding DNS query: 69.16.218.101
                      Source: unknownTCP traffic detected without corresponding DNS query: 69.16.218.101
                      Source: unknownTCP traffic detected without corresponding DNS query: 69.16.218.101
                      Source: svchost.exe, 0000001A.00000003.453009043.0000023177787000.00000004.00000001.sdmpString found in binary or memory: Try it free for 30 days, no strings attached\r\n\r\nLike us on Facebook: http://www.facebook.com/spotify \r\nFollow us on Twitter: http://twitter.com/spotify","ProductTitle":"Spotify - Music and Podcasts","SearchTitles":[{"SearchTitleString":"Spotify","SearchTitleType":"SearchHint"},{"SearchTitleString":"Music","SearchTitleType":"SearchHint"},{"SearchTitleString":"music apps","SearchTitleType":"SearchHint"},{"SearchTitleString":"free music","SearchTitleType":"SearchHint"},{"SearchTitleString":"podcasts","SearchTitleType":"SearchHint"},{"SearchTitleString":"streaming","SearchTitleType":"SearchHint"},{"SearchTitleString":"soundcloud","SearchTitleType":"SearchHint"}],"Language":"en-us","Markets":["US","DZ","AR","AU","AT","BH","BD","BE","BR","BG","CA","CL","CN","CO","CR","HR","CY","CZ","DK","EG","EE","FI","FR","DE","GR","GT","HK","HU","IS","IN","ID","IQ","IE","IL","IT","JP","JO","KZ","KE","KW","LV","LB","LI","LT","LU","MY","MT","MR","MX","MA","NL","NZ","NG","N equals www.facebook.com (Facebook)
                      Source: svchost.exe, 0000001A.00000003.453009043.0000023177787000.00000004.00000001.sdmpString found in binary or memory: Try it free for 30 days, no strings attached\r\n\r\nLike us on Facebook: http://www.facebook.com/spotify \r\nFollow us on Twitter: http://twitter.com/spotify","ProductTitle":"Spotify - Music and Podcasts","SearchTitles":[{"SearchTitleString":"Spotify","SearchTitleType":"SearchHint"},{"SearchTitleString":"Music","SearchTitleType":"SearchHint"},{"SearchTitleString":"music apps","SearchTitleType":"SearchHint"},{"SearchTitleString":"free music","SearchTitleType":"SearchHint"},{"SearchTitleString":"podcasts","SearchTitleType":"SearchHint"},{"SearchTitleString":"streaming","SearchTitleType":"SearchHint"},{"SearchTitleString":"soundcloud","SearchTitleType":"SearchHint"}],"Language":"en-us","Markets":["US","DZ","AR","AU","AT","BH","BD","BE","BR","BG","CA","CL","CN","CO","CR","HR","CY","CZ","DK","EG","EE","FI","FR","DE","GR","GT","HK","HU","IS","IN","ID","IQ","IE","IL","IT","JP","JO","KZ","KE","KW","LV","LB","LI","LT","LU","MY","MT","MR","MX","MA","NL","NZ","NG","N equals www.twitter.com (Twitter)
                      Source: svchost.exe, 0000001A.00000003.453009043.0000023177787000.00000004.00000001.sdmp, svchost.exe, 0000001A.00000003.453039278.0000023177798000.00000004.00000001.sdmpString found in binary or memory: Try it free for 30 days, no strings attached\r\n\r\nLike us on Facebook: http://www.facebook.com/spotify \r\nFollow us on Twitter: http://twitter.com/spotify","ProductTitle":"Spotify - Music and Podcasts","SearchTitles":[{"SearchTitleString":"Spotify","SearchTitleType":"SearchHint"},{"SearchTitleString":"Music","SearchTitleType":"SearchHint"},{"SearchTitleString":"music apps","SearchTitleType":"SearchHint"},{"SearchTitleString":"free music","SearchTitleType":"SearchHint"},{"SearchTitleString":"podcasts","SearchTitleType":"SearchHint"},{"SearchTitleString":"streaming","SearchTitleType":"SearchHint"},{"SearchTitleString":"soundcloud","SearchTitleType":"SearchHint"}],"Language":"en-us","Markets":["US","DZ","AR","AU","AT","BH","BD","BE","BR","BG","CA","CL","CN","CO","CR","HR","CY","CZ","DK","EG","EE","FI","FR","DE","GR","GT","HK","HU","IS","IN","ID","IQ","IE","IL","IT","JP","JO","KZ","KE","KW","LV","LB","LI","LT","LU","MY","MT","MR","MX","MA","NL","NZ","NG","NO","OM","PK","PE","PH","PL","PT","QA","RO","RU","SA","RS","SG","SK","SI","ZA","KR","ES","SE","CH","TW","TH","TT","TN","TR","UA","AE","GB","VN","YE","LY","LK","UY","VE","AF","AX","AL","AS","AO","AI","AQ","AG","AM","AW","BO","BQ","BA","BW","BV","IO","BN","BF","BI","KH","CM","CV","KY","CF","TD","TL","DJ","DM","DO","EC","SV","GQ","ER","ET","FK","FO","FJ","GF","PF","TF","GA","GM","GE","GH","GI","GL","GD","GP","GU","GG","GN","GW","GY","HT","HM","HN","AZ","BS","BB","BY","BZ","BJ","BM","BT","KM","CG","CD","CK","CX","CC","CI","CW","JM","SJ","JE","KI","KG","LA","LS","LR","MO","MK","MG","MW","IM","MH","MQ","MU","YT","FM","MD","MN","MS","MZ","MM","NA","NR","NP","MV","ML","NC","NI","NE","NU","NF","PW","PS","PA","PG","PY","RE","RW","BL","MF","WS","ST","SN","MP","PN","SX","SB","SO","SC","SL","GS","SH","KN","LC","PM","VC","TJ","TZ","TG","TK","TO","TM","TC","TV","UM","UG","VI","VG","WF","EH","ZM","ZW","UZ","VU","SR","SZ","AD","MC","SM","ME","VA","NEUTRAL"]}],"MarketProperties":[{"RelatedProducts":[],"Markets":["US"]}],"ProductASchema":"Product;3","ProductBSchema":"ProductUnifiedApp;3","ProductId":"9NCBCSZSJRSB","Properties":{"PackageFamilyName":"SpotifyAB.SpotifyMusic_zpdnekdrzrea0","PackageIdentityName":"SpotifyAB.SpotifyMusic","PublisherCertificateName":"CN=453637B3-4E12-4CDF-B0D3-2A3C863BF6EF","XboxCrossGenSetId":null,"XboxConsoleGenOptimized":null,"XboxConsoleGenCompatible":null},"AlternateIds":[{"IdType":"LegacyWindowsStoreProductId","Value":"ceac5d3f-8a4f-40e1-9a67-76d9108c7cb5"},{"IdType":"LegacyWindowsPhoneProductId","Value":"caac1b9d-621b-4f96-b143-e10e1397740a"},{"IdType":"XboxTitleId","Value":"1681279293"}],"IngestionSource":"DCE","IsMicrosoftProduct":false,"PreferredSkuId":"0010","ProductType":"Application","ValidationData":{"PassedValidation":false,"RevisionId":"2022-01-07T11:33:20.1626869Z||.||d5cdcec3-04df-404e-ba07-3240047c89f9||1152921505694348672||Null||fullrelease","ValidationResultUri":""},"MerchandizingTags":[],"PartD":"","ProductFamily":"Apps","ProductKind":"Application","DisplaySkuAvailab
                      Source: svchost.exe, 0000001A.00000003.453009043.0000023177787000.00000004.00000001.sdmp, svchost.exe, 0000001A.00000003.453039278.0000023177798000.00000004.00000001.sdmpString found in binary or memory: Try it free for 30 days, no strings attached\r\n\r\nLike us on Facebook: http://www.facebook.com/spotify \r\nFollow us on Twitter: http://twitter.com/spotify","ProductTitle":"Spotify - Music and Podcasts","SearchTitles":[{"SearchTitleString":"Spotify","SearchTitleType":"SearchHint"},{"SearchTitleString":"Music","SearchTitleType":"SearchHint"},{"SearchTitleString":"music apps","SearchTitleType":"SearchHint"},{"SearchTitleString":"free music","SearchTitleType":"SearchHint"},{"SearchTitleString":"podcasts","SearchTitleType":"SearchHint"},{"SearchTitleString":"streaming","SearchTitleType":"SearchHint"},{"SearchTitleString":"soundcloud","SearchTitleType":"SearchHint"}],"Language":"en-us","Markets":["US","DZ","AR","AU","AT","BH","BD","BE","BR","BG","CA","CL","CN","CO","CR","HR","CY","CZ","DK","EG","EE","FI","FR","DE","GR","GT","HK","HU","IS","IN","ID","IQ","IE","IL","IT","JP","JO","KZ","KE","KW","LV","LB","LI","LT","LU","MY","MT","MR","MX","MA","NL","NZ","NG","NO","OM","PK","PE","PH","PL","PT","QA","RO","RU","SA","RS","SG","SK","SI","ZA","KR","ES","SE","CH","TW","TH","TT","TN","TR","UA","AE","GB","VN","YE","LY","LK","UY","VE","AF","AX","AL","AS","AO","AI","AQ","AG","AM","AW","BO","BQ","BA","BW","BV","IO","BN","BF","BI","KH","CM","CV","KY","CF","TD","TL","DJ","DM","DO","EC","SV","GQ","ER","ET","FK","FO","FJ","GF","PF","TF","GA","GM","GE","GH","GI","GL","GD","GP","GU","GG","GN","GW","GY","HT","HM","HN","AZ","BS","BB","BY","BZ","BJ","BM","BT","KM","CG","CD","CK","CX","CC","CI","CW","JM","SJ","JE","KI","KG","LA","LS","LR","MO","MK","MG","MW","IM","MH","MQ","MU","YT","FM","MD","MN","MS","MZ","MM","NA","NR","NP","MV","ML","NC","NI","NE","NU","NF","PW","PS","PA","PG","PY","RE","RW","BL","MF","WS","ST","SN","MP","PN","SX","SB","SO","SC","SL","GS","SH","KN","LC","PM","VC","TJ","TZ","TG","TK","TO","TM","TC","TV","UM","UG","VI","VG","WF","EH","ZM","ZW","UZ","VU","SR","SZ","AD","MC","SM","ME","VA","NEUTRAL"]}],"MarketProperties":[{"RelatedProducts":[],"Markets":["US"]}],"ProductASchema":"Product;3","ProductBSchema":"ProductUnifiedApp;3","ProductId":"9NCBCSZSJRSB","Properties":{"PackageFamilyName":"SpotifyAB.SpotifyMusic_zpdnekdrzrea0","PackageIdentityName":"SpotifyAB.SpotifyMusic","PublisherCertificateName":"CN=453637B3-4E12-4CDF-B0D3-2A3C863BF6EF","XboxCrossGenSetId":null,"XboxConsoleGenOptimized":null,"XboxConsoleGenCompatible":null},"AlternateIds":[{"IdType":"LegacyWindowsStoreProductId","Value":"ceac5d3f-8a4f-40e1-9a67-76d9108c7cb5"},{"IdType":"LegacyWindowsPhoneProductId","Value":"caac1b9d-621b-4f96-b143-e10e1397740a"},{"IdType":"XboxTitleId","Value":"1681279293"}],"IngestionSource":"DCE","IsMicrosoftProduct":false,"PreferredSkuId":"0010","ProductType":"Application","ValidationData":{"PassedValidation":false,"RevisionId":"2022-01-07T11:33:20.1626869Z||.||d5cdcec3-04df-404e-ba07-3240047c89f9||1152921505694348672||Null||fullrelease","ValidationResultUri":""},"MerchandizingTags":[],"PartD":"","ProductFamily":"Apps","ProductKind":"Application","DisplaySkuAvailab
                      Source: svchost.exe, 0000001A.00000003.453009043.0000023177787000.00000004.00000001.sdmpString found in binary or memory: attached\r\n\r\nLike us on Facebook: http://www.facebook.com/spotify \r\nFollow us on Twitter: http://twitter.com/spotify","SkuTitle":"Spotify - Music and Podcasts","Language":"en-us","Markets":["US","DZ","AR","AU","AT","BH","BD","BE","BR","BG","CA","CL","CN","CO","CR","HR","CY","CZ","DK","EG","EE","FI","FR","DE","GR","GT","HK","HU","IS","IN","ID","IQ","IE","IL","IT","JP","JO","KZ","KE","KW","LV","LB","LI","LT","LU","MY","MT","MR","MX","MA","NL","NZ","NG","NO","OM","PK","PE","PH","PL","PT","QA","RO","RU","SA","RS","SG","SK","SI","ZA","KR","ES","SE","CH","TW","TH","TT","TN","TR","UA","AE","GB","VN","YE","LY","LK","UY","VE","AF","AX","AL","AS","AO","AI","AQ","AG","AM","AW","BO","BQ","BA","BW","BV","IO","BN","BF","BI","KH","CM","CV","KY","CF","TD","TL","DJ","DM","DO","EC","SV","GQ","ER","ET","FK","FO","FJ","GF","PF","TF","GA","GM","GE","GH","GI","GL","GD","GP","GU","GG","GN","GW","GY","HT","HM","HN","AZ","BS","BB","BY","BZ","BJ","BM","BT","KM","CG","CD","CK","CX","CC","CI","CW","JM","SJ","JE","KI","KG","LA","LS","LR","MO","MK","MG","MW","IM","MH","MQ","MU","YT","FM","MD","MN","MS","MZ","MM","NA","NR","NP","MV","ML","NC","NI","NE","NU","NF","PW","PS","PA","PG","PY","RE","RW","BL","MF","WS","ST","SN","MP","PN","SX","SB","SO","SC","SL","GS","SH","KN","LC","PM","VC","TJ","TZ","TG","TK","TO","TM","TC","TV","UM","UG","VI","VG","WF","EH","ZM","ZW","UZ","VU","SR","SZ","AD","MC","SM","ME","VA","NEUTRAL"]}],"ProductId":"9NCBCSZSJRSB","Properties":{"FulfillmentData":{"ProductId":"9NCBCSZSJRSB","WuCategoryId":"5c353b9c-7ac7-4d27-af07-923e7d9aa2e2","PackageFamilyName":"SpotifyAB.SpotifyMusic_zpdnekdrzrea0","SkuId":"0011"},"FulfillmentType":"WindowsUpdate","FulfillmentPluginId":null,"Packages":[{"Applications":[{"ApplicationId":"Spotify"}],"Architectures":["x86"],"Capabilities":["internetClient","runFullTrust","Microsoft.storeFilter.core.notSupported_8wekyb3d8bbwe"],"ExperienceIds":[],"MaxDownloadSizeInBytes":104380919,"MaxInstallSizeInBytes":203345920,"PackageFormat":"Appx","PackageFamilyName":"SpotifyAB.SpotifyMusic_zpdnekdrzrea0","MainPackageFamilyNameForDlc":null,"PackageFullName":"SpotifyAB.SpotifyMusic_1.176.447.0_x86__zpdnekdrzrea0","PackageId":"3fbafb47-f476-4c26-4445-49acb9a726e6-X86","PackageRank":30001,"PlatformDependencies":[{"MaxTested":2814750754275328,"MinVersion":2814750710366559,"PlatformName":"Windows.Desktop"}],"PlatformDependencyXmlBlob":"{\"blob.version\":1688867040526336,\"content.isMain\":false,\"content.packageId\":\"SpotifyAB.SpotifyMusic_1.176.447.0_x86__zpdnekdrzrea0\",\"content.productId\":\"caac1b9d-621b-4f96-b143-e10e1397740a\",\"content.targetPlatforms\":[{\"platform.maxVersionTested\":2814750754275328,\"platform.minVersion\":2814750710366559,\"platform.target\":3}],\"content.type\":7,\"policy\":{\"category.first\":\"app\",\"category.second\":\"Music\",\"optOut.backupRestore\":true,\"optOut.removeableMedia\":false},\"policy2\":{\"ageRating\":3,\"optOut.DVR\":false,\"thirdPartyAppRatings\":[{\"level\":9,\"systemId\":3},{\"level\":81,
                      Source: svchost.exe, 0000001A.00000003.453009043.0000023177787000.00000004.00000001.sdmpString found in binary or memory: attached\r\n\r\nLike us on Facebook: http://www.facebook.com/spotify \r\nFollow us on Twitter: http://twitter.com/spotify","SkuTitle":"Spotify - Music and Podcasts","Language":"en-us","Markets":["US","DZ","AR","AU","AT","BH","BD","BE","BR","BG","CA","CL","CN","CO","CR","HR","CY","CZ","DK","EG","EE","FI","FR","DE","GR","GT","HK","HU","IS","IN","ID","IQ","IE","IL","IT","JP","JO","KZ","KE","KW","LV","LB","LI","LT","LU","MY","MT","MR","MX","MA","NL","NZ","NG","NO","OM","PK","PE","PH","PL","PT","QA","RO","RU","SA","RS","SG","SK","SI","ZA","KR","ES","SE","CH","TW","TH","TT","TN","TR","UA","AE","GB","VN","YE","LY","LK","UY","VE","AF","AX","AL","AS","AO","AI","AQ","AG","AM","AW","BO","BQ","BA","BW","BV","IO","BN","BF","BI","KH","CM","CV","KY","CF","TD","TL","DJ","DM","DO","EC","SV","GQ","ER","ET","FK","FO","FJ","GF","PF","TF","GA","GM","GE","GH","GI","GL","GD","GP","GU","GG","GN","GW","GY","HT","HM","HN","AZ","BS","BB","BY","BZ","BJ","BM","BT","KM","CG","CD","CK","CX","CC","CI","CW","JM","SJ","JE","KI","KG","LA","LS","LR","MO","MK","MG","MW","IM","MH","MQ","MU","YT","FM","MD","MN","MS","MZ","MM","NA","NR","NP","MV","ML","NC","NI","NE","NU","NF","PW","PS","PA","PG","PY","RE","RW","BL","MF","WS","ST","SN","MP","PN","SX","SB","SO","SC","SL","GS","SH","KN","LC","PM","VC","TJ","TZ","TG","TK","TO","TM","TC","TV","UM","UG","VI","VG","WF","EH","ZM","ZW","UZ","VU","SR","SZ","AD","MC","SM","ME","VA","NEUTRAL"]}],"ProductId":"9NCBCSZSJRSB","Properties":{"FulfillmentData":{"ProductId":"9NCBCSZSJRSB","WuCategoryId":"5c353b9c-7ac7-4d27-af07-923e7d9aa2e2","PackageFamilyName":"SpotifyAB.SpotifyMusic_zpdnekdrzrea0","SkuId":"0011"},"FulfillmentType":"WindowsUpdate","FulfillmentPluginId":null,"Packages":[{"Applications":[{"ApplicationId":"Spotify"}],"Architectures":["x86"],"Capabilities":["internetClient","runFullTrust","Microsoft.storeFilter.core.notSupported_8wekyb3d8bbwe"],"ExperienceIds":[],"MaxDownloadSizeInBytes":104380919,"MaxInstallSizeInBytes":203345920,"PackageFormat":"Appx","PackageFamilyName":"SpotifyAB.SpotifyMusic_zpdnekdrzrea0","MainPackageFamilyNameForDlc":null,"PackageFullName":"SpotifyAB.SpotifyMusic_1.176.447.0_x86__zpdnekdrzrea0","PackageId":"3fbafb47-f476-4c26-4445-49acb9a726e6-X86","PackageRank":30001,"PlatformDependencies":[{"MaxTested":2814750754275328,"MinVersion":2814750710366559,"PlatformName":"Windows.Desktop"}],"PlatformDependencyXmlBlob":"{\"blob.version\":1688867040526336,\"content.isMain\":false,\"content.packageId\":\"SpotifyAB.SpotifyMusic_1.176.447.0_x86__zpdnekdrzrea0\",\"content.productId\":\"caac1b9d-621b-4f96-b143-e10e1397740a\",\"content.targetPlatforms\":[{\"platform.maxVersionTested\":2814750754275328,\"platform.minVersion\":2814750710366559,\"platform.target\":3}],\"content.type\":7,\"policy\":{\"category.first\":\"app\",\"category.second\":\"Music\",\"optOut.backupRestore\":true,\"optOut.removeableMedia\":false},\"policy2\":{\"ageRating\":3,\"optOut.DVR\":false,\"thirdPartyAppRatings\":[{\"level\":9,\"systemId\":3},{\"level\":81,
                      Source: svchost.exe, 0000001A.00000002.472723028.0000023177700000.00000004.00000001.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
                      Source: svchost.exe, 0000001A.00000002.472481866.0000023176EE7000.00000004.00000001.sdmpString found in binary or memory: http://crl.ver)
                      Source: 77EC63BDA74BD0D0E0426DC8F80085060.18.drString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
                      Source: svchost.exe, 0000001A.00000003.441248860.0000023177791000.00000004.00000001.sdmp, svchost.exe, 0000001A.00000003.443775997.0000023177777000.00000004.00000001.sdmp, svchost.exe, 0000001A.00000003.441382268.00000231777B1000.00000004.00000001.sdmp, svchost.exe, 0000001A.00000003.441129492.000002317776C000.00000004.00000001.sdmp, svchost.exe, 0000001A.00000003.441267741.000002317776D000.00000004.00000001.sdmp, svchost.exe, 0000001A.00000003.441353106.00000231777D1000.00000004.00000001.sdmp, svchost.exe, 0000001A.00000003.441319649.000002317779B000.00000004.00000001.sdmp, svchost.exe, 0000001A.00000003.441399080.0000023177C02000.00000004.00000001.sdmp, svchost.exe, 0000001A.00000003.441299535.000002317777F000.00000004.00000001.sdmpString found in binary or memory: http://help.disneyplus.com.
                      Source: svchost.exe, 0000001A.00000002.472756328.000002317771F000.00000004.00000001.sdmpString found in binary or memory: http://schemas.microft8
                      Source: Amcache.hve.13.drString found in binary or memory: http://upx.sf.net
                      Source: svchost.exe, 0000001A.00000003.441248860.0000023177791000.00000004.00000001.sdmp, svchost.exe, 0000001A.00000003.443775997.0000023177777000.00000004.00000001.sdmp, svchost.exe, 0000001A.00000003.441382268.00000231777B1000.00000004.00000001.sdmp, svchost.exe, 0000001A.00000003.441129492.000002317776C000.00000004.00000001.sdmp, svchost.exe, 0000001A.00000003.441267741.000002317776D000.00000004.00000001.sdmp, svchost.exe, 0000001A.00000003.441353106.00000231777D1000.00000004.00000001.sdmp, svchost.exe, 0000001A.00000003.441319649.000002317779B000.00000004.00000001.sdmp, svchost.exe, 0000001A.00000003.441399080.0000023177C02000.00000004.00000001.sdmp, svchost.exe, 0000001A.00000003.441299535.000002317777F000.00000004.00000001.sdmpString found in binary or memory: https://disneyplus.com/legal.
                      Source: svchost.exe, 0000001A.00000003.441248860.0000023177791000.00000004.00000001.sdmp, svchost.exe, 0000001A.00000003.443775997.0000023177777000.00000004.00000001.sdmp, svchost.exe, 0000001A.00000003.441382268.00000231777B1000.00000004.00000001.sdmp, svchost.exe, 0000001A.00000003.441129492.000002317776C000.00000004.00000001.sdmp, svchost.exe, 0000001A.00000003.441267741.000002317776D000.00000004.00000001.sdmp, svchost.exe, 0000001A.00000003.441353106.00000231777D1000.00000004.00000001.sdmp, svchost.exe, 0000001A.00000003.441319649.000002317779B000.00000004.00000001.sdmp, svchost.exe, 0000001A.00000003.441399080.0000023177C02000.00000004.00000001.sdmp, svchost.exe, 0000001A.00000003.441299535.000002317777F000.00000004.00000001.sdmpString found in binary or memory: https://www.disneyplus.com/legal/privacy-policy
                      Source: svchost.exe, 0000001A.00000003.441248860.0000023177791000.00000004.00000001.sdmp, svchost.exe, 0000001A.00000003.443775997.0000023177777000.00000004.00000001.sdmp, svchost.exe, 0000001A.00000003.441382268.00000231777B1000.00000004.00000001.sdmp, svchost.exe, 0000001A.00000003.441129492.000002317776C000.00000004.00000001.sdmp, svchost.exe, 0000001A.00000003.441267741.000002317776D000.00000004.00000001.sdmp, svchost.exe, 0000001A.00000003.441353106.00000231777D1000.00000004.00000001.sdmp, svchost.exe, 0000001A.00000003.441319649.000002317779B000.00000004.00000001.sdmp, svchost.exe, 0000001A.00000003.441399080.0000023177C02000.00000004.00000001.sdmp, svchost.exe, 0000001A.00000003.441299535.000002317777F000.00000004.00000001.sdmpString found in binary or memory: https://www.disneyplus.com/legal/your-california-privacy-rights
                      Source: svchost.exe, 0000001A.00000003.445321406.000002317777F000.00000004.00000001.sdmp, svchost.exe, 0000001A.00000003.446551226.000002317777F000.00000004.00000001.sdmp, svchost.exe, 0000001A.00000003.446523607.0000023177C02000.00000004.00000001.sdmpString found in binary or memory: https://www.tiktok.com/legal/report/feedback
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 6_2_10001280 recvfrom,
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 6_2_10027958 GetKeyState,GetKeyState,GetKeyState,GetKeyState,SendMessageA,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10027958 GetKeyState,GetKeyState,GetKeyState,GetKeyState,SendMessageA,

                      E-Banking Fraud:

                      barindex
                      Yara detected EmotetShow sources
                      Source: Yara matchFile source: 17.2.rundll32.exe.49b0000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 15.2.rundll32.exe.4c00000.7.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.rundll32.exe.4a90000.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.loaddll32.exe.10d0000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 15.2.rundll32.exe.4b70000.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 15.2.rundll32.exe.4bd0000.6.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 7.2.rundll32.exe.29c0000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.rundll32.exe.4b90000.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 17.2.rundll32.exe.3130000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 15.2.rundll32.exe.2b10000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.rundll32.exe.4cf0000.6.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.rundll32.exe.4bc0000.5.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.rundll32.exe.2c40000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 7.2.rundll32.exe.29c0000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.2.regsvr32.exe.3250000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 15.2.rundll32.exe.4ba0000.5.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.0.loaddll32.exe.10d0000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.2.regsvr32.exe.4b90000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.rundll32.exe.4b90000.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.rundll32.exe.4a90000.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.0.loaddll32.exe.10a0000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.rundll32.exe.4d50000.8.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.0.loaddll32.exe.10a0000.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.loaddll32.exe.10a0000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.rundll32.exe.4cf0000.6.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.rundll32.exe.4590000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.0.loaddll32.exe.10a0000.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 15.2.rundll32.exe.4a30000.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.rundll32.exe.4d20000.7.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 17.2.rundll32.exe.3130000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.rundll32.exe.2c40000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.0.loaddll32.exe.10a0000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.rundll32.exe.4d50000.8.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.2.regsvr32.exe.3250000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 15.2.rundll32.exe.2b10000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 15.2.rundll32.exe.4ab0000.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 15.2.rundll32.exe.4bd0000.6.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 15.2.rundll32.exe.4b70000.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 15.2.rundll32.exe.2dd0000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.loaddll32.exe.10a0000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 7.2.rundll32.exe.4750000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.0.loaddll32.exe.10d0000.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.rundll32.exe.4ad0000.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 15.2.rundll32.exe.4a30000.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000008.00000002.345243637.0000000004BC1000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000008.00000002.344911121.0000000004591000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000F.00000002.385135770.0000000002DD1000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000008.00000002.345163882.0000000004AD1000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000F.00000002.385727612.0000000004B70000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000011.00000002.346835949.00000000049B1000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000000.301361831.00000000010D1000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000006.00000002.292884938.0000000003250000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.325185349.00000000010A0000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000011.00000002.346349668.0000000003130000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000008.00000002.345117733.0000000004A90000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000008.00000002.345389551.0000000004D50000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000F.00000002.385657332.0000000004AB1000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000F.00000002.385833414.0000000004BD0000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000000.301328959.00000000010A0000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000006.00000002.292946530.0000000004B91000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000000.299739915.00000000010D1000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000008.00000002.345356242.0000000004D21000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000008.00000002.344514792.0000000002C40000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000008.00000002.345313925.0000000004CF0000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000007.00000002.335991032.00000000029C0000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000000.299543600.00000000010A0000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000007.00000002.336442645.0000000004751000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.325240760.00000000010D1000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000008.00000002.345214624.0000000004B90000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000F.00000002.385786113.0000000004BA1000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000F.00000002.384990047.0000000002B10000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000F.00000002.385594738.0000000004A30000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000F.00000002.385904649.0000000004C01000.00000020.00000001.sdmp, type: MEMORY

                      System Summary:

                      barindex
                      Source: PtBIxmYbK8.dllStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE, DLL
                      Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 6048 -ip 6048
                      Source: C:\Windows\SysWOW64\rundll32.exeFile deleted: C:\Windows\SysWOW64\Mjuakgeb\fhtvflqppfnv.wdg:Zone.IdentifierJump to behavior
                      Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Windows\SysWOW64\Mjuakgeb\Jump to behavior
                      Source: C:\Windows\System32\loaddll32.exeCode function: 3_2_010EEFDD
                      Source: C:\Windows\System32\loaddll32.exeCode function: 3_2_010DEF0C
                      Source: C:\Windows\System32\loaddll32.exeCode function: 3_2_010F2B09
                      Source: C:\Windows\System32\loaddll32.exeCode function: 3_2_010D670B
                      Source: C:\Windows\System32\loaddll32.exeCode function: 3_2_010EAD08
                      Source: C:\Windows\System32\loaddll32.exeCode function: 3_2_010E5515
                      Source: C:\Windows\System32\loaddll32.exeCode function: 3_2_010E8D3D
                      Source: C:\Windows\System32\loaddll32.exeCode function: 3_2_010D1F38
                      Source: C:\Windows\System32\loaddll32.exeCode function: 3_2_010E5333
                      Source: C:\Windows\System32\loaddll32.exeCode function: 3_2_010DD14C
                      Source: C:\Windows\System32\loaddll32.exeCode function: 3_2_010E654A
                      Source: C:\Windows\System32\loaddll32.exeCode function: 3_2_010E2142
                      Source: C:\Windows\System32\loaddll32.exeCode function: 3_2_010E7D5B
                      Source: C:\Windows\System32\loaddll32.exeCode function: 3_2_010EFF58
                      Source: C:\Windows\System32\loaddll32.exeCode function: 3_2_010EE955
                      Source: C:\Windows\System32\loaddll32.exeCode function: 3_2_010F2D53
                      Source: C:\Windows\System32\loaddll32.exeCode function: 3_2_010DF369
                      Source: C:\Windows\System32\loaddll32.exeCode function: 3_2_010E017B
                      Source: C:\Windows\System32\loaddll32.exeCode function: 3_2_010E5779
                      Source: C:\Windows\System32\loaddll32.exeCode function: 3_2_010D6B7A
                      Source: C:\Windows\System32\loaddll32.exeCode function: 3_2_010E4F74
                      Source: C:\Windows\System32\loaddll32.exeCode function: 3_2_010E9774
                      Source: C:\Windows\System32\loaddll32.exeCode function: 3_2_010D238C
                      Source: C:\Windows\System32\loaddll32.exeCode function: 3_2_010DFB8E
                      Source: C:\Windows\System32\loaddll32.exeCode function: 3_2_010E0F86
                      Source: C:\Windows\System32\loaddll32.exeCode function: 3_2_010E6187
                      Source: C:\Windows\System32\loaddll32.exeCode function: 3_2_010E3D85
                      Source: C:\Windows\System32\loaddll32.exeCode function: 3_2_010D2194
                      Source: C:\Windows\System32\loaddll32.exeCode function: 3_2_010E8FAE
                      Source: C:\Windows\System32\loaddll32.exeCode function: 3_2_010F07AA
                      Source: C:\Windows\System32\loaddll32.exeCode function: 3_2_010D77A3
                      Source: C:\Windows\System32\loaddll32.exeCode function: 3_2_010ED1BC
                      Source: C:\Windows\System32\loaddll32.exeCode function: 3_2_010F17BD
                      Source: C:\Windows\System32\loaddll32.exeCode function: 3_2_010DBFBE
                      Source: C:\Windows\System32\loaddll32.exeCode function: 3_2_010D57B8
                      Source: C:\Windows\System32\loaddll32.exeCode function: 3_2_010DE7DE
                      Source: C:\Windows\System32\loaddll32.exeCode function: 3_2_010DC5D8
                      Source: C:\Windows\System32\loaddll32.exeCode function: 3_2_010EC5D5
                      Source: C:\Windows\System32\loaddll32.exeCode function: 3_2_010E67E6
                      Source: C:\Windows\System32\loaddll32.exeCode function: 3_2_010E85FF
                      Source: C:\Windows\System32\loaddll32.exeCode function: 3_2_010D4BFC
                      Source: C:\Windows\System32\loaddll32.exeCode function: 3_2_010D55FF
                      Source: C:\Windows\System32\loaddll32.exeCode function: 3_2_010EE1F8
                      Source: C:\Windows\System32\loaddll32.exeCode function: 3_2_010E9DF5
                      Source: C:\Windows\System32\loaddll32.exeCode function: 3_2_010E7A0F
                      Source: C:\Windows\System32\loaddll32.exeCode function: 3_2_010F2009
                      Source: C:\Windows\System32\loaddll32.exeCode function: 3_2_010E8806
                      Source: C:\Windows\System32\loaddll32.exeCode function: 3_2_010E9A01
                      Source: C:\Windows\System32\loaddll32.exeCode function: 3_2_010DB820
                      Source: C:\Windows\System32\loaddll32.exeCode function: 3_2_010D8636
                      Source: C:\Windows\System32\loaddll32.exeCode function: 3_2_010D3431
                      Source: C:\Windows\System32\loaddll32.exeCode function: 3_2_010DA445
                      Source: C:\Windows\System32\loaddll32.exeCode function: 3_2_010E4244
                      Source: C:\Windows\System32\loaddll32.exeCode function: 3_2_010DE640
                      Source: C:\Windows\System32\loaddll32.exeCode function: 3_2_010EF840
                      Source: C:\Windows\System32\loaddll32.exeCode function: 3_2_010D7442
                      Source: C:\Windows\System32\loaddll32.exeCode function: 3_2_010E2E5D
                      Source: C:\Windows\System32\loaddll32.exeCode function: 3_2_010EB257
                      Source: C:\Windows\System32\loaddll32.exeCode function: 3_2_010E4A66
                      Source: C:\Windows\System32\loaddll32.exeCode function: 3_2_010F0A64
                      Source: C:\Windows\System32\loaddll32.exeCode function: 3_2_010F3263
                      Source: C:\Windows\System32\loaddll32.exeCode function: 3_2_010D7E79
                      Source: C:\Windows\System32\loaddll32.exeCode function: 3_2_010D7078
                      Source: C:\Windows\System32\loaddll32.exeCode function: 3_2_010E567B
                      Source: C:\Windows\System32\loaddll32.exeCode function: 3_2_010DDE74
                      Source: C:\Windows\System32\loaddll32.exeCode function: 3_2_010EA474
                      Source: C:\Windows\System32\loaddll32.exeCode function: 3_2_010DA871
                      Source: C:\Windows\System32\loaddll32.exeCode function: 3_2_010EDC71
                      Source: C:\Windows\System32\loaddll32.exeCode function: 3_2_010E3EAA
                      Source: C:\Windows\System32\loaddll32.exeCode function: 3_2_010DBAA9
                      Source: C:\Windows\System32\loaddll32.exeCode function: 3_2_010F36AA
                      Source: C:\Windows\System32\loaddll32.exeCode function: 3_2_010EA2A5
                      Source: C:\Windows\System32\loaddll32.exeCode function: 3_2_010D1CA1
                      Source: C:\Windows\System32\loaddll32.exeCode function: 3_2_010F46BD
                      Source: C:\Windows\System32\loaddll32.exeCode function: 3_2_010E0EBC
                      Source: C:\Windows\System32\loaddll32.exeCode function: 3_2_010E0ABA
                      Source: C:\Windows\System32\loaddll32.exeCode function: 3_2_010DC6B8
                      Source: C:\Windows\System32\loaddll32.exeCode function: 3_2_010D80C0
                      Source: C:\Windows\System32\loaddll32.exeCode function: 3_2_010ED8DB
                      Source: C:\Windows\System32\loaddll32.exeCode function: 3_2_010ECCD9
                      Source: C:\Windows\System32\loaddll32.exeCode function: 3_2_010ECAD5
                      Source: C:\Windows\System32\loaddll32.exeCode function: 3_2_010F00EF
                      Source: C:\Windows\System32\loaddll32.exeCode function: 3_2_010DF0E9
                      Source: C:\Windows\System32\loaddll32.exeCode function: 3_2_010F3EE9
                      Source: C:\Windows\System32\loaddll32.exeCode function: 3_2_010EE4E5
                      Source: C:\Windows\System32\loaddll32.exeCode function: 3_2_010EBEFD
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 6_2_100291F6
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 6_2_1002F378
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 6_2_100403D7
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 6_2_1004250B
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 6_2_10041557
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 6_2_100395A1
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 6_2_1002F784
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 6_2_1004091B
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 6_2_1002EACF
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 6_2_1002FBA4
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 6_2_10035D96
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 6_2_10040E5F
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 6_2_1002EFA4
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_100291F6
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1002F378
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_100403D7
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1004250B
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10041557
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_100395A1
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1002F784
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1004091B
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1002EACF
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1002FBA4
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10035D96
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10040E5F
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1002EFA4
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_045AB257
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_0459DE74
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_045A4A66
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_045B2009
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_045A7A0F
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04598636
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_045AFF58
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_045AE955
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_045A654A
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_045A2142
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_0459670B
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_045AAD08
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_0459C5D8
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_045AEFDD
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_045A85FF
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_045B17BD
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_045A2E5D
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_0459E640
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_045AF840
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04597442
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_0459A445
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_045A4244
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04597E79
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04597078
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_045A567B
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_0459A871
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_045ADC71
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_045AA474
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_045B3263
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_045B0A64
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_045A9A01
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_045A8806
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04593431
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_0459B820
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_045AD8DB
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_045ACCD9
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_045ACAD5
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_045980C0
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_045ABEFD
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_0459F0E9
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_045B3EE9
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_045B00EF
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_045AE4E5
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_045A0ABA
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_0459C6B8
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_045B46BD
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_045A0EBC
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_045A3EAA
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_0459BAA9
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_045B36AA
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04591CA1
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_045AA2A5
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_045A7D5B
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_045B2D53
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_0459D14C
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_045A437A
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_045A017B
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_045A5779
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04596B7A
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_045A4F74
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_045A9774
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_0459F369
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_045A5515
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_045B2B09
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_0459EF0C
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04591F38
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_045A8D3D
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_045A5333
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_045AFBDE
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_0459E7DE
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_045AC5D5
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_045AE1F8
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_045A27F9
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04594BFC
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_045955FF
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_045A07F4
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_045A9DF5
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_045A67E6
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04592194
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_0459238C
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_0459FB8E
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_045A0F86
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_045A6187
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_045A3D85
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_045957B8
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_045AD1BC
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_0459BFBE
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_045B07AA
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_045A8FAE
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_045977A3
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_02DDDE74
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_02DE4A66
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_02DE7A0F
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_02DF2009
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_02DD8636
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_02DEEFDD
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_02DDC5D8
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_02DEFF58
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_02DE654A
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_02DE2142
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_02DD670B
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_02DEAD08
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_02DED8DB
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_02DECCD9
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_02DECAD5
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_02DD80C0
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_02DEBEFD
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_02DF00EF
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_02DDF0E9
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_02DF3EE9
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_02DEE4E5
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_02DF46BD
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_02DE0EBC
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_02DE0ABA
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_02DDC6B8
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_02DE3EAA
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_02DDBAA9
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_02DF36AA
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_02DEA2A5
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_02DD1CA1
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_02DE2E5D
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_02DEB257
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_02DDA445
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_02DE4244
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_02DDE640
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_02DEF840
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_02DD7442
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_02DD7E79
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_02DD7078
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_02DE567B
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_02DEA474
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_02DDA871
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_02DEDC71
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_02DF0A64
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_02DF3263
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_02DE8806
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_02DE9A01
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_02DD3431
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_02DDB820
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_02DEFBDE
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_02DDE7DE
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_02DEC5D5
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_02DE85FF
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_02DD4BFC
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_02DD55FF
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_02DEE1F8
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_02DE27F9
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_02DE07F4
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_02DE9DF5
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_02DE67E6
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_02DD2194
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_02DD238C
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_02DDFB8E
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_02DE0F86
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_02DE6187
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_02DE3D85
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_02DED1BC
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_02DF17BD
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_02DDBFBE
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_02DD57B8
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_02DE8FAE
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_02DF07AA
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_02DD77A3
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_02DE7D5B
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_02DEE955
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_02DF2D53
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_02DDD14C
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_02DE437A
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_02DE017B
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_02DE5779
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_02DD6B7A
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_02DE4F74
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_02DE9774
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_02DDF369
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_02DE5515
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_02DDEF0C
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_02DF2B09
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_02DE8D3D
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_02DD1F38
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_02DE5333
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: String function: 10030E38 appears 58 times
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: String function: 10030535 appears 87 times
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: String function: 10030E38 appears 58 times
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: String function: 10030535 appears 87 times
                      Source: PtBIxmYbK8.dllStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                      Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: sfc.dll
                      Source: PtBIxmYbK8.dllVirustotal: Detection: 15%
                      Source: PtBIxmYbK8.dllStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                      Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                      Source: unknownProcess created: C:\Windows\System32\SgrmBroker.exe C:\Windows\system32\SgrmBroker.exe
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe c:\windows\system32\svchost.exe -k localservicenetworkrestricted -p -s wscsvc
                      Source: unknownProcess created: C:\Windows\System32\loaddll32.exe loaddll32.exe "C:\Users\user\Desktop\PtBIxmYbK8.dll"
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\PtBIxmYbK8.dll",#1
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\PtBIxmYbK8.dll
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\PtBIxmYbK8.dll",#1
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\PtBIxmYbK8.dll,DllRegisterServer
                      Source: C:\Windows\SysWOW64\regsvr32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\rundll32.exe "C:\Users\user\Desktop\PtBIxmYbK8.dll",DllRegisterServer
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k WerSvcGroup
                      Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 6048 -ip 6048
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6048 -s 512
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\rundll32.exe "C:\Users\user\Desktop\PtBIxmYbK8.dll",DllRegisterServer
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Mjuakgeb\fhtvflqppfnv.wdg",DvMDRtCzK
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\rundll32.exe "C:\Windows\System32\Mjuakgeb\fhtvflqppfnv.wdg",DllRegisterServer
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p
                      Source: C:\Windows\System32\svchost.exeProcess created: C:\Program Files\Windows Defender\MpCmdRun.exe "C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable
                      Source: C:\Program Files\Windows Defender\MpCmdRun.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p
                      Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6048 -s 512
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\PtBIxmYbK8.dll",#1
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\PtBIxmYbK8.dll
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\PtBIxmYbK8.dll,DllRegisterServer
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\PtBIxmYbK8.dll",#1
                      Source: C:\Windows\SysWOW64\regsvr32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\rundll32.exe "C:\Users\user\Desktop\PtBIxmYbK8.dll",DllRegisterServer
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\rundll32.exe "C:\Users\user\Desktop\PtBIxmYbK8.dll",DllRegisterServer
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Mjuakgeb\fhtvflqppfnv.wdg",DvMDRtCzK
                      Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 6048 -ip 6048
                      Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6048 -s 512
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess created: unknown unknown
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\rundll32.exe "C:\Windows\System32\Mjuakgeb\fhtvflqppfnv.wdg",DllRegisterServer
                      Source: C:\Windows\SysWOW64\rundll32.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32
                      Source: C:\Windows\System32\svchost.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\WER5DF2.tmpJump to behavior
                      Source: classification engineClassification label: mal96.troj.evad.winDLL@32/11@0/27
                      Source: C:\Windows\SysWOW64\rundll32.exeFile read: C:\Users\desktop.iniJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\PtBIxmYbK8.dll",#1
                      Source: C:\Windows\System32\conhost.exeMutant created: \BaseNamedObjects\Local\SM0:4848:120:WilError_01
                      Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \BaseNamedObjects\Local\SM0:6620:64:WilError_01
                      Source: C:\Windows\System32\SgrmBroker.exeMutant created: \BaseNamedObjects\Local\SM0:7136:304:WilStaging_02
                      Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess6048
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 6_2_10021183 LoadResource,LockResource,SizeofResource,
                      Source: C:\Windows\SysWOW64\rundll32.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: Binary string: ws2_32.pdb source: WerFault.exe, 0000000D.00000003.310285213.0000000005198000.00000004.00000040.sdmp, WerFault.exe, 0000000D.00000003.310219778.0000000005198000.00000004.00000040.sdmp
                      Source: Binary string: winspool.pdb source: WerFault.exe, 0000000D.00000003.310285213.0000000005198000.00000004.00000040.sdmp, WerFault.exe, 0000000D.00000003.310219778.0000000005198000.00000004.00000040.sdmp
                      Source: Binary string: wgdi32full.pdb source: WerFault.exe, 0000000D.00000003.310178934.0000000005051000.00000004.00000001.sdmp
                      Source: Binary string: wkernel32.pdb source: WerFault.exe, 0000000D.00000003.310178934.0000000005051000.00000004.00000001.sdmp, WerFault.exe, 0000000D.00000003.305787983.0000000004D37000.00000004.00000001.sdmp, WerFault.exe, 0000000D.00000003.306197869.0000000003223000.00000004.00000001.sdmp, WerFault.exe, 0000000D.00000003.305884024.0000000003223000.00000004.00000001.sdmp
                      Source: Binary string: bcrypt.pdb source: WerFault.exe, 0000000D.00000003.310285213.0000000005198000.00000004.00000040.sdmp, WerFault.exe, 0000000D.00000003.310219778.0000000005198000.00000004.00000040.sdmp
                      Source: Binary string: sechost.pdb source: WerFault.exe, 0000000D.00000003.310197280.0000000005192000.00000004.00000040.sdmp
                      Source: Binary string: iphlpapi.pdb source: WerFault.exe, 0000000D.00000003.310285213.0000000005198000.00000004.00000040.sdmp, WerFault.exe, 0000000D.00000003.310219778.0000000005198000.00000004.00000040.sdmp
                      Source: Binary string: ucrtbase.pdb source: WerFault.exe, 0000000D.00000003.310178934.0000000005051000.00000004.00000001.sdmp
                      Source: Binary string: msvcrt.pdb source: WerFault.exe, 0000000D.00000003.310178934.0000000005051000.00000004.00000001.sdmp
                      Source: Binary string: propsys.pdb source: WerFault.exe, 0000000D.00000003.310285213.0000000005198000.00000004.00000040.sdmp, WerFault.exe, 0000000D.00000003.310219778.0000000005198000.00000004.00000040.sdmp
                      Source: Binary string: nCReportStore::Prune: MaxReportCount=%d MaxSizeInMb=%dRSDSwkernel32.pdb source: WerFault.exe, 0000000D.00000002.320300111.0000000002EB2000.00000004.00000001.sdmp
                      Source: Binary string: wrpcrt4.pdb source: WerFault.exe, 0000000D.00000003.310197280.0000000005192000.00000004.00000040.sdmp, WerFault.exe, 0000000D.00000003.310279384.0000000005195000.00000004.00000040.sdmp
                      Source: Binary string: wntdll.pdb source: WerFault.exe, 0000000D.00000003.310178934.0000000005051000.00000004.00000001.sdmp, WerFault.exe, 0000000D.00000003.306329684.000000000321D000.00000004.00000001.sdmp, WerFault.exe, 0000000D.00000003.305873147.000000000321D000.00000004.00000001.sdmp
                      Source: Binary string: wrpcrt4.pdbk source: WerFault.exe, 0000000D.00000003.310197280.0000000005192000.00000004.00000040.sdmp, WerFault.exe, 0000000D.00000003.310279384.0000000005195000.00000004.00000040.sdmp
                      Source: Binary string: shcore.pdb source: WerFault.exe, 0000000D.00000003.310285213.0000000005198000.00000004.00000040.sdmp, WerFault.exe, 0000000D.00000003.310219778.0000000005198000.00000004.00000040.sdmp
                      Source: Binary string: wgdi32.pdb source: WerFault.exe, 0000000D.00000003.310178934.0000000005051000.00000004.00000001.sdmp
                      Source: Binary string: advapi32.pdb source: WerFault.exe, 0000000D.00000003.310178934.0000000005051000.00000004.00000001.sdmp
                      Source: Binary string: wsspicli.pdb source: WerFault.exe, 0000000D.00000003.310272488.0000000005190000.00000004.00000040.sdmp
                      Source: Binary string: Kernel.Appcore.pdb source: WerFault.exe, 0000000D.00000003.310272488.0000000005190000.00000004.00000040.sdmp
                      Source: Binary string: msvcp_win.pdb source: WerFault.exe, 0000000D.00000003.310178934.0000000005051000.00000004.00000001.sdmp
                      Source: Binary string: cryptbase.pdb source: WerFault.exe, 0000000D.00000003.310272488.0000000005190000.00000004.00000040.sdmp
                      Source: Binary string: wimm32.pdb source: WerFault.exe, 0000000D.00000003.310285213.0000000005198000.00000004.00000040.sdmp, WerFault.exe, 0000000D.00000003.310219778.0000000005198000.00000004.00000040.sdmp
                      Source: Binary string: wkernelbase.pdb source: WerFault.exe, 0000000D.00000003.310178934.0000000005051000.00000004.00000001.sdmp, WerFault.exe, 0000000D.00000003.306056486.0000000003229000.00000004.00000001.sdmp, WerFault.exe, 0000000D.00000003.305888368.0000000003229000.00000004.00000001.sdmp
                      Source: Binary string: sechost.pdbk source: WerFault.exe, 0000000D.00000003.310197280.0000000005192000.00000004.00000040.sdmp
                      Source: Binary string: bcryptprimitives.pdb source: WerFault.exe, 0000000D.00000003.310272488.0000000005190000.00000004.00000040.sdmp
                      Source: Binary string: shlwapi.pdb source: WerFault.exe, 0000000D.00000003.310272488.0000000005190000.00000004.00000040.sdmp
                      Source: Binary string: wkernelbase.pdb( source: WerFault.exe, 0000000D.00000003.306056486.0000000003229000.00000004.00000001.sdmp, WerFault.exe, 0000000D.00000003.305888368.0000000003229000.00000004.00000001.sdmp
                      Source: Binary string: wwin32u.pdb source: WerFault.exe, 0000000D.00000003.310178934.0000000005051000.00000004.00000001.sdmp
                      Source: Binary string: combase.pdb source: WerFault.exe, 0000000D.00000003.310285213.0000000005198000.00000004.00000040.sdmp, WerFault.exe, 0000000D.00000003.310219778.0000000005198000.00000004.00000040.sdmp
                      Source: Binary string: wkernel32.pdb( source: WerFault.exe, 0000000D.00000003.306197869.0000000003223000.00000004.00000001.sdmp, WerFault.exe, 0000000D.00000003.305884024.0000000003223000.00000004.00000001.sdmp
                      Source: Binary string: oleaut32.pdb source: WerFault.exe, 0000000D.00000003.310285213.0000000005198000.00000004.00000040.sdmp, WerFault.exe, 0000000D.00000003.310219778.0000000005198000.00000004.00000040.sdmp
                      Source: Binary string: apphelp.pdb source: WerFault.exe, 0000000D.00000003.310178934.0000000005051000.00000004.00000001.sdmp
                      Source: Binary string: wuser32.pdb source: WerFault.exe, 0000000D.00000003.310178934.0000000005051000.00000004.00000001.sdmp
                      Source: Binary string: wntdll.pdb( source: WerFault.exe, 0000000D.00000003.306329684.000000000321D000.00000004.00000001.sdmp, WerFault.exe, 0000000D.00000003.305873147.000000000321D000.00000004.00000001.sdmp
                      Source: PtBIxmYbK8.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                      Source: PtBIxmYbK8.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                      Source: PtBIxmYbK8.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                      Source: PtBIxmYbK8.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                      Source: PtBIxmYbK8.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
                      Source: C:\Windows\System32\loaddll32.exeCode function: 3_2_010D1195 push cs; iretd
                      Source: C:\Windows\System32\loaddll32.exeCode function: 3_2_010E08E0 push esp; iretd
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 6_2_1003060D push ecx; ret
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 6_2_10030E7D push ecx; ret
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1003060D push ecx; ret
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10030E7D push ecx; ret
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_04591195 push cs; iretd
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_02DD1195 push cs; iretd
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 6_2_1003E278 LoadLibraryA,GetProcAddress,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,__decode_pointer,__decode_pointer,__decode_pointer,__decode_pointer,__decode_pointer,
                      Source: PtBIxmYbK8.dllStatic PE information: real checksum: 0x970bf should be: 0x91160
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\PtBIxmYbK8.dll
                      Source: C:\Windows\SysWOW64\rundll32.exePE file moved: C:\Windows\SysWOW64\Mjuakgeb\fhtvflqppfnv.wdgJump to behavior

                      Hooking and other Techniques for Hiding and Protection:

                      barindex
                      Hides that the sample has been downloaded from the Internet (zone.identifier)Show sources
                      Source: C:\Windows\SysWOW64\rundll32.exeFile opened: C:\Windows\SysWOW64\Mjuakgeb\fhtvflqppfnv.wdg:Zone.Identifier read attributes | delete
                      Source: C:\Windows\SysWOW64\rundll32.exeFile opened: C:\Windows\SysWOW64\Bryfb\ermkapknuabuy.jmo:Zone.Identifier read attributes | delete
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 6_2_100250A3 IsIconic,GetWindowPlacement,GetWindowRect,
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 6_2_1001DFC0 IsIconic,SendMessageA,GetSystemMetrics,GetSystemMetrics,GetClientRect,DrawIcon,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_100250A3 IsIconic,GetWindowPlacement,GetWindowRect,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1001DFC0 IsIconic,SendMessageA,GetSystemMetrics,GetSystemMetrics,GetClientRect,DrawIcon,
                      Source: C:\Windows\SysWOW64\rundll32.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\svchost.exe TID: 1756Thread sleep time: -30000s >= -30000s
                      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                      Source: C:\Windows\SysWOW64\regsvr32.exeEvasive API call chain: GetModuleFileName,DecisionNodes,Sleep
                      Source: C:\Windows\SysWOW64\rundll32.exeEvasive API call chain: GetModuleFileName,DecisionNodes,Sleep
                      Source: C:\Windows\SysWOW64\regsvr32.exeAPI coverage: 4.6 %
                      Source: C:\Windows\SysWOW64\rundll32.exeAPI coverage: 5.0 %
                      Source: C:\Windows\System32\svchost.exeProcess information queried: ProcessInformation
                      Source: C:\Windows\SysWOW64\regsvr32.exeAPI call chain: ExitProcess graph end node
                      Source: C:\Windows\SysWOW64\rundll32.exeAPI call chain: ExitProcess graph end node
                      Source: C:\Windows\SysWOW64\rundll32.exeFile Volume queried: C:\ FullSizeInformation
                      Source: Amcache.hve.13.drBinary or memory string: VMware
                      Source: Amcache.hve.13.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/5&1ec51bf7&0&000000
                      Source: Amcache.hve.13.drBinary or memory string: @scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/5&280b647&0&000000
                      Source: Amcache.hve.13.drBinary or memory string: VMware Virtual USB Mouse
                      Source: Amcache.hve.13.drBinary or memory string: VMware, Inc.
                      Source: Amcache.hve.13.drBinary or memory string: VMware Virtual disk SCSI Disk Devicehbin
                      Source: Amcache.hve.13.drBinary or memory string: Microsoft Hyper-V Generation Counter
                      Source: Amcache.hve.13.drBinary or memory string: VMware7,1
                      Source: Amcache.hve.13.drBinary or memory string: NECVMWar VMware SATA CD00
                      Source: Amcache.hve.13.drBinary or memory string: VMware Virtual disk SCSI Disk Device
                      Source: Amcache.hve.13.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW71.00V.13989454.B64.1906190538,BiosReleaseDate:06/19/2019,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware7,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
                      Source: svchost.exe, 0000001A.00000002.472383830.0000023176E82000.00000004.00000001.sdmp, svchost.exe, 0000001A.00000002.472481866.0000023176EE7000.00000004.00000001.sdmpBinary or memory string: Hyper-V RAW
                      Source: Amcache.hve.13.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
                      Source: Amcache.hve.13.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
                      Source: Amcache.hve.13.drBinary or memory string: VMware, Inc.me
                      Source: Amcache.hve.13.drBinary or memory string: VMware-42 35 d8 20 48 cb c7 ff-aa 5e d0 37 a0 49 53 d7
                      Source: Amcache.hve.13.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/5&280b647&0&000000
                      Source: Amcache.hve.13.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/5&1ec51bf7&0&000000
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 6_2_1002DB0D IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 6_2_1003E278 LoadLibraryA,GetProcAddress,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,__decode_pointer,__decode_pointer,__decode_pointer,__decode_pointer,__decode_pointer,
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 6_2_10002D40 SetLastError,SetLastError,SetLastError,SetLastError,GetNativeSystemInfo,SetLastError,VirtualAlloc,VirtualAlloc,SetLastError,GetProcessHeap,HeapAlloc,VirtualFree,SetLastError,VirtualAlloc,SetLastError,
                      Source: C:\Windows\System32\loaddll32.exeCode function: 3_2_010DF7F7 mov eax, dword ptr fs:[00000030h]
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 8_2_0459F7F7 mov eax, dword ptr fs:[00000030h]
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_02DDF7F7 mov eax, dword ptr fs:[00000030h]
                      Source: C:\Windows\System32\loaddll32.exeProcess queried: DebugPort
                      Source: C:\Windows\System32\loaddll32.exeProcess queried: DebugPort
                      Source: C:\Windows\System32\loaddll32.exeProcess queried: DebugPort
                      Source: C:\Windows\System32\loaddll32.exeCode function: 3_2_010E2142 LdrInitializeThunk,
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 6_2_1003A8D4 __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 6_2_1002DB0D IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 6_2_10032CB9 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1003A8D4 __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_1002DB0D IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10032CB9 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,

                      HIPS / PFW / Operating System Protection Evasion:

                      barindex
                      System process connects to network (likely due to code injection or exploit)Show sources
                      Source: C:\Windows\SysWOW64\rundll32.exeNetwork Connect: 69.16.218.101 144
                      Source: C:\Windows\SysWOW64\rundll32.exeNetwork Connect: 45.138.98.34 80
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\PtBIxmYbK8.dll",#1
                      Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 6048 -ip 6048
                      Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6048 -s 512
                      Source: loaddll32.exe, 00000003.00000000.301396427.0000000001140000.00000002.00020000.sdmp, loaddll32.exe, 00000003.00000000.299879733.0000000001140000.00000002.00020000.sdmpBinary or memory string: Program Manager
                      Source: loaddll32.exe, 00000003.00000000.301396427.0000000001140000.00000002.00020000.sdmp, loaddll32.exe, 00000003.00000000.299879733.0000000001140000.00000002.00020000.sdmpBinary or memory string: Shell_TrayWnd
                      Source: loaddll32.exe, 00000003.00000000.301396427.0000000001140000.00000002.00020000.sdmp, loaddll32.exe, 00000003.00000000.299879733.0000000001140000.00000002.00020000.sdmpBinary or memory string: Progman
                      Source: loaddll32.exe, 00000003.00000000.301396427.0000000001140000.00000002.00020000.sdmp, loaddll32.exe, 00000003.00000000.299879733.0000000001140000.00000002.00020000.sdmpBinary or memory string: Progmanlock
                      Source: C:\Windows\SysWOW64\rundll32.exeQueries volume information: C:\ VolumeInformation
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: GetLocaleInfoA,
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: __calloc_crt,__malloc_crt,__malloc_crt,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___free_lconv_mon,InterlockedDecrement,InterlockedDecrement,
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: _strcpy_s,GetLocaleInfoA,__snwprintf_s,LoadLibraryA,
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: ___getlocaleinfo,__malloc_crt,__calloc_crt,__calloc_crt,__calloc_crt,__calloc_crt,GetCPInfo,___crtGetStringTypeA,___crtLCMapStringA,___crtLCMapStringA,InterlockedDecrement,InterlockedDecrement,
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: ___crtGetLocaleInfoA,GetLastError,___crtGetLocaleInfoA,__calloc_crt,___crtGetLocaleInfoA,__calloc_crt,__invoke_watson,___crtGetLocaleInfoW,
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: GetLocaleInfoA,GetLocaleInfoA,GetACP,
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: ___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: __getptd,_LcidFromHexString,GetLocaleInfoA,
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: GetLocaleInfoA,_LcidFromHexString,_GetPrimaryLen,_strlen,
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: __getptd,_LcidFromHexString,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,_strlen,GetLocaleInfoA,_strlen,_TestDefaultLanguage,
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: GetLocaleInfoA,GetLocaleInfoA,_LocaleUpdate::_LocaleUpdate,___ascii_strnicmp,__tolower_l,__tolower_l,
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: _LocaleUpdate::_LocaleUpdate,GetLocaleInfoW,
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLastError,GetLocaleInfoW,__alloca_probe_16,_malloc,GetLocaleInfoW,WideCharToMultiByte,__freea,GetLocaleInfoA,
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: __getptd,_LcidFromHexString,GetLocaleInfoA,_TestDefaultLanguage,
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: _LocaleUpdate::_LocaleUpdate,__crtGetLocaleInfoA_stat,
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: _strlen,_strlen,_GetPrimaryLen,EnumSystemLocalesA,
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: _strlen,_GetPrimaryLen,EnumSystemLocalesA,
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: __getptd,_TranslateName,_GetLcidFromLangCountry,_GetLcidFromLanguage,_TranslateName,_GetLcidFromLangCountry,_GetLcidFromLanguage,_strlen,EnumSystemLocalesA,GetUserDefaultLCID,_ProcessCodePage,IsValidCodePage,IsValidLocale,GetLocaleInfoA,_strcpy_s,__invoke_watson,GetLocaleInfoA,GetLocaleInfoA,__itoa_s,
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: __calloc_crt,__malloc_crt,__malloc_crt,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___free_lconv_num,InterlockedDecrement,InterlockedDecrement,InterlockedDecrement,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetLocaleInfoA,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: __calloc_crt,__malloc_crt,__malloc_crt,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___free_lconv_mon,InterlockedDecrement,InterlockedDecrement,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: _strcpy_s,GetLocaleInfoA,__snwprintf_s,LoadLibraryA,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: ___getlocaleinfo,__malloc_crt,__calloc_crt,__calloc_crt,__calloc_crt,__calloc_crt,GetCPInfo,___crtGetStringTypeA,___crtLCMapStringA,___crtLCMapStringA,InterlockedDecrement,InterlockedDecrement,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: ___crtGetLocaleInfoA,GetLastError,___crtGetLocaleInfoA,__calloc_crt,___crtGetLocaleInfoA,__calloc_crt,__invoke_watson,___crtGetLocaleInfoW,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetLocaleInfoA,GetLocaleInfoA,GetACP,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: ___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: __getptd,_LcidFromHexString,GetLocaleInfoA,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetLocaleInfoA,_LcidFromHexString,_GetPrimaryLen,_strlen,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: __getptd,_LcidFromHexString,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,_strlen,GetLocaleInfoA,_strlen,_TestDefaultLanguage,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetLocaleInfoA,GetLocaleInfoA,_LocaleUpdate::_LocaleUpdate,___ascii_strnicmp,__tolower_l,__tolower_l,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: _LocaleUpdate::_LocaleUpdate,GetLocaleInfoW,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLastError,GetLocaleInfoW,__alloca_probe_16,_malloc,GetLocaleInfoW,WideCharToMultiByte,__freea,GetLocaleInfoA,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: __getptd,_LcidFromHexString,GetLocaleInfoA,_TestDefaultLanguage,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: _LocaleUpdate::_LocaleUpdate,__crtGetLocaleInfoA_stat,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: _strlen,_strlen,_GetPrimaryLen,EnumSystemLocalesA,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: _strlen,_GetPrimaryLen,EnumSystemLocalesA,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: __getptd,_TranslateName,_GetLcidFromLangCountry,_GetLcidFromLanguage,_TranslateName,_GetLcidFromLangCountry,_GetLcidFromLanguage,_strlen,EnumSystemLocalesA,GetUserDefaultLCID,_ProcessCodePage,IsValidCodePage,IsValidLocale,GetLocaleInfoA,_strcpy_s,__invoke_watson,GetLocaleInfoA,GetLocaleInfoA,__itoa_s,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: __calloc_crt,__malloc_crt,__malloc_crt,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___free_lconv_num,InterlockedDecrement,InterlockedDecrement,InterlockedDecrement,
                      Source: C:\Windows\SysWOW64\rundll32.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 6_2_1003732F GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter,
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 6_2_10024F01 _memset,GetVersionExA,

                      Lowering of HIPS / PFW / Operating System Security Settings:

                      barindex
                      Changes security center settings (notifications, updates, antivirus, firewall)Show sources
                      Source: C:\Windows\System32\svchost.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center cvalJump to behavior
                      Source: C:\Windows\System32\svchost.exeWMI Queries: IWbemServices::ExecNotificationQuery - ROOT\SecurityCenter : SELECT * FROM __InstanceOperationEvent WHERE TargetInstance ISA 'AntiVirusProduct' OR TargetInstance ISA 'FirewallProduct' OR TargetInstance ISA 'AntiSpywareProduct'
                      Source: C:\Windows\System32\svchost.exeWMI Queries: IWbemServices::CreateInstanceEnum - ROOT\SecurityCenter2 : FirewallProduct
                      Source: C:\Windows\System32\svchost.exeWMI Queries: IWbemServices::CreateInstanceEnum - ROOT\SecurityCenter2 : AntiVirusProduct
                      Source: C:\Windows\System32\svchost.exeWMI Queries: IWbemServices::CreateInstanceEnum - ROOT\SecurityCenter2 : AntiSpywareProduct
                      Source: Amcache.hve.LOG1.13.dr, Amcache.hve.13.drBinary or memory string: c:\users\user\desktop\procexp.exe
                      Source: Amcache.hve.13.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
                      Source: svchost.exe, 00000002.00000002.681136636.000001D8FEA3D000.00000004.00000001.sdmpBinary or memory string: ,@V%ProgramFiles%\Windows Defender\MsMpeng.exe
                      Source: svchost.exe, 00000002.00000002.681096557.000001D8FEA13000.00000004.00000001.sdmp, svchost.exe, 00000002.00000002.681175010.000001D8FEB02000.00000004.00000001.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
                      Source: Amcache.hve.LOG1.13.dr, Amcache.hve.13.drBinary or memory string: procexp.exe

                      Stealing of Sensitive Information:

                      barindex
                      Yara detected EmotetShow sources
                      Source: Yara matchFile source: 17.2.rundll32.exe.49b0000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 15.2.rundll32.exe.4c00000.7.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.rundll32.exe.4a90000.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.loaddll32.exe.10d0000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 15.2.rundll32.exe.4b70000.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 15.2.rundll32.exe.4bd0000.6.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 7.2.rundll32.exe.29c0000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.rundll32.exe.4b90000.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 17.2.rundll32.exe.3130000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 15.2.rundll32.exe.2b10000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.rundll32.exe.4cf0000.6.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.rundll32.exe.4bc0000.5.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.rundll32.exe.2c40000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 7.2.rundll32.exe.29c0000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.2.regsvr32.exe.3250000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 15.2.rundll32.exe.4ba0000.5.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.0.loaddll32.exe.10d0000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.2.regsvr32.exe.4b90000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.rundll32.exe.4b90000.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.rundll32.exe.4a90000.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.0.loaddll32.exe.10a0000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.rundll32.exe.4d50000.8.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.0.loaddll32.exe.10a0000.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.loaddll32.exe.10a0000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.rundll32.exe.4cf0000.6.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.rundll32.exe.4590000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.0.loaddll32.exe.10a0000.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 15.2.rundll32.exe.4a30000.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.rundll32.exe.4d20000.7.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 17.2.rundll32.exe.3130000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.rundll32.exe.2c40000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.0.loaddll32.exe.10a0000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.rundll32.exe.4d50000.8.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.2.regsvr32.exe.3250000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 15.2.rundll32.exe.2b10000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 15.2.rundll32.exe.4ab0000.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 15.2.rundll32.exe.4bd0000.6.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 15.2.rundll32.exe.4b70000.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 15.2.rundll32.exe.2dd0000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.loaddll32.exe.10a0000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 7.2.rundll32.exe.4750000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.0.loaddll32.exe.10d0000.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.rundll32.exe.4ad0000.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 15.2.rundll32.exe.4a30000.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000008.00000002.345243637.0000000004BC1000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000008.00000002.344911121.0000000004591000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000F.00000002.385135770.0000000002DD1000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000008.00000002.345163882.0000000004AD1000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000F.00000002.385727612.0000000004B70000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000011.00000002.346835949.00000000049B1000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000000.301361831.00000000010D1000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000006.00000002.292884938.0000000003250000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.325185349.00000000010A0000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000011.00000002.346349668.0000000003130000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000008.00000002.345117733.0000000004A90000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000008.00000002.345389551.0000000004D50000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000F.00000002.385657332.0000000004AB1000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000F.00000002.385833414.0000000004BD0000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000000.301328959.00000000010A0000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000006.00000002.292946530.0000000004B91000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000000.299739915.00000000010D1000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000008.00000002.345356242.0000000004D21000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000008.00000002.344514792.0000000002C40000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000008.00000002.345313925.0000000004CF0000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000007.00000002.335991032.00000000029C0000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000000.299543600.00000000010A0000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000007.00000002.336442645.0000000004751000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.325240760.00000000010D1000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000008.00000002.345214624.0000000004B90000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000F.00000002.385786113.0000000004BA1000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000F.00000002.384990047.0000000002B10000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000F.00000002.385594738.0000000004A30000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000F.00000002.385904649.0000000004C01000.00000020.00000001.sdmp, type: MEMORY
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 6_2_10001160 WSAStartup,_memset,htonl,htons,socket,bind,setsockopt,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 7_2_10001160 WSAStartup,_memset,htonl,htons,socket,bind,setsockopt,

                      Mitre Att&ck Matrix

                      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                      Valid AccountsWindows Management Instrumentation1DLL Side-Loading1DLL Side-Loading1Disable or Modify Tools1Input Capture1System Time Discovery1Remote ServicesArchive Collected Data1Exfiltration Over Other Network MediumIngress Tool Transfer1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                      Default AccountsNative API2Boot or Logon Initialization ScriptsProcess Injection112Deobfuscate/Decode Files or Information1LSASS MemoryFile and Directory Discovery1Remote Desktop ProtocolInput Capture1Exfiltration Over BluetoothEncrypted Channel1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                      Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Obfuscated Files or Information2Security Account ManagerSystem Information Discovery25SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationNon-Standard Port1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                      Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)DLL Side-Loading1NTDSQuery Registry1Distributed Component Object ModelInput CaptureScheduled TransferApplication Layer Protocol1SIM Card SwapCarrier Billing Fraud
                      Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptFile Deletion1LSA SecretsSecurity Software Discovery51SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                      Replication Through Removable MediaLaunchdRc.commonRc.commonMasquerading2Cached Domain CredentialsVirtualization/Sandbox Evasion2VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                      External Remote ServicesScheduled TaskStartup ItemsStartup ItemsVirtualization/Sandbox Evasion2DCSyncProcess Discovery2Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                      Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobProcess Injection112Proc FilesystemApplication Window Discovery1Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
                      Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)Hidden Files and Directories1/etc/passwd and /etc/shadowRemote System Discovery1Software Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
                      Supply Chain CompromiseAppleScriptAt (Windows)At (Windows)Regsvr321Network SniffingProcess DiscoveryTaint Shared ContentLocal Data StagingExfiltration Over Unencrypted/Obfuscated Non-C2 ProtocolFile Transfer ProtocolsData Encrypted for Impact
                      Compromise Software Dependencies and Development ToolsWindows Command ShellCronCronRundll321Input CapturePermission Groups DiscoveryReplication Through Removable MediaRemote Data StagingExfiltration Over Physical MediumMail ProtocolsService Stop

                      Behavior Graph

                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet
                      behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 553387 Sample: PtBIxmYbK8.dll Startdate: 14/01/2022 Architecture: WINDOWS Score: 96 45 210.57.209.142 UNAIR-AS-IDUniversitasAirlanggaID Indonesia 2->45 47 85.214.67.203 STRATOSTRATOAGDE Germany 2->47 49 23 other IPs or domains 2->49 57 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->57 59 Found malware configuration 2->59 61 Multi AV Scanner detection for submitted file 2->61 63 3 other signatures 2->63 9 loaddll32.exe 1 2->9         started        11 svchost.exe 2->11         started        14 svchost.exe 4 2->14         started        16 5 other processes 2->16 signatures3 process4 signatures5 18 rundll32.exe 2 9->18         started        21 cmd.exe 1 9->21         started        23 regsvr32.exe 9->23         started        25 WerFault.exe 3 9 9->25         started        69 Changes security center settings (notifications, updates, antivirus, firewall) 11->69 27 MpCmdRun.exe 1 11->27         started        29 WerFault.exe 14->29         started        process6 signatures7 55 Hides that the sample has been downloaded from the Internet (zone.identifier) 18->55 31 rundll32.exe 18->31         started        33 rundll32.exe 21->33         started        35 rundll32.exe 23->35         started        37 conhost.exe 27->37         started        process8 process9 39 rundll32.exe 31->39         started        43 rundll32.exe 2 33->43         started        dnsIp10 51 45.138.98.34, 49752, 80 M247GB Germany 39->51 53 69.16.218.101, 49753, 8080 LIQUIDWEBUS United States 39->53 65 System process connects to network (likely due to code injection or exploit) 39->65 67 Hides that the sample has been downloaded from the Internet (zone.identifier) 43->67 signatures11

                      Screenshots

                      Thumbnails

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.

                      windows-stand

                      Antivirus, Machine Learning and Genetic Malware Detection

                      Initial Sample

                      SourceDetectionScannerLabelLink
                      PtBIxmYbK8.dll15%VirustotalBrowse

                      Dropped Files

                      No Antivirus matches

                      Unpacked PE Files

                      SourceDetectionScannerLabelLinkDownload
                      8.2.rundll32.exe.4bc0000.5.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      3.0.loaddll32.exe.10d0000.1.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      15.2.rundll32.exe.4c00000.7.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      6.2.regsvr32.exe.3250000.0.unpack100%AviraHEUR/AGEN.1145233Download File
                      3.2.loaddll32.exe.10d0000.1.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      8.2.rundll32.exe.4a90000.2.unpack100%AviraHEUR/AGEN.1145233Download File
                      15.2.rundll32.exe.2b10000.0.unpack100%AviraHEUR/AGEN.1145233Download File
                      8.2.rundll32.exe.4b90000.4.unpack100%AviraHEUR/AGEN.1145233Download File
                      7.2.rundll32.exe.29c0000.0.unpack100%AviraHEUR/AGEN.1145233Download File
                      17.2.rundll32.exe.49b0000.1.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      8.2.rundll32.exe.4cf0000.6.unpack100%AviraHEUR/AGEN.1145233Download File
                      15.2.rundll32.exe.4ba0000.5.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      15.2.rundll32.exe.4b70000.4.unpack100%AviraHEUR/AGEN.1145233Download File
                      6.2.regsvr32.exe.4b90000.1.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      8.2.rundll32.exe.4d50000.8.unpack100%AviraHEUR/AGEN.1145233Download File
                      3.2.loaddll32.exe.10a0000.0.unpack100%AviraHEUR/AGEN.1145233Download File
                      3.0.loaddll32.exe.10a0000.3.unpack100%AviraHEUR/AGEN.1145233Download File
                      8.2.rundll32.exe.4590000.1.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      8.2.rundll32.exe.2c40000.0.unpack100%AviraHEUR/AGEN.1145233Download File
                      8.2.rundll32.exe.4d20000.7.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      17.2.rundll32.exe.3130000.0.unpack100%AviraHEUR/AGEN.1145233Download File
                      3.0.loaddll32.exe.10a0000.0.unpack100%AviraHEUR/AGEN.1145233Download File
                      15.2.rundll32.exe.4bd0000.6.unpack100%AviraHEUR/AGEN.1145233Download File
                      15.2.rundll32.exe.4ab0000.3.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      15.2.rundll32.exe.2dd0000.1.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      8.2.rundll32.exe.4ad0000.3.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      3.0.loaddll32.exe.10d0000.4.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      7.2.rundll32.exe.4750000.1.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      15.2.rundll32.exe.4a30000.2.unpack100%AviraHEUR/AGEN.1145233Download File

                      Domains

                      No Antivirus matches

                      URLs

                      SourceDetectionScannerLabelLink
                      https://www.disneyplus.com/legal/your-california-privacy-rights0%URL Reputationsafe
                      http://crl.ver)0%Avira URL Cloudsafe
                      https://www.disneyplus.com/legal/privacy-policy0%URL Reputationsafe
                      https://www.tiktok.com/legal/report/feedback0%URL Reputationsafe
                      http://help.disneyplus.com.0%URL Reputationsafe
                      http://schemas.microft80%Avira URL Cloudsafe
                      https://disneyplus.com/legal.0%URL Reputationsafe

                      Domains and IPs

                      Contacted Domains

                      No contacted domains info

                      URLs from Memory and Binaries

                      NameSourceMaliciousAntivirus DetectionReputation
                      https://www.disneyplus.com/legal/your-california-privacy-rightssvchost.exe, 0000001A.00000003.441248860.0000023177791000.00000004.00000001.sdmp, svchost.exe, 0000001A.00000003.443775997.0000023177777000.00000004.00000001.sdmp, svchost.exe, 0000001A.00000003.441382268.00000231777B1000.00000004.00000001.sdmp, svchost.exe, 0000001A.00000003.441129492.000002317776C000.00000004.00000001.sdmp, svchost.exe, 0000001A.00000003.441267741.000002317776D000.00000004.00000001.sdmp, svchost.exe, 0000001A.00000003.441353106.00000231777D1000.00000004.00000001.sdmp, svchost.exe, 0000001A.00000003.441319649.000002317779B000.00000004.00000001.sdmp, svchost.exe, 0000001A.00000003.441399080.0000023177C02000.00000004.00000001.sdmp, svchost.exe, 0000001A.00000003.441299535.000002317777F000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://crl.ver)svchost.exe, 0000001A.00000002.472481866.0000023176EE7000.00000004.00000001.sdmpfalse
                      • Avira URL Cloud: safe
                      low
                      https://www.disneyplus.com/legal/privacy-policysvchost.exe, 0000001A.00000003.441248860.0000023177791000.00000004.00000001.sdmp, svchost.exe, 0000001A.00000003.443775997.0000023177777000.00000004.00000001.sdmp, svchost.exe, 0000001A.00000003.441382268.00000231777B1000.00000004.00000001.sdmp, svchost.exe, 0000001A.00000003.441129492.000002317776C000.00000004.00000001.sdmp, svchost.exe, 0000001A.00000003.441267741.000002317776D000.00000004.00000001.sdmp, svchost.exe, 0000001A.00000003.441353106.00000231777D1000.00000004.00000001.sdmp, svchost.exe, 0000001A.00000003.441319649.000002317779B000.00000004.00000001.sdmp, svchost.exe, 0000001A.00000003.441399080.0000023177C02000.00000004.00000001.sdmp, svchost.exe, 0000001A.00000003.441299535.000002317777F000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://upx.sf.netAmcache.hve.13.drfalse
                        high
                        https://www.tiktok.com/legal/report/feedbacksvchost.exe, 0000001A.00000003.445321406.000002317777F000.00000004.00000001.sdmp, svchost.exe, 0000001A.00000003.446551226.000002317777F000.00000004.00000001.sdmp, svchost.exe, 0000001A.00000003.446523607.0000023177C02000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://help.disneyplus.com.svchost.exe, 0000001A.00000003.441248860.0000023177791000.00000004.00000001.sdmp, svchost.exe, 0000001A.00000003.443775997.0000023177777000.00000004.00000001.sdmp, svchost.exe, 0000001A.00000003.441382268.00000231777B1000.00000004.00000001.sdmp, svchost.exe, 0000001A.00000003.441129492.000002317776C000.00000004.00000001.sdmp, svchost.exe, 0000001A.00000003.441267741.000002317776D000.00000004.00000001.sdmp, svchost.exe, 0000001A.00000003.441353106.00000231777D1000.00000004.00000001.sdmp, svchost.exe, 0000001A.00000003.441319649.000002317779B000.00000004.00000001.sdmp, svchost.exe, 0000001A.00000003.441399080.0000023177C02000.00000004.00000001.sdmp, svchost.exe, 0000001A.00000003.441299535.000002317777F000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://schemas.microft8svchost.exe, 0000001A.00000002.472756328.000002317771F000.00000004.00000001.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://disneyplus.com/legal.svchost.exe, 0000001A.00000003.441248860.0000023177791000.00000004.00000001.sdmp, svchost.exe, 0000001A.00000003.443775997.0000023177777000.00000004.00000001.sdmp, svchost.exe, 0000001A.00000003.441382268.00000231777B1000.00000004.00000001.sdmp, svchost.exe, 0000001A.00000003.441129492.000002317776C000.00000004.00000001.sdmp, svchost.exe, 0000001A.00000003.441267741.000002317776D000.00000004.00000001.sdmp, svchost.exe, 0000001A.00000003.441353106.00000231777D1000.00000004.00000001.sdmp, svchost.exe, 0000001A.00000003.441319649.000002317779B000.00000004.00000001.sdmp, svchost.exe, 0000001A.00000003.441399080.0000023177C02000.00000004.00000001.sdmp, svchost.exe, 0000001A.00000003.441299535.000002317777F000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        unknown

                        Contacted IPs

                        • No. of IPs < 25%
                        • 25% < No. of IPs < 50%
                        • 50% < No. of IPs < 75%
                        • 75% < No. of IPs

                        Public

                        IPDomainCountryFlagASNASN NameMalicious
                        207.148.81.119
                        unknownUnited States
                        20473AS-CHOOPAUStrue
                        104.131.62.48
                        unknownUnited States
                        14061DIGITALOCEAN-ASNUStrue
                        85.214.67.203
                        unknownGermany
                        6724STRATOSTRATOAGDEtrue
                        191.252.103.16
                        unknownBrazil
                        27715LocawebServicosdeInternetSABRtrue
                        168.197.250.14
                        unknownArgentina
                        264776OmarAnselmoRipollTDCNETARtrue
                        66.42.57.149
                        unknownUnited States
                        20473AS-CHOOPAUStrue
                        185.148.168.15
                        unknownGermany
                        44780EVERSCALE-ASDEtrue
                        51.210.242.234
                        unknownFrance
                        16276OVHFRtrue
                        217.182.143.207
                        unknownFrance
                        16276OVHFRtrue
                        69.16.218.101
                        unknownUnited States
                        32244LIQUIDWEBUStrue
                        159.69.237.188
                        unknownGermany
                        24940HETZNER-ASDEtrue
                        45.138.98.34
                        unknownGermany
                        9009M247GBtrue
                        116.124.128.206
                        unknownKorea Republic of
                        9318SKB-ASSKBroadbandCoLtdKRtrue
                        78.46.73.125
                        unknownGermany
                        24940HETZNER-ASDEtrue
                        37.59.209.141
                        unknownFrance
                        16276OVHFRtrue
                        210.57.209.142
                        unknownIndonesia
                        38142UNAIR-AS-IDUniversitasAirlanggaIDtrue
                        185.148.168.220
                        unknownGermany
                        44780EVERSCALE-ASDEtrue
                        54.37.228.122
                        unknownFrance
                        16276OVHFRtrue
                        190.90.233.66
                        unknownColombia
                        18678INTERNEXASAESPCOtrue
                        142.4.219.173
                        unknownCanada
                        16276OVHFRtrue
                        54.38.242.185
                        unknownFrance
                        16276OVHFRtrue
                        195.154.146.35
                        unknownFrance
                        12876OnlineSASFRtrue
                        195.77.239.39
                        unknownSpain
                        60493FICOSA-ASEStrue
                        78.47.204.80
                        unknownGermany
                        24940HETZNER-ASDEtrue
                        37.44.244.177
                        unknownGermany
                        47583AS-HOSTINGERLTtrue
                        62.171.178.147
                        unknownUnited Kingdom
                        51167CONTABODEtrue
                        128.199.192.135
                        unknownUnited Kingdom
                        14061DIGITALOCEAN-ASNUStrue

                        General Information

                        Joe Sandbox Version:34.0.0 Boulder Opal
                        Analysis ID:553387
                        Start date:14.01.2022
                        Start time:20:02:52
                        Joe Sandbox Product:CloudBasic
                        Overall analysis duration:0h 13m 27s
                        Hypervisor based Inspection enabled:false
                        Report type:light
                        Sample file name:PtBIxmYbK8.dll
                        Cookbook file name:default.jbs
                        Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                        Run name:Run with higher sleep bypass
                        Number of analysed new started processes analysed:31
                        Number of new started drivers analysed:0
                        Number of existing processes analysed:0
                        Number of existing drivers analysed:0
                        Number of injected processes analysed:0
                        Technologies:
                        • HCA enabled
                        • EGA enabled
                        • HDC enabled
                        • AMSI enabled
                        Analysis Mode:default
                        Analysis stop reason:Timeout
                        Detection:MAL
                        Classification:mal96.troj.evad.winDLL@32/11@0/27
                        EGA Information:
                        • Successful, ratio: 100%
                        HDC Information:
                        • Successful, ratio: 89.6% (good quality ratio 83.1%)
                        • Quality average: 70.4%
                        • Quality standard deviation: 27.3%
                        HCA Information:
                        • Successful, ratio: 79%
                        • Number of executed functions: 0
                        • Number of non-executed functions: 0
                        Cookbook Comments:
                        • Adjust boot time
                        • Enable AMSI
                        • Sleeps bigger than 120000ms are automatically reduced to 1000ms
                        • Found application associated with file extension: .dll
                        Warnings:
                        Show All
                        • Exclude process from analysis (whitelisted): audiodg.exe, BackgroundTransferHost.exe, WMIADAP.exe, backgroundTaskHost.exe, wuapihost.exe
                        • Excluded IPs from analysis (whitelisted): 23.211.6.115, 173.222.108.210, 173.222.108.226, 20.54.110.249, 40.91.112.76
                        • Excluded domains from analysis (whitelisted): client.wns.windows.com, displaycatalog-rp-uswest.md.mp.microsoft.com.akadns.net, displaycatalog-rp-europe.md.mp.microsoft.com.akadns.net, wu-shim.trafficmanager.net, neu-displaycatalogrp.frontdoor.bigcatalog.commerce.microsoft.com, store-images.s-microsoft.com-c.edgekey.net, ctldl.windowsupdate.com, a767.dspw65.akamai.net, wus2-displaycatalogrp.frontdoor.bigcatalog.commerce.microsoft.com, arc.msn.com, download.windowsupdate.com.edgesuite.net, ris.api.iris.microsoft.com, e12564.dspb.akamaiedge.net, consumer-displaycatalogrp-aks2aks-europe.md.mp.microsoft.com.akadns.net, store-images.s-microsoft.com, consumer-displaycatalogrp-aks2aks-uswest.md.mp.microsoft.com.akadns.net, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, displaycatalog-rp.md.mp.microsoft.com.akadns.net
                        • Not all processes where analyzed, report is missing behavior information
                        • Report creation exceeded maximum time and may have missing disassembly code information.
                        • Report size exceeded maximum capacity and may have missing behavior information.
                        • Report size getting too big, too many NtOpenKeyEx calls found.
                        • Report size getting too big, too many NtProtectVirtualMemory calls found.
                        • Report size getting too big, too many NtQueryValueKey calls found.

                        Simulations

                        Behavior and APIs

                        TimeTypeDescription
                        20:04:48API Interceptor1x Sleep call for process: MpCmdRun.exe modified

                        Joe Sandbox View / Context

                        IPs

                        No context

                        Domains

                        No context

                        ASN

                        No context

                        JA3 Fingerprints

                        No context

                        Dropped Files

                        No context

                        Created / dropped Files

                        C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_loaddll32.exe_7d3365b34093db6d884642e334bbbe4e6283fce_7cac0383_0272cd40\Report.wer
                        Process:C:\Windows\SysWOW64\WerFault.exe
                        File Type:Little-endian UTF-16 Unicode text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):65536
                        Entropy (8bit):0.7985331633287416
                        Encrypted:false
                        SSDEEP:96:Lv66nYyQy9haol7JfapXIQcQSc6mcEUcw3/s+a+z+HbHgkVG4rmMoVazWbSmEBFy:jnMHsieryjkq/u7s0S274ItW
                        MD5:AFC1C4564AB105F40D5BA5AFD0351FF4
                        SHA1:6126052F8BDEB597CFE3DB1E4F9ED5D8A744B419
                        SHA-256:EE56A6D17AF0FF885CDD1E1BD7FBAFBDB765F9698BA9DEB8C85D78D597CB3427
                        SHA-512:0E4C255C85671EC40DE3C4F8CEB3EA1A8DBAF7363F2C50A6B7612207477E1AC4DB5BA9B21636233253E860DD65837A8D246B13926798BD9AA8E58CD4FF286809
                        Malicious:false
                        Preview: ..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.2.8.6.6.9.3.0.3.7.2.8.8.5.1.9.9.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.2.2.c.2.2.8.4.1.-.4.8.c.d.-.4.6.1.6.-.a.b.a.c.-.9.8.e.e.2.1.1.2.e.8.2.f.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.b.b.3.1.f.7.d.0.-.5.1.8.1.-.4.6.3.5.-.9.a.a.8.-.3.3.5.1.3.5.1.e.8.1.4.b.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.l.o.a.d.d.l.l.3.2...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.7.a.0.-.0.0.0.1.-.0.0.1.c.-.7.9.7.f.-.e.2.e.4.c.4.0.9.d.8.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.d.a.3.9.a.3.e.e.5.e.6.b.4.b.0.d.3.2.5.5.b.f.e.f.9.5.6.0.1.8.9.0.a.f.d.8.0.7.0.9.!.0.0.0.0.d.a.3.9.a.3.e.e.5.e.6.b.4.b.0.d.3.2.5.5.b.f.e.f.9.5.6.0.1.8.9.0.a.f.d.8.0.7.0.9.!.l.o.a.d.d.l.l.3.2...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.2.0.2.1././.1.2././.1.3.:.0.9.:.0.7.:.1.6.!.0.!.l.o.a.d.d.l.l.3.2...e.x.e.....B.o.o.t.I.d.=.4.2.9.4.
                        C:\ProgramData\Microsoft\Windows\WER\Temp\WER5DF2.tmp.csv
                        Process:C:\Windows\System32\svchost.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):53140
                        Entropy (8bit):3.0665363693583627
                        Encrypted:false
                        SSDEEP:1536:jzHNOQxfYcEifLr594gjMWbQXJzZjy9a3yjga3ZFOm:jzHNOQxfYcEifLr594gjMWbQXJljy9as
                        MD5:F52FBB303D46ACEA507D6D4D3902D333
                        SHA1:22A15B84910B6C0B73A9DAF40F3BFA2067789F3A
                        SHA-256:2AF572314496B3EF739EE40EA422AD12CC3C320A7597D0070A50E959E4C14079
                        SHA-512:9479FA51E90C40ADC129ABBCEB8171A66DC34FB3D4FAB1BF4AC02A3A02863AF80B8AD3153A0CB39B409795B5E9733B6804271A944C9FB1666C7AB73753DDDA43
                        Malicious:false
                        Preview: I.m.a.g.e.N.a.m.e.,.U.n.i.q.u.e.P.r.o.c.e.s.s.I.d.,.N.u.m.b.e.r.O.f.T.h.r.e.a.d.s.,.W.o.r.k.i.n.g.S.e.t.P.r.i.v.a.t.e.S.i.z.e.,.H.a.r.d.F.a.u.l.t.C.o.u.n.t.,.N.u.m.b.e.r.O.f.T.h.r.e.a.d.s.H.i.g.h.W.a.t.e.r.m.a.r.k.,.C.y.c.l.e.T.i.m.e.,.C.r.e.a.t.e.T.i.m.e.,.U.s.e.r.T.i.m.e.,.K.e.r.n.e.l.T.i.m.e.,.B.a.s.e.P.r.i.o.r.i.t.y.,.P.e.a.k.V.i.r.t.u.a.l.S.i.z.e.,.V.i.r.t.u.a.l.S.i.z.e.,.P.a.g.e.F.a.u.l.t.C.o.u.n.t.,.W.o.r.k.i.n.g.S.e.t.S.i.z.e.,.P.e.a.k.W.o.r.k.i.n.g.S.e.t.S.i.z.e.,.Q.u.o.t.a.P.e.a.k.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.Q.u.o.t.a.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.Q.u.o.t.a.P.e.a.k.N.o.n.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.Q.u.o.t.a.N.o.n.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.P.a.g.e.f.i.l.e.U.s.a.g.e.,.P.e.a.k.P.a.g.e.f.i.l.e.U.s.a.g.e.,.P.r.i.v.a.t.e.P.a.g.e.C.o.u.n.t.,.R.e.a.d.O.p.e.r.a.t.i.o.n.C.o.u.n.t.,.W.r.i.t.e.O.p.e.r.a.t.i.o.n.C.o.u.n.t.,.O.t.h.e.r.O.p.e.r.a.t.i.o.n.C.o.u.n.t.,.R.e.a.d.T.r.a.n.s.f.e.r.C.o.u.n.t.,.W.r.i.t.e.T.r.a.n.s.f.e.r.C.o.u.n.t.,.O.t.h.e.r.T.r.a.n.s.f.e.r.C.o.u.n.t.,.H.a.n.
                        C:\ProgramData\Microsoft\Windows\WER\Temp\WER62D5.tmp.txt
                        Process:C:\Windows\System32\svchost.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):13340
                        Entropy (8bit):2.6958391193387743
                        Encrypted:false
                        SSDEEP:96:9GiZYWPMBu4ZYaYYWQiHBUYEZAMtk0igO+pTwH2Yaez/T1DPIDw3:9jZDQNQFPaez/T1DgDw3
                        MD5:4002FB61C05D0AE9335403CA8E993B0E
                        SHA1:703ABE06F995F2426AA0698E9DE50EF5E6D6F5C2
                        SHA-256:A49CDE3F63D1F9072DA8916B738B82FF9D03A798E9ED0A4B89D708B41690E0D1
                        SHA-512:9677D31E7030837A681ED30FA7084A81EEA4D95BB7696839A7C48E35128DE30485F8F898A0EE6BC862365FDE26DF1F6CFDAB8E52FE0CC1EFA88B27EE48AF06C9
                        Malicious:false
                        Preview: B...T.i.m.e.r.R.e.s.o.l.u.t.i.o.n. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1.5.6.2.5.0.....B...P.a.g.e.S.i.z.e. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4.0.9.6.....B...N.u.m.b.e.r.O.f.P.h.y.s.i.c.a.l.P.a.g.e.s. . . . . . . . . . . . . . . . . . . . . . . . . . .1.0.4.8.3.1.5.....B...L.o.w.e.s.t.P.h.y.s.i.c.a.l.P.a.g.e.N.u.m.b.e.r. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1.....B...H.i.g.h.e.s.t.P.h.y.s.i.c.a.l.P.a.g.e.N.u.m.b.e.r. . . . . . . . . . . . . . . . . . . . . . .1.3.1.0.7.1.9.....B...A.l.l.o.c.a.t.i.o.n.G.r.a.n.u.l.a.r.i.t.y. . . . . . . . . . . . . . . . . . . . . . . . . . . . .6.5.5.3.6.....B...M.i.n.i.m.u.m.U.s.e.r.M.o.d.e.A.d.d.r.e.s.s. . . . . . . . . . . . . . . . . . . . . . . . . . . .6.5.5.3.6.....B...M.a.x.i.m.u.m.U.s.e.r.M.o.d.e.A.d.d.r.e.s.s. . . . . . . . . . . . . . . . . .1.4.0.7.3.7.4.8.8.2.8.9.7.9.1.....B...A.c.t.i.v.e.P.r.o.c.e.s.s.o.r.s.A.f.f.i.n.i.t.y.M.a.s.k. . . . . . .
                        C:\ProgramData\Microsoft\Windows\WER\Temp\WERBA15.tmp.dmp
                        Process:C:\Windows\SysWOW64\WerFault.exe
                        File Type:Mini DuMP crash report, 15 streams, Sat Jan 15 04:03:58 2022, 0x1205a4 type
                        Category:dropped
                        Size (bytes):42856
                        Entropy (8bit):2.1705056676349983
                        Encrypted:false
                        SSDEEP:192:qbUWY/OaN7T2XHn2IZtfiWMWMw/f18iCzRACXCm8zzAuo:/saNCHn2IvzMw/l0RbXCmG
                        MD5:A61C984381BA5336C141C7C554D6DCFA
                        SHA1:0B3F61AED2D78E94472EE5824C4C0F643A93E751
                        SHA-256:5FE29F80ED67BD6B289F8F445AE81F26DC29F067775073CB8C559D1179FFECF6
                        SHA-512:38C653605BB15DCD6F18C64477A069A75D907F75DC36EE3FFBEFDFB43DDB38B559CA30883363AEF9E0DCF32EA97A75EC88922CDB7FAD4EA1246C078145B826C1
                        Malicious:false
                        Preview: MDMP....... ........G.a....................................$...T............%..........`.......8...........T...........................x...........d....................................................................U...........B..............GenuineIntelW...........T............G.a.............................0..................P.a.c.i.f.i.c. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................P.a.c.i.f.i.c. .D.a.y.l.i.g.h.t. .T.i.m.e...........................................1.7.1.3.4...1...x.8.6.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.........................................................................................................................................................................................................................................................................................................................................................................................................................................
                        C:\ProgramData\Microsoft\Windows\WER\Temp\WERC08F.tmp.WERInternalMetadata.xml
                        Process:C:\Windows\SysWOW64\WerFault.exe
                        File Type:XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):8348
                        Entropy (8bit):3.697553046851639
                        Encrypted:false
                        SSDEEP:192:Rrl7r3GLNiAj6H48w6YFBSUlhgmfzSwGcCpBs89bWCsfIym:RrlsNi86Y8w6YDSUlhgmfzSwuWBfs
                        MD5:4921D3CC7AB9FDCEB2A43F2FB60791E6
                        SHA1:5AE1107EA7F43084D3F9841B0993C90A820256E9
                        SHA-256:D2FA6BD7B8488A50D55007ED2A11740BC55F5A230F0A74C6517F989DE2C0F32C
                        SHA-512:AD77CBFBEFCB64F843F202A3D287252F4B367A2E03254B2A299A992F33BA76A28093195D2CCDAE9105A97E54AA2000ADC120C0C2DF1184100606B02284D9DA0B
                        Malicious:false
                        Preview: ..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.7.1.3.4.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.7.1.3.4...1...a.m.d.6.4.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.1.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.1.0.3.3.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.6.0.4.8.<./.P.i.d.>.......
                        C:\ProgramData\Microsoft\Windows\WER\Temp\WERC533.tmp.xml
                        Process:C:\Windows\SysWOW64\WerFault.exe
                        File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):4598
                        Entropy (8bit):4.470187185609834
                        Encrypted:false
                        SSDEEP:48:cvIwSD8zsPJgtWI9mwWSC8BK8fm8M4J2+WZFTN+q84pvSc6MKcQIcQw0yd:uITfxlJSNFJAt5Sc6MKkw0yd
                        MD5:D6B94D63CF63FEA265F189BA04969BAE
                        SHA1:64BA5ADB10E55EDC2FF3A9A2EC6953BFB96500C6
                        SHA-256:5179EF6B1DB03318AEEA11555D4FF5188FFCDF2277AFF080712043C5722117C3
                        SHA-512:E4B6A05FF61D69E2D48DDE086CCFDB59F9295A3550EBF9101295E8D69962FC4CD2A40D34CC15B6A77FD20251133ACAA69B6DB19CF175EF5B5CC5BE689111456E
                        Malicious:false
                        Preview: <?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="17134" />.. <arg nm="vercsdbld" val="1" />.. <arg nm="verqfe" val="1" />.. <arg nm="csdbld" val="1" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="1033" />.. <arg nm="geoid" val="244" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="1342874" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.1.17134.0-11.0.47" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="4096" />..
                        C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
                        Process:C:\Windows\SysWOW64\rundll32.exe
                        File Type:Microsoft Cabinet archive data, 61414 bytes, 1 file
                        Category:dropped
                        Size (bytes):61414
                        Entropy (8bit):7.995245868798237
                        Encrypted:true
                        SSDEEP:1536:EysgU6qmzixT64jYMZ8HbVPGfVDwm/xLZ9rP:wF6qmeo4eH1m9wmLvrP
                        MD5:ACAEDA60C79C6BCAC925EEB3653F45E0
                        SHA1:2AAAE490BCDACCC6172240FF1697753B37AC5578
                        SHA-256:6B0CECCF0103AFD89844761417C1D23ACC41F8AEBF3B7230765209B61EEE5658
                        SHA-512:FEAA6E7ED7DDA1583739B3E531AB5C562A222EE6ECD042690AE7DCFF966717C6E968469A7797265A11F6E899479AE0F3031E8CF5BEBE1492D5205E9C59690900
                        Malicious:false
                        Preview: MSCF............,...................I.......;w........RSNj .authroot.stl..>.(.5..CK..8T....c_.d...A.K...+.d.H..*i.RJJ.IQIR..$t)Kd.-[..T\{..ne......<.w......A..B........c...wi......D....c.0D,L........fy....Rg...=........i,3.3..Z....~^ve<...TF.*...f.zy.,...m.@.0.0...m.3..I(..+..v#...(.2....e...L..*y..V.......~U...."<ke.....l.X:Dt..R<7.5\A7L0=..T.V...IDr..8<....r&...I-.^..b.b.".Af....E.._..r.>.`;,.Hob..S.....7'..\.R$.".g..+..64..@nP.....k3...B.`.G..@D.....L.....`^...#OpW.....!....`.....rf:.}.R.@....gR.#7....l..H.#...d.Qh..3..fCX....==#..M.l..~&....[.J9.\..Ww.....Tx.%....]..a4E...q.+...#.*a..x..O..V.t..Y1!.T..`U...-...< _@...|(.....0..3.`.LU...E0.Gu.4KN....5...?.....I.p..'..........N<.d.O..dH@c1t...[w/...T....cYK.X>.0..Z.....O>..9.3.#9X.%.b...5.YK.E.V.....`./.3.._..nN]..=..M.o.F.._..z....._...gY..!Z..?l....vp.l.:.d.Z..W.....~...N.._.k...&.....$......i.F.d.....D!e.....Y..,.E..m.;.1... $.F..O.F.o_}.uG....,.%.>,.Zx.......o....c../.;....g&.....
                        C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
                        Process:C:\Windows\SysWOW64\rundll32.exe
                        File Type:data
                        Category:modified
                        Size (bytes):328
                        Entropy (8bit):3.1122616792999316
                        Encrypted:false
                        SSDEEP:6:kKtgV37k8SN+SkQlPlEGYRMY9z+4KlDA3RUeYlUmlUR/t:qh9kPlE99SNxAhUeYlUSA/t
                        MD5:DE093B49307EC502CEBE65A77B943BBD
                        SHA1:9A2FC05159174A0E130F2297B89FC9D0D20B41A2
                        SHA-256:45AAE5DBE0908228FCDD619F90162D50BF5C4BE359159F8CE0E094BA6031AFFE
                        SHA-512:CBF10732E58870C9A8CEDA6EF2DDB6EECF2C67CC18E6F9DF230F675252A2F9BF6225D9D106DF5294E7A3D5473C6B0F71A74FE28F9591F831D2ABF55210C6DE17
                        Malicious:false
                        Preview: p...... ................(....................................................... ........q.\].......&...............h.t.t.p.:././.c.t.l.d.l...w.i.n.d.o.w.s.u.p.d.a.t.e...c.o.m./.m.s.d.o.w.n.l.o.a.d./.u.p.d.a.t.e./.v.3./.s.t.a.t.i.c./.t.r.u.s.t.e.d.r./.e.n./.a.u.t.h.r.o.o.t.s.t.l...c.a.b...".0.7.1.e.1.5.c.5.d.c.4.d.7.1.:.0."...
                        C:\Windows\ServiceProfiles\LocalService\AppData\Local\Temp\MpCmdRun.log
                        Process:C:\Program Files\Windows Defender\MpCmdRun.exe
                        File Type:Little-endian UTF-16 Unicode text, with CRLF, CR line terminators
                        Category:modified
                        Size (bytes):9062
                        Entropy (8bit):3.162538052708815
                        Encrypted:false
                        SSDEEP:192:cY+38+DJl+ibJ6+ioJJ+i3N+WtT+E9tD+Ett3d+E3ze+M:j+s+v+b+P+m+0+Q+q+V+M
                        MD5:6E1661D1AD5773B3FD07351B5E51A4FA
                        SHA1:5DD9F2DBCD9D30F2E5A0AB48380CD91CF5D526C0
                        SHA-256:2A4D7FC4EE89954D4FF14951EF91362D6FF19F5416AD2591D4A1ED4429872FC3
                        SHA-512:CE217C2B4848E1463BFC915F2B5230B9E265CB4F41247B59C86A3810C96DFDA90A35DCDEA0753CE70D263B72ADC4C795E103AA96EBA0AC0D61BD99EC6D06DF36
                        Malicious:false
                        Preview: ..........-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.....M.p.C.m.d.R.u.n.:. .C.o.m.m.a.n.d. .L.i.n.e.:. .".C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.W.i.n.d.o.w.s. .D.e.f.e.n.d.e.r.\.m.p.c.m.d.r.u.n...e.x.e.". .-.w.d.e.n.a.b.l.e..... .S.t.a.r.t. .T.i.m.e.:. .. T.h.u. .. J.u.n. .. 2.7. .. 2.0.1.9. .0.1.:.2.9.:.4.9.........M.p.E.n.s.u.r.e.P.r.o.c.e.s.s.M.i.t.i.g.a.t.i.o.n.P.o.l.i.c.y.:. .h.r. .=. .0.x.1.....W.D.E.n.a.b.l.e.....E.R.R.O.R.:. .M.p.W.D.E.n.a.b.l.e.(.T.R.U.E.). .f.a.i.l.e.d. .(.8.0.0.7.0.4.E.C.).....M.p.C.m.d.R.u.n.:. .E.n.d. .T.i.m.e.:. .. T.h.u. .. J.u.n. .. 2.7. .. 2.0.1.9. .0.1.:.2.9.:.4.9.....-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.............-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.
                        C:\Windows\appcompat\Programs\Amcache.hve
                        Process:C:\Windows\SysWOW64\WerFault.exe
                        File Type:MS Windows registry file, NT/2000 or above
                        Category:dropped
                        Size (bytes):1572864
                        Entropy (8bit):4.2716130681766735
                        Encrypted:false
                        SSDEEP:12288:oTt8z1DzOCemPdSjOSqUIMKd1IxP+liqWW2RrOUgzZJDKm858RZUs:Mt8z1DzOCemPdS8q
                        MD5:754DC6021A427391CEB10B0B0788BF1A
                        SHA1:620C090DD97D79C9EC0F0D67193F09A65B75B65A
                        SHA-256:D4D48ADDFB881E977BEAB57796D610B379241FD5F049B79DDB1975788167A4AF
                        SHA-512:3D4F0EF7E5ACB41552D18C91FBCA75B1C4F496FFE4C951854F0664B3D2CDFA364262CA22170B14A60609F2E1CAC2569F326ED8E4589A8886BDB06100DDDB465B
                        Malicious:false
                        Preview: regfZ...Z...p.\..,.................. ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e...4............E.4............E.....5............E.rmtm...................................................................................................................................................................................................................................................................................................................................................F<..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        C:\Windows\appcompat\Programs\Amcache.hve.LOG1
                        Process:C:\Windows\SysWOW64\WerFault.exe
                        File Type:MS Windows registry file, NT/2000 or above
                        Category:dropped
                        Size (bytes):16384
                        Entropy (8bit):3.3956748233186427
                        Encrypted:false
                        SSDEEP:192:Qk9Bw1v9zRe16Yb5FSEsWftx1YxgoJ4XPaJNSdkyFn6yvRrsfrWfYjdsiDoXzCk:rz/5Rftx1YPJ4XP7FFn70Zd1DoXzCk
                        MD5:989DFA9515A5ECCACC513E8C17957DB1
                        SHA1:4D8AAB49E3C3FD21B4CF4E3E14DD39A43053DFE7
                        SHA-256:8AF28AEBD07D3018F1D306E2D3290503C3E01D4DF3B6941C879536052101325D
                        SHA-512:E8863D5AC62AA155284FFAA05DA5818481B18D37A87E037B0113A2BBC8CE66A4F04A9F770F87BC48DEA676D73F1BA6213B30BBADF0549FDA436068F36079DED8
                        Malicious:false
                        Preview: regfY...Y...p.\..,.................. ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e...4............E.4............E.....5............E.rmtm...................................................................................................................................................................................................................................................................................................................................................@<..HvLE.>......Y...........k.r1.h....Y2.............0..............hbin................p.\..,..........nk,.............@........................... ...........................&...{ad79c032-a2ea-f756-e377-72fb9332c3ae}......nk ............. ........................... .......Z.......................Root........lf......Root....nk ..........................}.............. ...............*...............DeviceCensus.......................vk..................WritePermissionsCheck.......p...

                        Static File Info

                        General

                        File type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                        Entropy (8bit):6.76761459656839
                        TrID:
                        • Win32 Dynamic Link Library (generic) (1002004/3) 98.32%
                        • Windows Screen Saver (13104/52) 1.29%
                        • Generic Win/DOS Executable (2004/3) 0.20%
                        • DOS Executable Generic (2002/1) 0.20%
                        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                        File name:PtBIxmYbK8.dll
                        File size:588288
                        MD5:cdf3dc30cd25f5dc97c5f7b9c2d1abe5
                        SHA1:2e60ddf31429088419bdd186f10ff5e2d437236c
                        SHA256:9b571f59abe91b0684fec7bc2311225630ee92c647cd91f37847cd5f8f1dc85c
                        SHA512:95c410febe7bcd616f8836ba417d9e46fc94369d102b5debb2fcf57d2613aa7de09300a47858ba583bfc6935986506856be94ce4f6047ac6b36a6abc74104e6c
                        SSDEEP:6144:cNU5LwA22222GgngDrDRVyYli/ci2tEGW78ODQiEatvOSk5DKXOW14IkFxVFgY4E:x5w7YM/cYVV7EDOpOJyvnHtytFyQ
                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........m.......................................^F......^P.n....^W.t....^Y......^A......^G......^B.....Rich....................PE..L..

                        File Icon

                        Icon Hash:71b018ccc6577131

                        Static PE Info

                        General

                        Entrypoint:0x1002eaac
                        Entrypoint Section:.text
                        Digitally signed:false
                        Imagebase:0x10000000
                        Subsystem:windows gui
                        Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE, DLL
                        DLL Characteristics:
                        Time Stamp:0x61E03DE6 [Thu Jan 13 14:57:42 2022 UTC]
                        TLS Callbacks:
                        CLR (.Net) Version:
                        OS Version Major:5
                        OS Version Minor:0
                        File Version Major:5
                        File Version Minor:0
                        Subsystem Version Major:5
                        Subsystem Version Minor:0
                        Import Hash:7f57698bb210fa88a6b01b1feaf20957

                        Entrypoint Preview

                        Instruction
                        mov edi, edi
                        push ebp
                        mov ebp, esp
                        cmp dword ptr [ebp+0Ch], 01h
                        jne 00007F3738C888D7h
                        call 00007F3738C91148h
                        push dword ptr [ebp+08h]
                        mov ecx, dword ptr [ebp+10h]
                        mov edx, dword ptr [ebp+0Ch]
                        call 00007F3738C887C1h
                        pop ecx
                        pop ebp
                        retn 000Ch
                        mov edi, edi
                        push ebp
                        mov ebp, esp
                        push esi
                        push edi
                        mov edi, dword ptr [ebp+10h]
                        mov eax, edi
                        sub eax, 00000000h
                        je 00007F3738C89EBBh
                        dec eax
                        je 00007F3738C89EA3h
                        dec eax
                        je 00007F3738C89E6Eh
                        dec eax
                        je 00007F3738C89E1Fh
                        dec eax
                        je 00007F3738C89D8Fh
                        mov ecx, dword ptr [ebp+0Ch]
                        mov eax, dword ptr [ebp+08h]
                        push ebx
                        push 00000020h
                        pop edx
                        jmp 00007F3738C88D47h
                        mov esi, dword ptr [eax]
                        cmp esi, dword ptr [ecx]
                        je 00007F3738C8894Eh
                        movzx esi, byte ptr [eax]
                        movzx ebx, byte ptr [ecx]
                        sub esi, ebx
                        je 00007F3738C888E7h
                        xor ebx, ebx
                        test esi, esi
                        setnle bl
                        lea ebx, dword ptr [ebx+ebx-01h]
                        mov esi, ebx
                        test esi, esi
                        jne 00007F3738C88D3Fh
                        movzx esi, byte ptr [eax+01h]
                        movzx ebx, byte ptr [ecx+01h]
                        sub esi, ebx
                        je 00007F3738C888E7h
                        xor ebx, ebx
                        test esi, esi
                        setnle bl
                        lea ebx, dword ptr [ebx+ebx-01h]
                        mov esi, ebx
                        test esi, esi
                        jne 00007F3738C88D1Eh
                        movzx esi, byte ptr [eax+02h]
                        movzx ebx, byte ptr [ecx+02h]
                        sub esi, ebx
                        je 00007F3738C888E7h
                        xor ebx, ebx
                        test esi, esi
                        setnle bl
                        lea ebx, dword ptr [ebx+ebx-01h]
                        mov esi, ebx
                        test esi, esi
                        jne 00007F3738C88CFDh

                        Rich Headers

                        Programming Language:
                        • [ C ] VS2008 build 21022
                        • [LNK] VS2008 build 21022
                        • [ C ] VS2005 build 50727
                        • [ASM] VS2008 build 21022
                        • [IMP] VS2005 build 50727
                        • [RES] VS2008 build 21022
                        • [EXP] VS2008 build 21022
                        • [C++] VS2008 build 21022

                        Data Directories

                        NameVirtual AddressVirtual Size Is in Section
                        IMAGE_DIRECTORY_ENTRY_EXPORT0x50bc00x50.rdata
                        IMAGE_DIRECTORY_ENTRY_IMPORT0x4f5380xb4.rdata
                        IMAGE_DIRECTORY_ENTRY_RESOURCE0x890000x3410.rsrc
                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x8d0000x415c.reloc
                        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x4bd000x40.rdata
                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_IAT0x470000x454.rdata
                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x4f4b00x40.rdata
                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                        Sections

                        NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                        .text0x10000x45bb90x45c00False0.379756804435data6.37093799262IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                        .rdata0x470000x9c100x9e00False0.357372428797data5.22198617118IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        .data0x510000x3735c0x33800False0.741035535498data6.11335979295IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                        .rsrc0x890000x34100x3600False0.306640625data4.34913645958IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        .reloc0x8d0000x8c340x8e00False0.346308318662data4.00973830682IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                        Resources

                        NameRVASizeTypeLanguageCountry
                        RT_CURSOR0x89ac00x134dataChineseChina
                        RT_CURSOR0x89bf40xb4dataChineseChina
                        RT_CURSOR0x89ca80x134AmigaOS bitmap fontChineseChina
                        RT_CURSOR0x89ddc0x134dataChineseChina
                        RT_CURSOR0x89f100x134dataChineseChina
                        RT_CURSOR0x8a0440x134dataChineseChina
                        RT_CURSOR0x8a1780x134dataChineseChina
                        RT_CURSOR0x8a2ac0x134dataChineseChina
                        RT_CURSOR0x8a3e00x134dataChineseChina
                        RT_CURSOR0x8a5140x134dataChineseChina
                        RT_CURSOR0x8a6480x134dataChineseChina
                        RT_CURSOR0x8a77c0x134dataChineseChina
                        RT_CURSOR0x8a8b00x134AmigaOS bitmap fontChineseChina
                        RT_CURSOR0x8a9e40x134dataChineseChina
                        RT_CURSOR0x8ab180x134dataChineseChina
                        RT_CURSOR0x8ac4c0x134dataChineseChina
                        RT_BITMAP0x8ad800xb8dataChineseChina
                        RT_BITMAP0x8ae380x144dataChineseChina
                        RT_ICON0x8af7c0x2e8dBase IV DBT of @.DBF, block length 512, next free block index 40, next free block 67108992, next used block 3293332676ChineseChina
                        RT_ICON0x8b2640x128GLS_BINARY_LSB_FIRSTChineseChina
                        RT_DIALOG0x8b38c0x33cdataChineseChina
                        RT_DIALOG0x8b6c80xe2dataChineseChina
                        RT_DIALOG0x8b7ac0x34dataChineseChina
                        RT_STRING0x8b7e00x4edataChineseChina
                        RT_STRING0x8b8300x2cdataChineseChina
                        RT_STRING0x8b85c0x82dataChineseChina
                        RT_STRING0x8b8e00x1d6dataChineseChina
                        RT_STRING0x8bab80x160dataChineseChina
                        RT_STRING0x8bc180x12edataChineseChina
                        RT_STRING0x8bd480x50dataChineseChina
                        RT_STRING0x8bd980x44dataChineseChina
                        RT_STRING0x8bddc0x68dataChineseChina
                        RT_STRING0x8be440x1b8dataChineseChina
                        RT_STRING0x8bffc0x104dataChineseChina
                        RT_STRING0x8c1000x24dataChineseChina
                        RT_STRING0x8c1240x30dataChineseChina
                        RT_GROUP_CURSOR0x8c1540x22Lotus unknown worksheet or configuration, revision 0x2ChineseChina
                        RT_GROUP_CURSOR0x8c1780x14Lotus unknown worksheet or configuration, revision 0x1ChineseChina
                        RT_GROUP_CURSOR0x8c18c0x14Lotus unknown worksheet or configuration, revision 0x1ChineseChina
                        RT_GROUP_CURSOR0x8c1a00x14Lotus unknown worksheet or configuration, revision 0x1ChineseChina
                        RT_GROUP_CURSOR0x8c1b40x14Lotus unknown worksheet or configuration, revision 0x1ChineseChina
                        RT_GROUP_CURSOR0x8c1c80x14Lotus unknown worksheet or configuration, revision 0x1ChineseChina
                        RT_GROUP_CURSOR0x8c1dc0x14Lotus unknown worksheet or configuration, revision 0x1ChineseChina
                        RT_GROUP_CURSOR0x8c1f00x14Lotus unknown worksheet or configuration, revision 0x1ChineseChina
                        RT_GROUP_CURSOR0x8c2040x14Lotus unknown worksheet or configuration, revision 0x1ChineseChina
                        RT_GROUP_CURSOR0x8c2180x14Lotus unknown worksheet or configuration, revision 0x1ChineseChina
                        RT_GROUP_CURSOR0x8c22c0x14Lotus unknown worksheet or configuration, revision 0x1ChineseChina
                        RT_GROUP_CURSOR0x8c2400x14Lotus unknown worksheet or configuration, revision 0x1ChineseChina
                        RT_GROUP_CURSOR0x8c2540x14Lotus unknown worksheet or configuration, revision 0x1ChineseChina
                        RT_GROUP_CURSOR0x8c2680x14Lotus unknown worksheet or configuration, revision 0x1ChineseChina
                        RT_GROUP_CURSOR0x8c27c0x14Lotus unknown worksheet or configuration, revision 0x1ChineseChina
                        RT_GROUP_ICON0x8c2900x22dataChineseChina
                        RT_MANIFEST0x8c2b40x15aASCII text, with CRLF line terminatorsEnglishUnited States

                        Imports

                        DLLImport
                        KERNEL32.dllGetOEMCP, GetCommandLineA, RtlUnwind, ExitProcess, HeapReAlloc, RaiseException, HeapSize, TerminateProcess, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsDebuggerPresent, GetACP, IsValidCodePage, LCMapStringA, LCMapStringW, HeapCreate, HeapDestroy, GetStdHandle, GetCPInfo, GetFileType, GetStartupInfoA, FreeEnvironmentStringsA, GetEnvironmentStrings, FreeEnvironmentStringsW, GetEnvironmentStringsW, QueryPerformanceCounter, GetTickCount, GetSystemTimeAsFileTime, InitializeCriticalSectionAndSpinCount, GetConsoleCP, GetConsoleMode, GetStringTypeA, GetStringTypeW, GetUserDefaultLCID, EnumSystemLocalesA, IsValidLocale, GetLocaleInfoW, SetStdHandle, WriteConsoleA, GetConsoleOutputCP, WriteConsoleW, GetModuleHandleW, CreateFileA, GetCurrentProcess, FlushFileBuffers, SetFilePointer, WriteFile, ReadFile, InterlockedIncrement, TlsFree, LocalReAlloc, TlsSetValue, TlsAlloc, GlobalHandle, GlobalReAlloc, TlsGetValue, LocalAlloc, WritePrivateProfileStringA, GlobalFlags, EnterCriticalSection, LeaveCriticalSection, DeleteCriticalSection, InitializeCriticalSection, GlobalGetAtomNameA, GlobalFindAtomA, lstrcmpW, GetVersionExA, FormatMessageA, LocalFree, lstrlenA, InterlockedDecrement, MulDiv, MultiByteToWideChar, GlobalUnlock, GlobalFree, FreeResource, GlobalAddAtomA, GetCurrentProcessId, GetLastError, GlobalDeleteAtom, GetCurrentThread, GetCurrentThreadId, ConvertDefaultLocale, EnumResourceLanguagesA, GetModuleFileNameA, GetLocaleInfoA, WideCharToMultiByte, CompareStringA, FindResourceA, LoadResource, LockResource, SizeofResource, InterlockedExchange, GlobalLock, lstrcmpA, GlobalAlloc, GetModuleHandleA, CreateThread, CloseHandle, VirtualProtect, LoadLibraryA, VirtualAlloc, GetProcAddress, SetLastError, Sleep, IsBadReadPtr, GetProcessHeap, VirtualFree, HeapFree, HeapAlloc, FreeLibrary, VirtualQuery, SetHandleCount, GetNativeSystemInfo
                        USER32.dllLoadCursorA, GetSysColorBrush, SetWindowTextA, IsDialogMessageA, SetDlgItemTextA, GetDlgItemTextA, RegisterWindowMessageA, SendDlgItemMessageA, WinHelpA, GetCapture, GetClassLongA, GetClassNameA, SetPropA, GetPropA, RemovePropA, GetForegroundWindow, GetTopWindow, GetMessageTime, GetMessagePos, MapWindowPoints, SetMenu, SetForegroundWindow, CreateWindowExA, GetClassInfoExA, GetClassInfoA, RegisterClassA, AdjustWindowRectEx, CopyRect, PtInRect, GetDlgCtrlID, DefWindowProcA, CallWindowProcA, SetWindowLongA, SetWindowPos, SystemParametersInfoA, GetWindowPlacement, GetWindowRect, GetMenuItemID, GetMenuItemCount, GetSubMenu, UnhookWindowsHookEx, GetSysColor, EndPaint, BeginPaint, ReleaseDC, GetDC, ClientToScreen, GrayStringA, DrawTextExA, DrawTextA, TabbedTextOutA, GetWindowTextLengthA, GetWindowTextA, GetWindow, SetFocus, GetDesktopWindow, SetActiveWindow, CreateDialogIndirectParamA, DestroyWindow, IsWindow, GetDlgItem, GetNextDlgTabItem, EndDialog, SetWindowsHookExA, CallNextHookEx, GetMessageA, DestroyMenu, UpdateWindow, TranslateMessage, DispatchMessageA, GetActiveWindow, IsWindowVisible, GetKeyState, PeekMessageA, GetCursorPos, ValidateRect, GetWindowThreadProcessId, GetWindowLongA, GetLastActivePopup, IsWindowEnabled, MessageBoxA, SetCursor, PostQuitMessage, SetMenuItemBitmaps, GetMenuCheckMarkDimensions, LoadBitmapA, GetFocus, GetParent, ModifyMenuA, GetMenuState, EnableMenuItem, CheckMenuItem, SetTimer, IsIconic, KillTimer, LoadIconA, DrawIcon, GetClientRect, SendMessageA, ShowWindow, PostMessageA, GetSystemMetrics, EnableWindow, GetMenu
                        GDI32.dllGetStockObject, SelectObject, GetDeviceCaps, DeleteDC, Escape, ExtTextOutA, TextOutA, RectVisible, ScaleWindowExtEx, SetWindowExtEx, ScaleViewportExtEx, SetViewportExtEx, OffsetViewportOrgEx, CreateBitmap, PtVisible, GetObjectA, DeleteObject, GetClipBox, SetMapMode, SetTextColor, SetBkColor, RestoreDC, SaveDC, SetViewportOrgEx
                        WINSPOOL.DRVDocumentPropertiesA, ClosePrinter, OpenPrinterA
                        ADVAPI32.dllRegSetValueExA, RegCreateKeyExA, RegQueryValueA, RegOpenKeyA, RegEnumKeyA, RegDeleteKeyA, RegOpenKeyExA, RegQueryValueExA, RegCloseKey
                        SHLWAPI.dllPathFindExtensionA
                        OLEAUT32.dllVariantClear, VariantChangeType, VariantInit
                        WS2_32.dllhtons, setsockopt, sendto, htonl, bind, socket, closesocket, inet_addr, recvfrom, WSACleanup, WSAStartup

                        Exports

                        NameOrdinalAddress
                        DllRegisterServer10x1001df20

                        Possible Origin

                        Language of compilation systemCountry where language is spokenMap
                        ChineseChina
                        EnglishUnited States

                        Network Behavior

                        Snort IDS Alerts

                        TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                        01/14/22-19:48:04.868357TCP2404332ET CNC Feodo Tracker Reported CnC Server TCP group 174974380192.168.2.345.138.98.34
                        01/14/22-19:48:06.096818TCP2404338ET CNC Feodo Tracker Reported CnC Server TCP group 20497448080192.168.2.369.16.218.101

                        Network Port Distribution

                        TCP Packets

                        TimestampSource PortDest PortSource IPDest IP
                        Jan 14, 2022 20:04:45.157017946 CET4975280192.168.2.345.138.98.34
                        Jan 14, 2022 20:04:45.173969030 CET804975245.138.98.34192.168.2.3
                        Jan 14, 2022 20:04:45.870534897 CET4975280192.168.2.345.138.98.34
                        Jan 14, 2022 20:04:45.887402058 CET804975245.138.98.34192.168.2.3
                        Jan 14, 2022 20:04:46.558160067 CET4975280192.168.2.345.138.98.34
                        Jan 14, 2022 20:04:46.575095892 CET804975245.138.98.34192.168.2.3
                        Jan 14, 2022 20:04:46.581743956 CET497538080192.168.2.369.16.218.101
                        Jan 14, 2022 20:04:46.712301016 CET80804975369.16.218.101192.168.2.3
                        Jan 14, 2022 20:04:46.712480068 CET497538080192.168.2.369.16.218.101
                        Jan 14, 2022 20:04:46.731801987 CET497538080192.168.2.369.16.218.101
                        Jan 14, 2022 20:04:46.862047911 CET80804975369.16.218.101192.168.2.3
                        Jan 14, 2022 20:04:46.875166893 CET80804975369.16.218.101192.168.2.3
                        Jan 14, 2022 20:04:46.875193119 CET80804975369.16.218.101192.168.2.3
                        Jan 14, 2022 20:04:46.875330925 CET497538080192.168.2.369.16.218.101
                        Jan 14, 2022 20:04:51.155853987 CET497538080192.168.2.369.16.218.101
                        Jan 14, 2022 20:04:51.286068916 CET80804975369.16.218.101192.168.2.3
                        Jan 14, 2022 20:04:51.287879944 CET80804975369.16.218.101192.168.2.3
                        Jan 14, 2022 20:04:51.287985086 CET497538080192.168.2.369.16.218.101
                        Jan 14, 2022 20:04:51.297072887 CET497538080192.168.2.369.16.218.101
                        Jan 14, 2022 20:04:51.427298069 CET80804975369.16.218.101192.168.2.3
                        Jan 14, 2022 20:04:51.930119991 CET80804975369.16.218.101192.168.2.3
                        Jan 14, 2022 20:04:51.931866884 CET497538080192.168.2.369.16.218.101
                        Jan 14, 2022 20:04:54.929131031 CET80804975369.16.218.101192.168.2.3
                        Jan 14, 2022 20:04:54.929158926 CET80804975369.16.218.101192.168.2.3
                        Jan 14, 2022 20:04:54.929229975 CET497538080192.168.2.369.16.218.101
                        Jan 14, 2022 20:06:35.087300062 CET497538080192.168.2.369.16.218.101
                        Jan 14, 2022 20:06:35.087354898 CET497538080192.168.2.369.16.218.101

                        Code Manipulations

                        Statistics

                        Behavior

                        Click to jump to process

                        System Behavior

                        General

                        Start time:20:03:46
                        Start date:14/01/2022
                        Path:C:\Windows\System32\SgrmBroker.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\SgrmBroker.exe
                        Imagebase:0x7ff702c70000
                        File size:163336 bytes
                        MD5 hash:D3170A3F3A9626597EEE1888686E3EA6
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high

                        General

                        Start time:20:03:46
                        Start date:14/01/2022
                        Path:C:\Windows\System32\svchost.exe
                        Wow64 process (32bit):false
                        Commandline:c:\windows\system32\svchost.exe -k localservicenetworkrestricted -p -s wscsvc
                        Imagebase:0x7ff70d6e0000
                        File size:51288 bytes
                        MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                        Has elevated privileges:true
                        Has administrator privileges:false
                        Programmed in:C, C++ or other language
                        Reputation:high

                        General

                        Start time:20:03:46
                        Start date:14/01/2022
                        Path:C:\Windows\System32\loaddll32.exe
                        Wow64 process (32bit):true
                        Commandline:loaddll32.exe "C:\Users\user\Desktop\PtBIxmYbK8.dll"
                        Imagebase:0x1110000
                        File size:116736 bytes
                        MD5 hash:7DEB5DB86C0AC789123DEC286286B938
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Yara matches:
                        • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000003.00000000.301361831.00000000010D1000.00000020.00000001.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000003.00000002.325185349.00000000010A0000.00000040.00000001.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000003.00000000.301328959.00000000010A0000.00000040.00000001.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000003.00000000.299739915.00000000010D1000.00000020.00000001.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000003.00000000.299543600.00000000010A0000.00000040.00000001.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000003.00000002.325240760.00000000010D1000.00000020.00000001.sdmp, Author: Joe Security
                        Reputation:moderate

                        General

                        Start time:20:03:47
                        Start date:14/01/2022
                        Path:C:\Windows\SysWOW64\cmd.exe
                        Wow64 process (32bit):true
                        Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\PtBIxmYbK8.dll",#1
                        Imagebase:0xd80000
                        File size:232960 bytes
                        MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high

                        General

                        Start time:20:03:48
                        Start date:14/01/2022
                        Path:C:\Windows\SysWOW64\regsvr32.exe
                        Wow64 process (32bit):true
                        Commandline:regsvr32.exe /s C:\Users\user\Desktop\PtBIxmYbK8.dll
                        Imagebase:0x10b0000
                        File size:20992 bytes
                        MD5 hash:426E7499F6A7346F0410DEAD0805586B
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Yara matches:
                        • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000006.00000002.292884938.0000000003250000.00000040.00000001.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000006.00000002.292946530.0000000004B91000.00000020.00000001.sdmp, Author: Joe Security
                        Reputation:high

                        General

                        Start time:20:03:48
                        Start date:14/01/2022
                        Path:C:\Windows\SysWOW64\rundll32.exe
                        Wow64 process (32bit):true
                        Commandline:rundll32.exe "C:\Users\user\Desktop\PtBIxmYbK8.dll",#1
                        Imagebase:0x960000
                        File size:61952 bytes
                        MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Yara matches:
                        • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000007.00000002.335991032.00000000029C0000.00000040.00000001.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000007.00000002.336442645.0000000004751000.00000020.00000001.sdmp, Author: Joe Security
                        Reputation:high

                        General

                        Start time:20:03:48
                        Start date:14/01/2022
                        Path:C:\Windows\SysWOW64\rundll32.exe
                        Wow64 process (32bit):true
                        Commandline:rundll32.exe C:\Users\user\Desktop\PtBIxmYbK8.dll,DllRegisterServer
                        Imagebase:0x960000
                        File size:61952 bytes
                        MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Yara matches:
                        • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000008.00000002.345243637.0000000004BC1000.00000020.00000001.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000008.00000002.344911121.0000000004591000.00000020.00000001.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000008.00000002.345163882.0000000004AD1000.00000020.00000001.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000008.00000002.345117733.0000000004A90000.00000040.00000001.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000008.00000002.345389551.0000000004D50000.00000040.00000001.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000008.00000002.345356242.0000000004D21000.00000020.00000001.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000008.00000002.344514792.0000000002C40000.00000040.00000001.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000008.00000002.345313925.0000000004CF0000.00000040.00000001.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000008.00000002.345214624.0000000004B90000.00000040.00000001.sdmp, Author: Joe Security
                        Reputation:high

                        General

                        Start time:20:03:49
                        Start date:14/01/2022
                        Path:C:\Windows\SysWOW64\rundll32.exe
                        Wow64 process (32bit):true
                        Commandline:C:\Windows\SysWOW64\rundll32.exe "C:\Users\user\Desktop\PtBIxmYbK8.dll",DllRegisterServer
                        Imagebase:0x960000
                        File size:61952 bytes
                        MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high

                        General

                        Start time:20:03:52
                        Start date:14/01/2022
                        Path:C:\Windows\System32\svchost.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\System32\svchost.exe -k WerSvcGroup
                        Imagebase:0x7ff70d6e0000
                        File size:51288 bytes
                        MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high

                        General

                        Start time:20:03:52
                        Start date:14/01/2022
                        Path:C:\Windows\SysWOW64\WerFault.exe
                        Wow64 process (32bit):true
                        Commandline:C:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 6048 -ip 6048
                        Imagebase:0x160000
                        File size:434592 bytes
                        MD5 hash:9E2B8ACAD48ECCA55C0230D63623661B
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high

                        General

                        Start time:20:03:54
                        Start date:14/01/2022
                        Path:C:\Windows\SysWOW64\WerFault.exe
                        Wow64 process (32bit):true
                        Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 6048 -s 512
                        Imagebase:0x160000
                        File size:434592 bytes
                        MD5 hash:9E2B8ACAD48ECCA55C0230D63623661B
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high

                        General

                        Start time:20:03:58
                        Start date:14/01/2022
                        Path:C:\Windows\System32\svchost.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p
                        Imagebase:0x7ff70d6e0000
                        File size:51288 bytes
                        MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high

                        General

                        Start time:20:04:09
                        Start date:14/01/2022
                        Path:C:\Windows\SysWOW64\rundll32.exe
                        Wow64 process (32bit):true
                        Commandline:C:\Windows\SysWOW64\rundll32.exe "C:\Users\user\Desktop\PtBIxmYbK8.dll",DllRegisterServer
                        Imagebase:0x960000
                        File size:61952 bytes
                        MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Yara matches:
                        • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000F.00000002.385135770.0000000002DD1000.00000020.00000001.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000F.00000002.385727612.0000000004B70000.00000040.00000001.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000F.00000002.385657332.0000000004AB1000.00000020.00000001.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000F.00000002.385833414.0000000004BD0000.00000040.00000001.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000F.00000002.385786113.0000000004BA1000.00000020.00000001.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000F.00000002.384990047.0000000002B10000.00000040.00000001.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000F.00000002.385594738.0000000004A30000.00000040.00000001.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000F.00000002.385904649.0000000004C01000.00000020.00000001.sdmp, Author: Joe Security

                        General

                        Start time:20:04:12
                        Start date:14/01/2022
                        Path:C:\Windows\SysWOW64\rundll32.exe
                        Wow64 process (32bit):true
                        Commandline:C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Mjuakgeb\fhtvflqppfnv.wdg",DvMDRtCzK
                        Imagebase:0x960000
                        File size:61952 bytes
                        MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Yara matches:
                        • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000011.00000002.346835949.00000000049B1000.00000020.00000001.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000011.00000002.346349668.0000000003130000.00000040.00000001.sdmp, Author: Joe Security

                        General

                        Start time:20:04:14
                        Start date:14/01/2022
                        Path:C:\Windows\SysWOW64\rundll32.exe
                        Wow64 process (32bit):true
                        Commandline:C:\Windows\SysWOW64\rundll32.exe "C:\Windows\System32\Mjuakgeb\fhtvflqppfnv.wdg",DllRegisterServer
                        Imagebase:0x960000
                        File size:61952 bytes
                        MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language

                        General

                        Start time:20:04:15
                        Start date:14/01/2022
                        Path:C:\Windows\System32\svchost.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p
                        Imagebase:0x7ff70d6e0000
                        File size:51288 bytes
                        MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language

                        General

                        Start time:20:04:36
                        Start date:14/01/2022
                        Path:C:\Windows\System32\svchost.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p
                        Imagebase:0x7ff70d6e0000
                        File size:51288 bytes
                        MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language

                        General

                        Start time:20:04:47
                        Start date:14/01/2022
                        Path:C:\Program Files\Windows Defender\MpCmdRun.exe
                        Wow64 process (32bit):false
                        Commandline:"C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable
                        Imagebase:0x7ff773e20000
                        File size:455656 bytes
                        MD5 hash:A267555174BFA53844371226F482B86B
                        Has elevated privileges:true
                        Has administrator privileges:false
                        Programmed in:C, C++ or other language

                        General

                        Start time:20:04:47
                        Start date:14/01/2022
                        Path:C:\Windows\System32\conhost.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Imagebase:0x7ff7f20f0000
                        File size:625664 bytes
                        MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                        Has elevated privileges:true
                        Has administrator privileges:false
                        Programmed in:C, C++ or other language

                        General

                        Start time:20:04:57
                        Start date:14/01/2022
                        Path:C:\Windows\System32\svchost.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p
                        Imagebase:0x7ff70d6e0000
                        File size:51288 bytes
                        MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language

                        Disassembly

                        Code Analysis

                        Reset < >