Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
6xfFjxyRXf

Overview

General Information

Sample Name:6xfFjxyRXf (renamed file extension from none to dll)
Analysis ID:669376
MD5:f63300c5bbb25b90839996a6d1b8daf3
SHA1:663b6080201bb8258c3a17b552094ae25d0ae9eb
SHA256:9ba940714eb15665a5e28c43c1e4d1dee3f086d76c197015e0aa4b40b809ded0
Tags:32dllexetrojan
Infos:

Detection

Emotet
Score:92
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Yara detected Emotet
System process connects to network (likely due to code injection or exploit)
Snort IDS alert for network traffic
Machine Learning detection for sample
C2 URLs / IPs found in malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Contains functionality to query locales information (e.g. system language)
Deletes files inside the Windows folder
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Creates files inside the system directory
Internet Provider seen in connection with other malware
Detected potential crypto function
Found potential string decryption / allocating functions
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to dynamically determine API calls
Contains functionality which may be used to detect a debugger (GetProcessHeap)
IP address seen in connection with other malware
Creates a DirectInput object (often for capturing keystrokes)
Sample file is different than original file name gathered from version info
PE file contains strange resources
Tries to load missing DLLs
Drops PE files to the windows directory (C:\Windows)
Detected TCP or UDP traffic on non-standard ports
Checks if the current process is being debugged
Connects to several IPs in different countries
Potential key logger detected (key state polling based)
Registers a DLL
Found large amount of non-executed APIs
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • loaddll32.exe (PID: 6908 cmdline: loaddll32.exe "C:\Users\user\Desktop\6xfFjxyRXf.dll" MD5: 7DEB5DB86C0AC789123DEC286286B938)
    • cmd.exe (PID: 6916 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\6xfFjxyRXf.dll",#1 MD5: F3BDBE3BB6F734E357235F4D5898582D)
      • rundll32.exe (PID: 6944 cmdline: rundll32.exe "C:\Users\user\Desktop\6xfFjxyRXf.dll",#1 MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
    • regsvr32.exe (PID: 6932 cmdline: regsvr32.exe /s C:\Users\user\Desktop\6xfFjxyRXf.dll MD5: 426E7499F6A7346F0410DEAD0805586B)
      • regsvr32.exe (PID: 7052 cmdline: C:\Windows\SysWOW64\regsvr32.exe /s "C:\Windows\SysWOW64\Nrzawqzutwib\qenu.dlv" MD5: 426E7499F6A7346F0410DEAD0805586B)
    • rundll32.exe (PID: 6968 cmdline: rundll32.exe C:\Users\user\Desktop\6xfFjxyRXf.dll,DllRegisterServer MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
    • rundll32.exe (PID: 7068 cmdline: rundll32.exe C:\Users\user\Desktop\6xfFjxyRXf.dll,DllUnregisterServerrrrrrrrrrrr MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
  • svchost.exe (PID: 5776 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 7048 cmdline: C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 2764 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 4348 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 5764 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • cleanup
{"C2 list": ["184.134.163.2:1", "192.16.0.0:1472", "180.4.0.0:1", "148.4.0.0:1", "116.4.0.0:1", "160.4.0.0:1", "128.4.0.0:1", "164.4.0.0:1", "124.4.0.0:1", "176.4.0.0:1", "232.22.167.2:48", "144.23.167.2:48", "195.194.0.0:7080", "241.253.2.0:2848", "112.135.213.118:5", "235.253.2.0:2848", "255.255.255.255:3", "243.253.2.0:3908", "245.253.2.0:5388", "192.141.163.2:1", "249.253.2.0:2864", "28.188.226.4:4597", "255.178.3.0:1432", "208.146.163.2:1", "250.178.3.0:5056", "92.179.3.0:808", "24.149.166.2:1", "94.179.3.0:2448", "246.178.3.0:5208", "208.60.169.2:1", "136.86.171.2:1", "32.76.231.4:1"]}
SourceRuleDescriptionAuthorStrings
00000003.00000002.406595295.0000000000BF0000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_EmotetYara detected EmotetJoe Security
    00000003.00000002.406595295.0000000000BF0000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
      00000003.00000002.406684150.0000000000C21000.00000020.00001000.00020000.00000000.sdmpJoeSecurity_EmotetYara detected EmotetJoe Security
        00000003.00000002.406684150.0000000000C21000.00000020.00001000.00020000.00000000.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
          00000002.00000002.415134102.0000000004F61000.00000020.00001000.00020000.00000000.sdmpJoeSecurity_EmotetYara detected EmotetJoe Security
            Click to see the 11 entries
            SourceRuleDescriptionAuthorStrings
            2.2.regsvr32.exe.4f00000.0.raw.unpackJoeSecurity_EmotetYara detected EmotetJoe Security
              2.2.regsvr32.exe.4f00000.0.raw.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
                4.2.rundll32.exe.4680000.0.raw.unpackJoeSecurity_EmotetYara detected EmotetJoe Security
                  4.2.rundll32.exe.4680000.0.raw.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
                    4.2.rundll32.exe.46b0000.1.unpackJoeSecurity_EmotetYara detected EmotetJoe Security
                      Click to see the 19 entries
                      No Sigma rule has matched
                      Timestamp:192.168.2.6119.193.124.414985970802404304 07/20/22-01:13:31.686515
                      SID:2404304
                      Source Port:49859
                      Destination Port:7080
                      Protocol:TCP
                      Classtype:A Network Trojan was detected
                      Timestamp:192.168.2.651.91.76.894984480802404338 07/20/22-01:13:29.114997
                      SID:2404338
                      Source Port:49844
                      Destination Port:8080
                      Protocol:TCP
                      Classtype:A Network Trojan was detected

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection

                      barindex
                      Source: 6xfFjxyRXf.dllVirustotal: Detection: 69%Perma Link
                      Source: 6xfFjxyRXf.dllJoe Sandbox ML: detected
                      Source: 00000005.00000002.917270830.0000000002A49000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: Emotet {"C2 list": ["184.134.163.2:1", "192.16.0.0:1472", "180.4.0.0:1", "148.4.0.0:1", "116.4.0.0:1", "160.4.0.0:1", "128.4.0.0:1", "164.4.0.0:1", "124.4.0.0:1", "176.4.0.0:1", "232.22.167.2:48", "144.23.167.2:48", "195.194.0.0:7080", "241.253.2.0:2848", "112.135.213.118:5", "235.253.2.0:2848", "255.255.255.255:3", "243.253.2.0:3908", "245.253.2.0:5388", "192.141.163.2:1", "249.253.2.0:2864", "28.188.226.4:4597", "255.178.3.0:1432", "208.146.163.2:1", "250.178.3.0:5056", "92.179.3.0:808", "24.149.166.2:1", "94.179.3.0:2448", "246.178.3.0:5208", "208.60.169.2:1", "136.86.171.2:1", "32.76.231.4:1"]}
                      Source: 6xfFjxyRXf.dllStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_10023806 __EH_prolog,GetFullPathNameA,lstrcpynA,PathIsUNCA,GetVolumeInformationA,CharUpperA,FindFirstFileA,FindClose,lstrlenA,lstrcpyA,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_10023806 __EH_prolog,GetFullPathNameA,lstrcpynA,PathIsUNCA,GetVolumeInformationA,CharUpperA,FindFirstFileA,FindClose,lstrlenA,lstrcpyA,

                      Networking

                      barindex
                      Source: C:\Windows\SysWOW64\regsvr32.exeNetwork Connect: 217.182.25.250 8080
                      Source: C:\Windows\SysWOW64\regsvr32.exeNetwork Connect: 51.91.76.89 8080
                      Source: C:\Windows\SysWOW64\regsvr32.exeNetwork Connect: 189.232.46.161 443
                      Source: C:\Windows\SysWOW64\regsvr32.exeNetwork Connect: 119.193.124.41 7080
                      Source: C:\Windows\SysWOW64\regsvr32.exeNetwork Connect: 216.120.236.62 8080
                      Source: TrafficSnort IDS: 2404338 ET CNC Feodo Tracker Reported CnC Server TCP group 20 192.168.2.6:49844 -> 51.91.76.89:8080
                      Source: TrafficSnort IDS: 2404304 ET CNC Feodo Tracker Reported CnC Server TCP group 3 192.168.2.6:49859 -> 119.193.124.41:7080
                      Source: Malware configuration extractorIPs: 184.134.163.2:1
                      Source: Malware configuration extractorIPs: 192.16.0.0:1472
                      Source: Malware configuration extractorIPs: 180.4.0.0:1
                      Source: Malware configuration extractorIPs: 148.4.0.0:1
                      Source: Malware configuration extractorIPs: 116.4.0.0:1
                      Source: Malware configuration extractorIPs: 160.4.0.0:1
                      Source: Malware configuration extractorIPs: 128.4.0.0:1
                      Source: Malware configuration extractorIPs: 164.4.0.0:1
                      Source: Malware configuration extractorIPs: 124.4.0.0:1
                      Source: Malware configuration extractorIPs: 176.4.0.0:1
                      Source: Malware configuration extractorIPs: 232.22.167.2:48
                      Source: Malware configuration extractorIPs: 144.23.167.2:48
                      Source: Malware configuration extractorIPs: 195.194.0.0:7080
                      Source: Malware configuration extractorIPs: 241.253.2.0:2848
                      Source: Malware configuration extractorIPs: 112.135.213.118:5
                      Source: Malware configuration extractorIPs: 235.253.2.0:2848
                      Source: Malware configuration extractorIPs: 255.255.255.255:3
                      Source: Malware configuration extractorIPs: 243.253.2.0:3908
                      Source: Malware configuration extractorIPs: 245.253.2.0:5388
                      Source: Malware configuration extractorIPs: 192.141.163.2:1
                      Source: Malware configuration extractorIPs: 249.253.2.0:2864
                      Source: Malware configuration extractorIPs: 28.188.226.4:4597
                      Source: Malware configuration extractorIPs: 255.178.3.0:1432
                      Source: Malware configuration extractorIPs: 208.146.163.2:1
                      Source: Malware configuration extractorIPs: 250.178.3.0:5056
                      Source: Malware configuration extractorIPs: 92.179.3.0:808
                      Source: Malware configuration extractorIPs: 24.149.166.2:1
                      Source: Malware configuration extractorIPs: 94.179.3.0:2448
                      Source: Malware configuration extractorIPs: 246.178.3.0:5208
                      Source: Malware configuration extractorIPs: 208.60.169.2:1
                      Source: Malware configuration extractorIPs: 136.86.171.2:1
                      Source: Malware configuration extractorIPs: 32.76.231.4:1
                      Source: Joe Sandbox ViewASN Name: OVHFR OVHFR
                      Source: Joe Sandbox ViewASN Name: WOODYNET-2US WOODYNET-2US
                      Source: Joe Sandbox ViewIP Address: 217.182.25.250 217.182.25.250
                      Source: global trafficTCP traffic: 192.168.2.6:49773 -> 216.120.236.62:8080
                      Source: global trafficTCP traffic: 192.168.2.6:49844 -> 51.91.76.89:8080
                      Source: global trafficTCP traffic: 192.168.2.6:49855 -> 217.182.25.250:8080
                      Source: global trafficTCP traffic: 192.168.2.6:49859 -> 119.193.124.41:7080
                      Source: unknownNetwork traffic detected: IP country count 17
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49803 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49803
                      Source: unknownTCP traffic detected without corresponding DNS query: 216.120.236.62
                      Source: unknownTCP traffic detected without corresponding DNS query: 216.120.236.62
                      Source: unknownTCP traffic detected without corresponding DNS query: 216.120.236.62
                      Source: unknownTCP traffic detected without corresponding DNS query: 189.232.46.161
                      Source: unknownTCP traffic detected without corresponding DNS query: 189.232.46.161
                      Source: unknownTCP traffic detected without corresponding DNS query: 189.232.46.161
                      Source: unknownTCP traffic detected without corresponding DNS query: 189.232.46.161
                      Source: unknownTCP traffic detected without corresponding DNS query: 51.91.76.89
                      Source: unknownTCP traffic detected without corresponding DNS query: 51.91.76.89
                      Source: unknownTCP traffic detected without corresponding DNS query: 51.91.76.89
                      Source: unknownTCP traffic detected without corresponding DNS query: 217.182.25.250
                      Source: unknownTCP traffic detected without corresponding DNS query: 217.182.25.250
                      Source: unknownTCP traffic detected without corresponding DNS query: 217.182.25.250
                      Source: unknownTCP traffic detected without corresponding DNS query: 119.193.124.41
                      Source: unknownTCP traffic detected without corresponding DNS query: 119.193.124.41
                      Source: unknownTCP traffic detected without corresponding DNS query: 119.193.124.41
                      Source: unknownTCP traffic detected without corresponding DNS query: 119.193.124.41
                      Source: unknownTCP traffic detected without corresponding DNS query: 119.193.124.41
                      Source: unknownTCP traffic detected without corresponding DNS query: 119.193.124.41
                      Source: unknownTCP traffic detected without corresponding DNS query: 119.193.124.41
                      Source: unknownTCP traffic detected without corresponding DNS query: 119.193.124.41
                      Source: unknownTCP traffic detected without corresponding DNS query: 119.193.124.41
                      Source: unknownTCP traffic detected without corresponding DNS query: 119.193.124.41
                      Source: unknownTCP traffic detected without corresponding DNS query: 119.193.124.41
                      Source: unknownTCP traffic detected without corresponding DNS query: 119.193.124.41
                      Source: svchost.exe, 0000000E.00000003.540373400.0000023F1435E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Try it free for 30 days, no strings attached\r\n\r\nLike us on Facebook: http://www.facebook.com/spotify \r\nFollow us on Twitter: http://twitter.com/spotify","ProductTitle":"Spotify - Music and Podcasts","SearchTitles":[{"SearchTitleString":"Spotify","SearchTitleType":"SearchHint"},{"SearchTitleString":"Music","SearchTitleType":"SearchHint"},{"SearchTitleString":"music apps","SearchTitleType":"SearchHint"},{"SearchTitleString":"free music","SearchTitleType":"SearchHint"},{"SearchTitleString":"podcasts","SearchTitleType":"SearchHint"},{"SearchTitleString":"streaming","SearchTitleType":"SearchHint"},{"SearchTitleString":"soundcloud","SearchTitleType":"SearchHint"}],"Language":"en-us","Markets":["US","DZ","AR","AU","AT","BH","BD","BE","BR","BG","CA","CL","CN","CO","CR","HR","CY","CZ","DK","EG","EE","FI","FR","DE","GR","GT","HK","HU","IS","IN","ID","IQ","IE","IL","IT","JP","JO","KZ","KE","KW","LV","LB","LI","LT","LU","MY","MT","MR","MX","MA","NL","NZ","NG","NO","OM","PK","PE","PH","PL","PT","QA","RO","RU","SA","RS","SG","SK","SI","ZA","KR","ES","SE","CH","TW","TH","TT","TN","TR","UA","AE","GB","VN","YE","LY","LK","UY","VE","AF","AX","AL","AS","AO","AI","AQ","AG","AM","AW","BO","BQ","BA","BW","BV","IO","BN","BF","BI","KH","CM","CV","KY","CF","TD","TL","DJ","DM","DO","EC","SV","GQ","ER","ET","FK","FO","FJ","GF","PF","TF","GA","GM","GE","GH","GI","GL","GD","GP","GU","GG","GN","GW","GY","HT","HM","HN","AZ","BS","BB","BY","BZ","BJ","BM","BT","KM","CG","CD","CK","CX","CC","CI","CW","JM","SJ","JE","KI","KG","LA","LS","LR","MO","MK","MG","MW","IM","MH","MQ","MU","YT","FM","MD","MN","MS","MZ","MM","NA","NR","NP","MV","ML","NC","NI","NE","NU","NF","PW","PS","PA","PG","PY","RE","RW","BL","MF","WS","ST","SN","MP","PN","SX","SB","SO","SC","SL","GS","SH","KN","LC","PM","VC","TJ","TZ","TG","TK","TO","TM","TC","TV","UM","UG", equals www.facebook.com (Facebook)
                      Source: svchost.exe, 0000000E.00000003.540373400.0000023F1435E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Try it free for 30 days, no strings attached\r\n\r\nLike us on Facebook: http://www.facebook.com/spotify \r\nFollow us on Twitter: http://twitter.com/spotify","ProductTitle":"Spotify - Music and Podcasts","SearchTitles":[{"SearchTitleString":"Spotify","SearchTitleType":"SearchHint"},{"SearchTitleString":"Music","SearchTitleType":"SearchHint"},{"SearchTitleString":"music apps","SearchTitleType":"SearchHint"},{"SearchTitleString":"free music","SearchTitleType":"SearchHint"},{"SearchTitleString":"podcasts","SearchTitleType":"SearchHint"},{"SearchTitleString":"streaming","SearchTitleType":"SearchHint"},{"SearchTitleString":"soundcloud","SearchTitleType":"SearchHint"}],"Language":"en-us","Markets":["US","DZ","AR","AU","AT","BH","BD","BE","BR","BG","CA","CL","CN","CO","CR","HR","CY","CZ","DK","EG","EE","FI","FR","DE","GR","GT","HK","HU","IS","IN","ID","IQ","IE","IL","IT","JP","JO","KZ","KE","KW","LV","LB","LI","LT","LU","MY","MT","MR","MX","MA","NL","NZ","NG","NO","OM","PK","PE","PH","PL","PT","QA","RO","RU","SA","RS","SG","SK","SI","ZA","KR","ES","SE","CH","TW","TH","TT","TN","TR","UA","AE","GB","VN","YE","LY","LK","UY","VE","AF","AX","AL","AS","AO","AI","AQ","AG","AM","AW","BO","BQ","BA","BW","BV","IO","BN","BF","BI","KH","CM","CV","KY","CF","TD","TL","DJ","DM","DO","EC","SV","GQ","ER","ET","FK","FO","FJ","GF","PF","TF","GA","GM","GE","GH","GI","GL","GD","GP","GU","GG","GN","GW","GY","HT","HM","HN","AZ","BS","BB","BY","BZ","BJ","BM","BT","KM","CG","CD","CK","CX","CC","CI","CW","JM","SJ","JE","KI","KG","LA","LS","LR","MO","MK","MG","MW","IM","MH","MQ","MU","YT","FM","MD","MN","MS","MZ","MM","NA","NR","NP","MV","ML","NC","NI","NE","NU","NF","PW","PS","PA","PG","PY","RE","RW","BL","MF","WS","ST","SN","MP","PN","SX","SB","SO","SC","SL","GS","SH","KN","LC","PM","VC","TJ","TZ","TG","TK","TO","TM","TC","TV","UM","UG", equals www.twitter.com (Twitter)
                      Source: svchost.exe, 0000000E.00000003.540373400.0000023F1435E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000E.00000003.540396421.0000023F1436F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Try it free for 30 days, no strings attached\r\n\r\nLike us on Facebook: http://www.facebook.com/spotify \r\nFollow us on Twitter: http://twitter.com/spotify","ProductTitle":"Spotify - Music and Podcasts","SearchTitles":[{"SearchTitleString":"Spotify","SearchTitleType":"SearchHint"},{"SearchTitleString":"Music","SearchTitleType":"SearchHint"},{"SearchTitleString":"music apps","SearchTitleType":"SearchHint"},{"SearchTitleString":"free music","SearchTitleType":"SearchHint"},{"SearchTitleString":"podcasts","SearchTitleType":"SearchHint"},{"SearchTitleString":"streaming","SearchTitleType":"SearchHint"},{"SearchTitleString":"soundcloud","SearchTitleType":"SearchHint"}],"Language":"en-us","Markets":["US","DZ","AR","AU","AT","BH","BD","BE","BR","BG","CA","CL","CN","CO","CR","HR","CY","CZ","DK","EG","EE","FI","FR","DE","GR","GT","HK","HU","IS","IN","ID","IQ","IE","IL","IT","JP","JO","KZ","KE","KW","LV","LB","LI","LT","LU","MY","MT","MR","MX","MA","NL","NZ","NG","NO","OM","PK","PE","PH","PL","PT","QA","RO","RU","SA","RS","SG","SK","SI","ZA","KR","ES","SE","CH","TW","TH","TT","TN","TR","UA","AE","GB","VN","YE","LY","LK","UY","VE","AF","AX","AL","AS","AO","AI","AQ","AG","AM","AW","BO","BQ","BA","BW","BV","IO","BN","BF","BI","KH","CM","CV","KY","CF","TD","TL","DJ","DM","DO","EC","SV","GQ","ER","ET","FK","FO","FJ","GF","PF","TF","GA","GM","GE","GH","GI","GL","GD","GP","GU","GG","GN","GW","GY","HT","HM","HN","AZ","BS","BB","BY","BZ","BJ","BM","BT","KM","CG","CD","CK","CX","CC","CI","CW","JM","SJ","JE","KI","KG","LA","LS","LR","MO","MK","MG","MW","IM","MH","MQ","MU","YT","FM","MD","MN","MS","MZ","MM","NA","NR","NP","MV","ML","NC","NI","NE","NU","NF","PW","PS","PA","PG","PY","RE","RW","BL","MF","WS","ST","SN","MP","PN","SX","SB","SO","SC","SL","GS","SH","KN","LC","PM","VC","TJ","TZ","TG","TK","TO","TM","TC","TV","UM","UG","VI","VG","WF","EH","ZM","ZW","UZ","VU","SR","SZ","AD","MC","SM","ME","VA","NEUTRAL"]}],"MarketProperties":[{"RelatedProducts":[],"Markets":["US"]}],"ProductASchema":"Product;3","ProductBSchema":"ProductUnifiedApp;3","ProductId":"9NCBCSZSJRSB","Properties":{"PackageFamilyName":"SpotifyAB.SpotifyMusic_zpdnekdrzrea0","PackageIdentityName":"SpotifyAB.SpotifyMusic","PublisherCertificateName":"CN=453637B3-4E12-4CDF-B0D3-2A3C863BF6EF","XboxCrossGenSetId":null,"XboxConsoleGenOptimized":null,"XboxConsoleGenCompatible":null},"AlternateIds":[{"IdType":"LegacyWindowsStoreProductId","Value":"ceac5d3f-8a4f-40e1-9a67-76d9108c7cb5"},{"IdType":"LegacyWindowsPhoneProductId","Value":"caac1b9d-621b-4f96-b143-e10e1397740a"},{"IdType":"XboxTitleId","Value":"1681279293"}],"IngestionSource":"DCE","IsMicrosoftProduct":false,"PreferredSkuId":"0010","ProductType":"Application","ValidationData":{"PassedValidation":false,"RevisionId":"2022-07-11T16:37:37.4991749Z||.||58dfb4d5-be7e-424e-8739-cac99224843f||1152921505695035586||Null||fullrelease","ValidationResultUri":""},"MerchandizingTags":[],"PartD":"","ProductFamily":"Apps","ProductKind":"Application","DisplaySkuAvailab
                      Source: svchost.exe, 0000000E.00000003.540373400.0000023F1435E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000E.00000003.540396421.0000023F1436F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Try it free for 30 days, no strings attached\r\n\r\nLike us on Facebook: http://www.facebook.com/spotify \r\nFollow us on Twitter: http://twitter.com/spotify","ProductTitle":"Spotify - Music and Podcasts","SearchTitles":[{"SearchTitleString":"Spotify","SearchTitleType":"SearchHint"},{"SearchTitleString":"Music","SearchTitleType":"SearchHint"},{"SearchTitleString":"music apps","SearchTitleType":"SearchHint"},{"SearchTitleString":"free music","SearchTitleType":"SearchHint"},{"SearchTitleString":"podcasts","SearchTitleType":"SearchHint"},{"SearchTitleString":"streaming","SearchTitleType":"SearchHint"},{"SearchTitleString":"soundcloud","SearchTitleType":"SearchHint"}],"Language":"en-us","Markets":["US","DZ","AR","AU","AT","BH","BD","BE","BR","BG","CA","CL","CN","CO","CR","HR","CY","CZ","DK","EG","EE","FI","FR","DE","GR","GT","HK","HU","IS","IN","ID","IQ","IE","IL","IT","JP","JO","KZ","KE","KW","LV","LB","LI","LT","LU","MY","MT","MR","MX","MA","NL","NZ","NG","NO","OM","PK","PE","PH","PL","PT","QA","RO","RU","SA","RS","SG","SK","SI","ZA","KR","ES","SE","CH","TW","TH","TT","TN","TR","UA","AE","GB","VN","YE","LY","LK","UY","VE","AF","AX","AL","AS","AO","AI","AQ","AG","AM","AW","BO","BQ","BA","BW","BV","IO","BN","BF","BI","KH","CM","CV","KY","CF","TD","TL","DJ","DM","DO","EC","SV","GQ","ER","ET","FK","FO","FJ","GF","PF","TF","GA","GM","GE","GH","GI","GL","GD","GP","GU","GG","GN","GW","GY","HT","HM","HN","AZ","BS","BB","BY","BZ","BJ","BM","BT","KM","CG","CD","CK","CX","CC","CI","CW","JM","SJ","JE","KI","KG","LA","LS","LR","MO","MK","MG","MW","IM","MH","MQ","MU","YT","FM","MD","MN","MS","MZ","MM","NA","NR","NP","MV","ML","NC","NI","NE","NU","NF","PW","PS","PA","PG","PY","RE","RW","BL","MF","WS","ST","SN","MP","PN","SX","SB","SO","SC","SL","GS","SH","KN","LC","PM","VC","TJ","TZ","TG","TK","TO","TM","TC","TV","UM","UG","VI","VG","WF","EH","ZM","ZW","UZ","VU","SR","SZ","AD","MC","SM","ME","VA","NEUTRAL"]}],"MarketProperties":[{"RelatedProducts":[],"Markets":["US"]}],"ProductASchema":"Product;3","ProductBSchema":"ProductUnifiedApp;3","ProductId":"9NCBCSZSJRSB","Properties":{"PackageFamilyName":"SpotifyAB.SpotifyMusic_zpdnekdrzrea0","PackageIdentityName":"SpotifyAB.SpotifyMusic","PublisherCertificateName":"CN=453637B3-4E12-4CDF-B0D3-2A3C863BF6EF","XboxCrossGenSetId":null,"XboxConsoleGenOptimized":null,"XboxConsoleGenCompatible":null},"AlternateIds":[{"IdType":"LegacyWindowsStoreProductId","Value":"ceac5d3f-8a4f-40e1-9a67-76d9108c7cb5"},{"IdType":"LegacyWindowsPhoneProductId","Value":"caac1b9d-621b-4f96-b143-e10e1397740a"},{"IdType":"XboxTitleId","Value":"1681279293"}],"IngestionSource":"DCE","IsMicrosoftProduct":false,"PreferredSkuId":"0010","ProductType":"Application","ValidationData":{"PassedValidation":false,"RevisionId":"2022-07-11T16:37:37.4991749Z||.||58dfb4d5-be7e-424e-8739-cac99224843f||1152921505695035586||Null||fullrelease","ValidationResultUri":""},"MerchandizingTags":[],"PartD":"","ProductFamily":"Apps","ProductKind":"Application","DisplaySkuAvailab
                      Source: svchost.exe, 0000000E.00000002.584541505.0000023F14300000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
                      Source: 77EC63BDA74BD0D0E0426DC8F80085060.5.drString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
                      Source: svchost.exe, 0000000E.00000003.571353182.0000023F14388000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://help.disneyplus.com.
                      Source: svchost.exe, 0000000E.00000003.571353182.0000023F14388000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://disneyplus.com/legal.
                      Source: svchost.exe, 0000000E.00000003.565704127.0000023F14819000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000E.00000003.564883544.0000023F14388000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000E.00000003.564185932.0000023F143AA000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000E.00000003.565394424.0000023F143AA000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000E.00000003.564280175.0000023F14802000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000E.00000003.564163015.0000023F1439A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000E.00000003.564576094.0000023F14803000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://support.hotspotshield.com/
                      Source: svchost.exe, 0000000E.00000003.571353182.0000023F14388000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.disneyplus.com/legal/privacy-policy
                      Source: svchost.exe, 0000000E.00000003.571353182.0000023F14388000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.disneyplus.com/legal/your-california-privacy-rights
                      Source: svchost.exe, 0000000E.00000003.565704127.0000023F14819000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000E.00000003.564883544.0000023F14388000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000E.00000003.564185932.0000023F143AA000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000E.00000003.565394424.0000023F143AA000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000E.00000003.564280175.0000023F14802000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000E.00000003.564163015.0000023F1439A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000E.00000003.564576094.0000023F14803000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.hotspotshield.com/terms/
                      Source: svchost.exe, 0000000E.00000003.565704127.0000023F14819000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000E.00000003.564883544.0000023F14388000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000E.00000003.564185932.0000023F143AA000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000E.00000003.565394424.0000023F143AA000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000E.00000003.564280175.0000023F14802000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000E.00000003.564163015.0000023F1439A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000E.00000003.564576094.0000023F14803000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.pango.co/privacy
                      Source: loaddll32.exe, 00000000.00000002.416924605.0000000000A3B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_10020E85 GetKeyState,GetKeyState,GetKeyState,GetKeyState,SendMessageA,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_10020E85 GetKeyState,GetKeyState,GetKeyState,GetKeyState,SendMessageA,

                      E-Banking Fraud

                      barindex
                      Source: Yara matchFile source: 2.2.regsvr32.exe.4f00000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.4680000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.46b0000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.regsvr32.exe.4480000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.regsvr32.exe.4f00000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.rundll32.exe.bf0000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.4680000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.rundll32.exe.c20000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.regsvr32.exe.2b50000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.rundll32.exe.bf0000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.regsvr32.exe.4f60000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.regsvr32.exe.2b50000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000003.00000002.406595295.0000000000BF0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.406684150.0000000000C21000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.415134102.0000000004F61000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.917544011.0000000002B50000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.406621589.00000000046B1000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.917618972.0000000004481000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.414918130.0000000004F00000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.406594585.0000000004680000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: 6xfFjxyRXf.dllStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL
                      Source: C:\Windows\SysWOW64\regsvr32.exeFile deleted: C:\Windows\SysWOW64\Nrzawqzutwib\qenu.dlv:Zone.IdentifierJump to behavior
                      Source: C:\Windows\SysWOW64\regsvr32.exeFile created: C:\Windows\SysWOW64\Nrzawqzutwib\Jump to behavior
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_10015257
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_100115BC
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_10021F04
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_1000DF4C
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_04F7E4B2
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_04F785A7
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_04F69587
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_04F6E51F
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_04F656AD
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_04F7202D
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_04F6C26D
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_04F7FC6F
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_04F7DC5F
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_04F66C5E
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_04F69DE0
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_04F73EE6
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_04F77EB9
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_04F76F79
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_04F70F57
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_04F6BB44
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_04F73B17
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_04F724F9
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_04F654B9
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_04F7B45C
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_04F6D5D6
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_04F775AD
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_04F80559
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_04F6A528
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_04F686ED
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_04F7D6A7
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_04F7169D
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_04F75689
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_04F74658
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_04F6260B
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_04F7F7FE
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_04F637FA
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_04F6A7C4
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_04F73711
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_04F7E71C
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_04F6B704
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_04F7A0F3
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_04F760FA
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_04F7B0A4
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_04F74093
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_04F7F05E
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_04F63023
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_04F7001B
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_04F691D6
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_04F701BF
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_04F7E10C
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_04F732C5
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_04F642B2
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_04F7C234
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_04F6E214
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_04F6A203
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_04F753D5
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_04F7630A
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_04F71DCF
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_04F7BDB0
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_04F68DA4
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_04F65D99
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_04F78D6C
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_04F75D5E
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_04F61D5C
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_04F74D2B
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_04F62EF6
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_04F6CED3
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_04F63FE5
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_04F78FB0
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_04F72FB9
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_04F7FFAC
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_04F7BF4C
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_04F7D8FE
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_04F6D8E0
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_04F6F88D
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_04F7481A
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_04F759FA
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_04F6A9D2
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_04F619C8
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_04F7E947
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_04F6E942
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_04F6593C
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_04F77915
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_04F7BA7C
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_04F64A11
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_04F7CBE5
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_04F69BDE
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_04F6FBDD
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_04F6DB9B
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_10015257
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_100115BC
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_10021F04
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_1000DF4C
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_00C3202D
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_00C2C26D
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_00C29587
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_00C385A7
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_00C2E51F
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_00C256AD
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_00C3DC5F
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_00C26C5E
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_00C29DE0
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_00C33EE6
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_00C37EB9
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_00C3A0F3
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_00C360FA
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_00C34093
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_00C3B0A4
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_00C3F05E
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_00C3001B
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_00C23023
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_00C291D6
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_00C301BF
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_00C3E10C
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_00C332C5
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_00C242B2
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_00C2A203
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_00C2E214
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_00C3C234
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_00C353D5
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_00C3630A
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_00C324F9
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_00C3E4B2
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_00C254B9
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_00C3B45C
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_00C2D5D6
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_00C375AD
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_00C40559
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_00C2A528
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_00C286ED
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_00C35689
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_00C3169D
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_00C3D6A7
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_00C34658
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_00C2260B
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_00C2A7C4
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_00C237FA
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_00C3F7FE
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_00C2B704
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_00C33711
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_00C3E71C
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_00C2D8E0
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_00C3D8FE
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_00C2F88D
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_00C3481A
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_00C219C8
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_00C2A9D2
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_00C359FA
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_00C2E942
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_00C3E947
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_00C37915
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_00C2593C
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_00C3BA7C
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_00C24A11
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_00C29BDE
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_00C2FBDD
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_00C3CBE5
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_00C2DB9B
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_00C2BB44
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_00C33B17
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_00C3FC6F
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_00C31DCF
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_00C25D99
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_00C28DA4
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_00C3BDB0
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_00C35D5E
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_00C21D5C
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_00C38D6C
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_00C34D2B
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_00C2CED3
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_00C22EF6
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_00C23FE5
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_00C3FFAC
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_00C38FB0
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_00C32FB9
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_00C3BF4C
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_00C30F57
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_00C36F79
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: String function: 10012CE0 appears 48 times
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: String function: 10011A8C appears 120 times
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: String function: 10023100 appears 31 times
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: String function: 10012CE0 appears 48 times
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: String function: 10011A8C appears 120 times
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: String function: 10023100 appears 31 times
                      Source: 6xfFjxyRXf.dllBinary or memory string: OriginalFilenameProcess Viewer.exe vs 6xfFjxyRXf.dll
                      Source: 6xfFjxyRXf.dllStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                      Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: sfc.dll
                      Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: sfc.dll
                      Source: 6xfFjxyRXf.dllVirustotal: Detection: 69%
                      Source: 6xfFjxyRXf.dllStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                      Source: unknownProcess created: C:\Windows\System32\loaddll32.exe loaddll32.exe "C:\Users\user\Desktop\6xfFjxyRXf.dll"
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\6xfFjxyRXf.dll",#1
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\6xfFjxyRXf.dll
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\6xfFjxyRXf.dll",#1
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\6xfFjxyRXf.dll,DllRegisterServer
                      Source: C:\Windows\SysWOW64\regsvr32.exeProcess created: C:\Windows\SysWOW64\regsvr32.exe C:\Windows\SysWOW64\regsvr32.exe /s "C:\Windows\SysWOW64\Nrzawqzutwib\qenu.dlv"
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\6xfFjxyRXf.dll,DllUnregisterServerrrrrrrrrrrr
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\6xfFjxyRXf.dll",#1
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\6xfFjxyRXf.dll
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\6xfFjxyRXf.dll,DllRegisterServer
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\6xfFjxyRXf.dll,DllUnregisterServerrrrrrrrrrrr
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\6xfFjxyRXf.dll",#1
                      Source: C:\Windows\SysWOW64\regsvr32.exeProcess created: C:\Windows\SysWOW64\regsvr32.exe C:\Windows\SysWOW64\regsvr32.exe /s "C:\Windows\SysWOW64\Nrzawqzutwib\qenu.dlv"
                      Source: C:\Windows\SysWOW64\regsvr32.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D105A4D4-344C-48EB-9866-EE378D90658B}\InProcServer32
                      Source: classification engineClassification label: mal92.troj.evad.winDLL@18/2@0/37
                      Source: C:\Windows\SysWOW64\regsvr32.exeFile read: C:\Users\desktop.iniJump to behavior
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_10006650 CreateToolhelp32Snapshot,Process32First,SendMessageA,SendMessageA,SendMessageA,OpenProcess,TerminateProcess,CloseHandle,SendMessageA,SendMessageA,Process32Next,CloseHandle,Sleep,
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\6xfFjxyRXf.dll",#1
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_10005FD0 LoadResource,SizeofResource,VirtualAllocExNuma,VirtualAlloc,memcpy,malloc,??3@YAXPAX@Z,
                      Source: C:\Windows\SysWOW64\regsvr32.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: 6xfFjxyRXf.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                      Source: 6xfFjxyRXf.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                      Source: 6xfFjxyRXf.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                      Source: 6xfFjxyRXf.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                      Source: 6xfFjxyRXf.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_100116D0 push eax; ret
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_100116D0 push eax; ret
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_10011A8C push eax; ret
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_10012D1B push ecx; ret
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_04F6179E push ds; retf
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_04F610BB push ebx; ret
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_100116D0 push eax; ret
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_100116D0 push eax; ret
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_10011A8C push eax; ret
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_10012D1B push ecx; ret
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_00C210BB push ebx; ret
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_00C2179E push ds; retf
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_10021590 LoadLibraryA,GetProcAddress,FreeLibrary,
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\6xfFjxyRXf.dll
                      Source: C:\Windows\SysWOW64\regsvr32.exePE file moved: C:\Windows\SysWOW64\Nrzawqzutwib\qenu.dlvJump to behavior

                      Hooking and other Techniques for Hiding and Protection

                      barindex
                      Source: C:\Windows\SysWOW64\regsvr32.exeFile opened: C:\Windows\SysWOW64\Nrzawqzutwib\qenu.dlv:Zone.Identifier read attributes | delete
                      Source: C:\Windows\SysWOW64\rundll32.exeFile opened: C:\Windows\SysWOW64\Ydixzzwmsfkx\nuzdumx.iuq:Zone.Identifier read attributes | delete
                      Source: C:\Windows\SysWOW64\rundll32.exeFile opened: C:\Windows\SysWOW64\Hzzrgo\lwtswlxa.yeh:Zone.Identifier read attributes | delete
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_10008124 IsIconic,GetWindowPlacement,GetWindowRect,
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_10005B60 IsIconic,SendMessageA,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,GetClientRect,DrawIcon,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_10008124 IsIconic,GetWindowPlacement,GetWindowRect,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_10005B60 IsIconic,SendMessageA,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,GetClientRect,DrawIcon,
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\svchost.exe TID: 6220Thread sleep time: -60000s >= -30000s
                      Source: C:\Windows\SysWOW64\regsvr32.exeAPI coverage: 3.6 %
                      Source: C:\Windows\SysWOW64\rundll32.exeAPI coverage: 3.6 %
                      Source: C:\Windows\SysWOW64\regsvr32.exeProcess information queried: ProcessInformation
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_100114D8 VirtualQuery,GetSystemInfo,VirtualQuery,VirtualAlloc,VirtualProtect,
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_10023806 __EH_prolog,GetFullPathNameA,lstrcpynA,PathIsUNCA,GetVolumeInformationA,CharUpperA,FindFirstFileA,FindClose,lstrlenA,lstrcpyA,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_10023806 __EH_prolog,GetFullPathNameA,lstrcpynA,PathIsUNCA,GetVolumeInformationA,CharUpperA,FindFirstFileA,FindClose,lstrlenA,lstrcpyA,
                      Source: C:\Windows\SysWOW64\regsvr32.exeAPI call chain: ExitProcess graph end node
                      Source: C:\Windows\SysWOW64\rundll32.exeAPI call chain: ExitProcess graph end node
                      Source: C:\Windows\SysWOW64\regsvr32.exeFile Volume queried: C:\ FullSizeInformation
                      Source: C:\Windows\SysWOW64\rundll32.exeFile Volume queried: C:\ FullSizeInformation
                      Source: svchost.exe, 0000000B.00000002.917163561.00000262FC402000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: HvHostWdiSystemHostScDeviceEnumWiaRpctrkwksAudioEndpointBuilderhidservdot3svcDsSvcfhsvcWPDBusEnumsvsvcwlansvcEmbeddedModeirmonSensorServicevmicvssNgcSvcsysmainDevQueryBrokerStorSvcvmickvpexchangevmicshutdownvmicguestinterfacevmicvmsessionNcbServiceNetmanDeviceAssociationServiceTabletInputServicePcaSvcIPxlatCfgSvcCscServiceUmRdpService
                      Source: svchost.exe, 0000000E.00000002.584271882.0000023F13AE8000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000E.00000002.583807616.0000023F13A70000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000E.00000002.583910159.0000023F13A88000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                      Source: svchost.exe, 0000000B.00000002.917233832.00000262FC428000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_10021590 LoadLibraryA,GetProcAddress,FreeLibrary,
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_10004BB0 GetNativeSystemInfo,GetProcessHeap,HeapAlloc,memcpy,
                      Source: C:\Windows\System32\loaddll32.exeProcess queried: DebugPort
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_10018246 SetUnhandledExceptionFilter,
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_1001825A SetUnhandledExceptionFilter,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_10018246 SetUnhandledExceptionFilter,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_1001825A SetUnhandledExceptionFilter,

                      HIPS / PFW / Operating System Protection Evasion

                      barindex
                      Source: C:\Windows\SysWOW64\regsvr32.exeNetwork Connect: 217.182.25.250 8080
                      Source: C:\Windows\SysWOW64\regsvr32.exeNetwork Connect: 51.91.76.89 8080
                      Source: C:\Windows\SysWOW64\regsvr32.exeNetwork Connect: 189.232.46.161 443
                      Source: C:\Windows\SysWOW64\regsvr32.exeNetwork Connect: 119.193.124.41 7080
                      Source: C:\Windows\SysWOW64\regsvr32.exeNetwork Connect: 216.120.236.62 8080
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\6xfFjxyRXf.dll",#1
                      Source: C:\Windows\SysWOW64\regsvr32.exeQueries volume information: C:\ VolumeInformation
                      Source: C:\Windows\SysWOW64\regsvr32.exeQueries volume information: C:\ VolumeInformation
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: lstrcpyA,LoadLibraryA,GetLocaleInfoA,
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: GetLocaleInfoA,
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: GetThreadLocale,GetLocaleInfoA,GetACP,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: lstrcpyA,LoadLibraryA,GetLocaleInfoA,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetLocaleInfoA,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetThreadLocale,GetLocaleInfoA,GetACP,
                      Source: C:\Windows\SysWOW64\regsvr32.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_1001712C GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter,
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_10019164 __lock,_strlen,_strcat,_strncpy,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,WideCharToMultiByte,_strncpy,
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_1002871E GetVersion,LoadCursorA,LoadCursorA,LoadCursorA,

                      Stealing of Sensitive Information

                      barindex
                      Source: Yara matchFile source: 2.2.regsvr32.exe.4f00000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.4680000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.46b0000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.regsvr32.exe.4480000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.regsvr32.exe.4f00000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.rundll32.exe.bf0000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.4680000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.rundll32.exe.c20000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.regsvr32.exe.2b50000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.rundll32.exe.bf0000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.regsvr32.exe.4f60000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.regsvr32.exe.2b50000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000003.00000002.406595295.0000000000BF0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.406684150.0000000000C21000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.415134102.0000000004F61000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.917544011.0000000002B50000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.406621589.00000000046B1000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.917618972.0000000004481000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.414918130.0000000004F00000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.406594585.0000000004680000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                      Valid Accounts1
                      Native API
                      1
                      DLL Side-Loading
                      111
                      Process Injection
                      2
                      Masquerading
                      2
                      Input Capture
                      2
                      System Time Discovery
                      Remote Services2
                      Input Capture
                      Exfiltration Over Other Network Medium12
                      Encrypted Channel
                      Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                      Default AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
                      DLL Side-Loading
                      2
                      Virtualization/Sandbox Evasion
                      LSASS Memory21
                      Security Software Discovery
                      Remote Desktop Protocol1
                      Archive Collected Data
                      Exfiltration Over Bluetooth1
                      Non-Standard Port
                      Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                      Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)111
                      Process Injection
                      Security Account Manager2
                      Virtualization/Sandbox Evasion
                      SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration11
                      Application Layer Protocol
                      Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                      Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)1
                      Deobfuscate/Decode Files or Information
                      NTDS2
                      Process Discovery
                      Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
                      Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
                      Hidden Files and Directories
                      LSA Secrets1
                      Application Window Discovery
                      SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                      Replication Through Removable MediaLaunchdRc.commonRc.common2
                      Obfuscated Files or Information
                      Cached Domain Credentials1
                      Remote System Discovery
                      VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                      External Remote ServicesScheduled TaskStartup ItemsStartup Items1
                      Regsvr32
                      DCSync2
                      File and Directory Discovery
                      Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                      Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job1
                      Rundll32
                      Proc Filesystem26
                      System Information Discovery
                      Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
                      Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)1
                      DLL Side-Loading
                      /etc/passwd and /etc/shadowSystem Network Connections DiscoverySoftware Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
                      Supply Chain CompromiseAppleScriptAt (Windows)At (Windows)1
                      File Deletion
                      Network SniffingProcess DiscoveryTaint Shared ContentLocal Data StagingExfiltration Over Unencrypted/Obfuscated Non-C2 ProtocolFile Transfer ProtocolsData Encrypted for Impact
                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet
                      behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 669376 Sample: 6xfFjxyRXf Startdate: 20/07/2022 Architecture: WINDOWS Score: 92 31 160.4.0.0 WOODYNET-2US New Zealand 2->31 33 92.179.3.0 UNI2-ASES France 2->33 35 29 other IPs or domains 2->35 45 Snort IDS alert for network traffic 2->45 47 Multi AV Scanner detection for submitted file 2->47 49 Yara detected Emotet 2->49 51 2 other signatures 2->51 8 loaddll32.exe 1 2->8         started        10 svchost.exe 2->10         started        12 svchost.exe 1 2->12         started        14 3 other processes 2->14 signatures3 process4 process5 16 regsvr32.exe 5 8->16         started        19 cmd.exe 1 8->19         started        21 rundll32.exe 2 8->21         started        23 rundll32.exe 8->23         started        signatures6 43 Hides that the sample has been downloaded from the Internet (zone.identifier) 16->43 25 regsvr32.exe 16->25         started        29 rundll32.exe 2 19->29         started        process7 dnsIp8 37 189.232.46.161, 443, 49803 UninetSAdeCVMX Mexico 25->37 39 217.182.25.250, 49855, 8080 OVHFR France 25->39 41 4 other IPs or domains 25->41 53 System process connects to network (likely due to code injection or exploit) 25->53 55 Hides that the sample has been downloaded from the Internet (zone.identifier) 29->55 signatures9

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                      windows-stand
                      SourceDetectionScannerLabelLink
                      6xfFjxyRXf.dll70%VirustotalBrowse
                      6xfFjxyRXf.dll100%Joe Sandbox ML
                      No Antivirus matches
                      SourceDetectionScannerLabelLinkDownload
                      4.2.rundll32.exe.4680000.0.unpack100%AviraHEUR/AGEN.1215461Download File
                      2.2.regsvr32.exe.4f00000.0.unpack100%AviraHEUR/AGEN.1215461Download File
                      3.2.rundll32.exe.c20000.1.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      5.2.regsvr32.exe.4480000.1.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      2.2.regsvr32.exe.4f60000.1.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      4.2.rundll32.exe.46b0000.1.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      5.2.regsvr32.exe.2b50000.0.unpack100%AviraHEUR/AGEN.1215461Download File
                      3.2.rundll32.exe.bf0000.0.unpack100%AviraHEUR/AGEN.1215461Download File
                      No Antivirus matches
                      SourceDetectionScannerLabelLink
                      https://www.disneyplus.com/legal/your-california-privacy-rights0%URL Reputationsafe
                      https://www.disneyplus.com/legal/privacy-policy0%URL Reputationsafe
                      http://help.disneyplus.com.0%URL Reputationsafe
                      https://www.pango.co/privacy0%URL Reputationsafe
                      https://disneyplus.com/legal.0%URL Reputationsafe
                      NameIPActiveMaliciousAntivirus DetectionReputation
                      c-0001.c-msedge.net
                      13.107.4.50
                      truefalse
                        unknown
                        NameSourceMaliciousAntivirus DetectionReputation
                        https://www.disneyplus.com/legal/your-california-privacy-rightssvchost.exe, 0000000E.00000003.571353182.0000023F14388000.00000004.00000020.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        https://www.disneyplus.com/legal/privacy-policysvchost.exe, 0000000E.00000003.571353182.0000023F14388000.00000004.00000020.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://help.disneyplus.com.svchost.exe, 0000000E.00000003.571353182.0000023F14388000.00000004.00000020.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        https://support.hotspotshield.com/svchost.exe, 0000000E.00000003.565704127.0000023F14819000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000E.00000003.564883544.0000023F14388000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000E.00000003.564185932.0000023F143AA000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000E.00000003.565394424.0000023F143AA000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000E.00000003.564280175.0000023F14802000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000E.00000003.564163015.0000023F1439A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000E.00000003.564576094.0000023F14803000.00000004.00000020.00020000.00000000.sdmpfalse
                          high
                          https://www.hotspotshield.com/terms/svchost.exe, 0000000E.00000003.565704127.0000023F14819000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000E.00000003.564883544.0000023F14388000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000E.00000003.564185932.0000023F143AA000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000E.00000003.565394424.0000023F143AA000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000E.00000003.564280175.0000023F14802000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000E.00000003.564163015.0000023F1439A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000E.00000003.564576094.0000023F14803000.00000004.00000020.00020000.00000000.sdmpfalse
                            high
                            https://www.pango.co/privacysvchost.exe, 0000000E.00000003.565704127.0000023F14819000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000E.00000003.564883544.0000023F14388000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000E.00000003.564185932.0000023F143AA000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000E.00000003.565394424.0000023F143AA000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000E.00000003.564280175.0000023F14802000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000E.00000003.564163015.0000023F1439A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000E.00000003.564576094.0000023F14803000.00000004.00000020.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            https://disneyplus.com/legal.svchost.exe, 0000000E.00000003.571353182.0000023F14388000.00000004.00000020.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            • No. of IPs < 25%
                            • 25% < No. of IPs < 50%
                            • 50% < No. of IPs < 75%
                            • 75% < No. of IPs
                            IPDomainCountryFlagASNASN NameMalicious
                            217.182.25.250
                            unknownFrance
                            16276OVHFRtrue
                            160.4.0.0
                            unknownNew Zealand
                            715WOODYNET-2UStrue
                            180.4.0.0
                            unknownJapan4713OCNNTTCommunicationsCorporationJPtrue
                            235.253.2.0
                            unknownReserved
                            unknownunknowntrue
                            249.253.2.0
                            unknownReserved
                            unknownunknowntrue
                            32.76.231.4
                            unknownUnited States
                            2686ATGS-MMD-ASUStrue
                            246.178.3.0
                            unknownReserved
                            unknownunknowntrue
                            184.134.163.2
                            unknownUnited States
                            5778CENTURYLINK-LEGACY-EMBARQ-RCMTUStrue
                            136.86.171.2
                            unknownUnited States
                            60311ONEFMCHtrue
                            208.146.163.2
                            unknownUnited States
                            3561CENTURYLINK-LEGACY-SAVVISUStrue
                            116.4.0.0
                            unknownChina
                            4134CHINANET-BACKBONENo31Jin-rongStreetCNtrue
                            92.179.3.0
                            unknownFrance
                            12479UNI2-ASEStrue
                            189.232.46.161
                            unknownMexico
                            8151UninetSAdeCVMXtrue
                            245.253.2.0
                            unknownReserved
                            unknownunknowntrue
                            148.4.0.0
                            unknownUnited States
                            6074LIUNETUStrue
                            94.179.3.0
                            unknownUkraine
                            6849UKRTELNETUAtrue
                            192.16.0.0
                            unknownUnited States
                            14153EDGECAST-IRUStrue
                            208.60.169.2
                            unknownUnited States
                            6389BELLSOUTH-NET-BLKUStrue
                            176.4.0.0
                            unknownGermany
                            12638AS12638DuesseldorfDEtrue
                            128.4.0.0
                            unknownUnited States
                            2UDEL-DCNUStrue
                            243.253.2.0
                            unknownReserved
                            unknownunknowntrue
                            232.22.167.2
                            unknownReserved
                            unknownunknowntrue
                            195.194.0.0
                            unknownUnited Kingdom
                            786JANETJiscServicesLimitedGBtrue
                            241.253.2.0
                            unknownReserved
                            unknownunknowntrue
                            144.23.167.2
                            unknownCosta Rica
                            64102OracleCorporationCRtrue
                            255.178.3.0
                            unknownReserved
                            unknownunknowntrue
                            51.91.76.89
                            unknownFrance
                            16276OVHFRtrue
                            24.149.166.2
                            unknownUnited States
                            11025COMCAST-HOUSTONUStrue
                            28.188.226.4
                            unknownUnited States
                            7922COMCAST-7922UStrue
                            124.4.0.0
                            unknownIndia
                            18302SKG_NW-AS-KRSKTelecomKRtrue
                            164.4.0.0
                            unknownSweden
                            44013SANDVIK-ASSEtrue
                            250.178.3.0
                            unknownReserved
                            unknownunknowntrue
                            119.193.124.41
                            unknownKorea Republic of
                            4766KIXS-AS-KRKoreaTelecomKRtrue
                            216.120.236.62
                            unknownUnited States
                            23535HOSTROCKETUStrue
                            112.135.213.118
                            unknownSri Lanka
                            9329SLTINT-AS-APSriLankaTelecomInternetLKtrue
                            192.141.163.2
                            unknownBrazil
                            267489NEOVEXCOMERCIOESERVICOSDETELECOMUNICACOESBRtrue
                            IP
                            192.168.2.1
                            Joe Sandbox Version:35.0.0 Citrine
                            Analysis ID:669376
                            Start date and time: 20/07/202201:10:422022-07-20 01:10:42 +02:00
                            Joe Sandbox Product:CloudBasic
                            Overall analysis duration:0h 11m 37s
                            Hypervisor based Inspection enabled:false
                            Report type:light
                            Sample file name:6xfFjxyRXf (renamed file extension from none to dll)
                            Cookbook file name:default.jbs
                            Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                            Number of analysed new started processes analysed:24
                            Number of new started drivers analysed:0
                            Number of existing processes analysed:0
                            Number of existing drivers analysed:0
                            Number of injected processes analysed:0
                            Technologies:
                            • HCA enabled
                            • EGA enabled
                            • HDC enabled
                            • AMSI enabled
                            Analysis Mode:default
                            Analysis stop reason:Timeout
                            Detection:MAL
                            Classification:mal92.troj.evad.winDLL@18/2@0/37
                            EGA Information:
                            • Successful, ratio: 100%
                            HDC Information:
                            • Successful, ratio: 44% (good quality ratio 42.4%)
                            • Quality average: 81.3%
                            • Quality standard deviation: 25.2%
                            HCA Information:
                            • Successful, ratio: 100%
                            • Number of executed functions: 0
                            • Number of non-executed functions: 0
                            Cookbook Comments:
                            • Adjust boot time
                            • Enable AMSI
                            • Override analysis time to 240s for rundll32
                            • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, RuntimeBroker.exe, WMIADAP.exe, conhost.exe, backgroundTaskHost.exe, wuapihost.exe
                            • Excluded IPs from analysis (whitelisted): 20.40.136.238, 20.223.24.244, 8.241.126.121, 8.248.137.254, 67.26.75.254, 8.238.85.126, 8.248.131.254
                            • Excluded domains from analysis (whitelisted): www.bing.com, client.wns.windows.com, iris-de-prod-azsc-frc-b.francecentral.cloudapp.azure.com, fg.download.windowsupdate.com.c.footprint.net, displaycatalog-rp-europe.md.mp.microsoft.com.akadns.net, neu-displaycatalogrp.frontdoor.bigcatalog.commerce.microsoft.com, ctldl.windowsupdate.com, arc.msn.com, wu-bg-shim.trafficmanager.net, ris.api.iris.microsoft.com, consumer-displaycatalogrp-aks2aks-europe.md.mp.microsoft.com.akadns.net, store-images.s-microsoft.com, login.live.com, sls.update.microsoft.com, arc.trafficmanager.net, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, displaycatalog-rp.md.mp.microsoft.com.akadns.net
                            • Not all processes where analyzed, report is missing behavior information
                            • Report creation exceeded maximum time and may have missing disassembly code information.
                            • Report size exceeded maximum capacity and may have missing behavior information.
                            • Report size getting too big, too many NtOpenKeyEx calls found.
                            • Report size getting too big, too many NtProtectVirtualMemory calls found.
                            • Report size getting too big, too many NtQueryValueKey calls found.
                            TimeTypeDescription
                            01:13:15API Interceptor5x Sleep call for process: svchost.exe modified
                            No context
                            No context
                            No context
                            No context
                            No context
                            Process:C:\Windows\SysWOW64\regsvr32.exe
                            File Type:Microsoft Cabinet archive data, 61712 bytes, 1 file
                            Category:dropped
                            Size (bytes):61712
                            Entropy (8bit):7.995044632446497
                            Encrypted:true
                            SSDEEP:1536:gzjJiDImMsrjCtGLaexX/zL09mX/lZHIxs:gPJiDI/sr0Hexv/0S/zx
                            MD5:589C442FC7A0C70DCA927115A700D41E
                            SHA1:66A07DACE3AFBFD1AA07A47E6875BEAB62C4BB31
                            SHA-256:2E5CB72E9EB43BAAFB6C6BFCC573AAC92F49A8064C483F9D378A9E8E781A526A
                            SHA-512:1B5FA79E52BE495C42CF49618441FB7012E28C02E7A08A91DA9213DB3AB810F0E83485BC1DD5F625A47D0BA7CFCDD5EA50ACC9A8DCEBB39F048C40F01E94155B
                            Malicious:false
                            Preview:MSCF............,...................I........y.........Tf. .authroot.stl..W.`.4..CK..8U[...q.yL'sf!d.D..."2.2g.<dVI.!.....$).\...!2s..(...[.T7..{}...g....g.....w.km$.&|..qe.n.8+..&...O...`...+..C......`h!0.I.(C..1Q*L.p..".s..B.....H......fUP@..5...(X#.t.2lX.>.y|D.0Z0...M....I(.#.-... ...(.J....2..`.hO..{l+.bd7y.j..u.....3....<......3....s.T...._.'...%{v...s..............KgV.0..X=.A.9w9.Ea.x..........\.=.e.C2......9.......`.o... .......@pm.. a.....-M.....{...s.mW.....;.+...A......0.g..L9#.v.&O>./xSH.S.....GH.6.j...`2.(0g..... Lt........h4.iQ?....[.K.....uI......}.....d....M.....6q.Q~.0.\.'U^)`..u.....-........d..7...2.-.2+3.....A./.%Q...k...Q.,...H.B.%..O..x..5\...Hk.......B.';"Ym.'....X.l.E.6..a8.6..nq..x.r4..1t.....,..u.O..O.L...Uf...X.u.F .(.(.....".q...n{%U.-u....l6!....Z....~o0.}Q'.s.i....7...>4x...A.h.Mk].O.z.].6...53...b^;..>e..x.'1..\p.O.k..B1w..|..K.R.....2.e0..X.^...I...w..!.v5B]x..z.6.G^uF..].b.W...'..I.;..p..@L{.E..@W..3.&...
                            Process:C:\Windows\SysWOW64\regsvr32.exe
                            File Type:data
                            Category:modified
                            Size (bytes):326
                            Entropy (8bit):3.127441018847852
                            Encrypted:false
                            SSDEEP:6:kKk1jku+N+SkQlPlEGYRMY9z+4KlDA3RUeWlEZ21:puNkPlE99SNxAhUeE1
                            MD5:AF04AB9D40C3B4C211623015BF58DC1B
                            SHA1:4089F3384FE9EA0D5236768F1C80DC587BF583B0
                            SHA-256:F17D96764E1BAFA37695F143754C0A075AFA0D4950E1DE7FDCB4B260AA47EFA3
                            SHA-512:8594DD11B66BDFD68059329F9D453431F4F16EE70C44291CBC7A9463AE7095FDAFD889817556728EDFFA1598CE9D3C2107E31DF73AE541D784695D2D4A96F37D
                            Malicious:false
                            Preview:p...... .........KX.....(....................................................... .........L.........$...............h.t.t.p.:././.c.t.l.d.l...w.i.n.d.o.w.s.u.p.d.a.t.e...c.o.m./.m.s.d.o.w.n.l.o.a.d./.u.p.d.a.t.e./.v.3./.s.t.a.t.i.c./.t.r.u.s.t.e.d.r./.e.n./.a.u.t.h.r.o.o.t.s.t.l...c.a.b...".0.9.f.4.c.9.6.9.8.b.d.8.1.:.0."...
                            File type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                            Entropy (8bit):6.926205785552602
                            TrID:
                            • Win32 Dynamic Link Library (generic) (1002004/3) 99.60%
                            • Generic Win/DOS Executable (2004/3) 0.20%
                            • DOS Executable Generic (2002/1) 0.20%
                            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                            File name:6xfFjxyRXf.dll
                            File size:421888
                            MD5:f63300c5bbb25b90839996a6d1b8daf3
                            SHA1:663b6080201bb8258c3a17b552094ae25d0ae9eb
                            SHA256:9ba940714eb15665a5e28c43c1e4d1dee3f086d76c197015e0aa4b40b809ded0
                            SHA512:79c208f7bd35ee1d6d886184ff1985c78df7acd0282de544e21122ec00e7893bcf1fe6447838679809c7ef8a5da2ef4df4b8b8976db737b41e0cae691661c26d
                            SSDEEP:12288:zwn2hR3547jpDMgySAxpuCMS5AhugWarPU:DRJ47xjyXpuCMSqumrP
                            TLSH:7094CF0272D0C47AC6EF23785D239B5AA7F9FC208A75C647A751BF8D5E326C1893034A
                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......]...................................................,...................2...........j...........................Rich...........
                            Icon Hash:ccccccccd8d2dccc
                            Entrypoint:0x100118aa
                            Entrypoint Section:.text
                            Digitally signed:false
                            Imagebase:0x10000000
                            Subsystem:windows gui
                            Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL
                            DLL Characteristics:
                            Time Stamp:0x623F4EFA [Sat Mar 26 17:35:54 2022 UTC]
                            TLS Callbacks:
                            CLR (.Net) Version:
                            OS Version Major:4
                            OS Version Minor:0
                            File Version Major:4
                            File Version Minor:0
                            Subsystem Version Major:4
                            Subsystem Version Minor:0
                            Import Hash:8f8b1cb86c6697dd342b65a36c6ccbb5
                            Instruction
                            push 0000000Ch
                            push 1002E838h
                            call 00007F2E98C687AFh
                            xor eax, eax
                            inc eax
                            mov dword ptr [ebp-1Ch], eax
                            mov esi, dword ptr [ebp+0Ch]
                            xor edi, edi
                            cmp esi, edi
                            jne 00007F2E98C6738Eh
                            cmp dword ptr [1003A15Ch], edi
                            je 00007F2E98C67439h
                            mov dword ptr [ebp-04h], edi
                            cmp esi, eax
                            je 00007F2E98C67387h
                            cmp esi, 02h
                            jne 00007F2E98C673B3h
                            mov eax, dword ptr [1003BA54h]
                            cmp eax, edi
                            je 00007F2E98C6738Eh
                            push dword ptr [ebp+10h]
                            push esi
                            push dword ptr [ebp+08h]
                            call eax
                            mov dword ptr [ebp-1Ch], eax
                            cmp dword ptr [ebp-1Ch], edi
                            je 00007F2E98C6740Bh
                            push dword ptr [ebp+10h]
                            push esi
                            push dword ptr [ebp+08h]
                            call 00007F2E98C671A7h
                            mov dword ptr [ebp-1Ch], eax
                            cmp eax, edi
                            je 00007F2E98C673F4h
                            mov ebx, dword ptr [ebp+10h]
                            push ebx
                            push esi
                            push dword ptr [ebp+08h]
                            call 00007F2E98C5BA3Ah
                            mov dword ptr [ebp-1Ch], eax
                            cmp esi, 01h
                            jne 00007F2E98C67390h
                            cmp eax, edi
                            jne 00007F2E98C6738Ch
                            push ebx
                            push edi
                            push dword ptr [ebp+08h]
                            call 00007F2E98C6717Dh
                            cmp esi, edi
                            je 00007F2E98C67387h
                            cmp esi, 03h
                            jne 00007F2E98C673ABh
                            push ebx
                            push esi
                            push dword ptr [ebp+08h]
                            call 00007F2E98C6716Ah
                            test eax, eax
                            jne 00007F2E98C67385h
                            mov dword ptr [ebp-1Ch], edi
                            cmp dword ptr [ebp-1Ch], edi
                            je 00007F2E98C67395h
                            mov eax, dword ptr [1003BA54h]
                            cmp eax, edi
                            je 00007F2E98C6738Ch
                            push ebx
                            push esi
                            push dword ptr [ebp+08h]
                            call eax
                            mov dword ptr [ebp-1Ch], eax
                            or dword ptr [ebp-04h], FFFFFFFFh
                            mov eax, dword ptr [ebp-1Ch]
                            jmp 00007F2E98C6739Ch
                            mov eax, dword ptr [ebp-14h]
                            mov ecx, dword ptr [eax]
                            Programming Language:
                            • [ASM] VS2003 (.NET) build 3077
                            • [ C ] VS2003 (.NET) build 3077
                            • [C++] VS2003 (.NET) build 3077
                            • [EXP] VS2003 (.NET) build 3077
                            • [RES] VS2003 (.NET) build 3077
                            • [LNK] VS2003 (.NET) build 3077
                            NameVirtual AddressVirtual Size Is in Section
                            IMAGE_DIRECTORY_ENTRY_EXPORT0x354d00x80.rdata
                            IMAGE_DIRECTORY_ENTRY_IMPORT0x338dc0xf0.rdata
                            IMAGE_DIRECTORY_ENTRY_RESOURCE0x3c0000x24b90.rsrc
                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x610000x385c.reloc
                            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x302d00x48.rdata
                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_IAT0x2b0000x54c.rdata
                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x338540x40.rdata
                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                            NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                            .text0x10000x29ffe0x2a000False0.6064278738839286COM executable for DOS6.692976248573253IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                            .rdata0x2b0000xa5500xb000False0.3276589133522727data4.950983780735592IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                            .data0x360000x5a580x3000False0.24137369791666666data3.613770783713054IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                            .rsrc0x3c0000x24b900x25000False0.9165368982263513data7.7821351881075715IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                            .reloc0x610000x83bc0x9000False0.2816840277777778data3.490541222086245IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                            NameRVASizeTypeLanguageCountry
                            0x3cf400x20800dataEnglishUnited States
                            RT_CURSOR0x5dd300x134dataEnglishUnited States
                            RT_CURSOR0x5de680xb4dataEnglishUnited States
                            RT_CURSOR0x5df480x134AmigaOS bitmap fontEnglishUnited States
                            RT_CURSOR0x5e0980x134dataEnglishUnited States
                            RT_CURSOR0x5e1e80x134dataEnglishUnited States
                            RT_CURSOR0x5e3380x134dataEnglishUnited States
                            RT_CURSOR0x5e4880x134dataEnglishUnited States
                            RT_CURSOR0x5e5d80x134dataEnglishUnited States
                            RT_CURSOR0x5e7280x134dataEnglishUnited States
                            RT_CURSOR0x5e8780x134dataEnglishUnited States
                            RT_CURSOR0x5e9c80x134dataEnglishUnited States
                            RT_CURSOR0x5eb180x134dataEnglishUnited States
                            RT_CURSOR0x5ec680x134AmigaOS bitmap fontEnglishUnited States
                            RT_CURSOR0x5edb80x134dataEnglishUnited States
                            RT_CURSOR0x5ef080x134dataEnglishUnited States
                            RT_CURSOR0x5f0580x134dataEnglishUnited States
                            RT_BITMAP0x5f2900xb8dataEnglishUnited States
                            RT_BITMAP0x5f3480x144dataEnglishUnited States
                            RT_ICON0x3cac00x468GLS_BINARY_LSB_FIRSTEnglishUnited States
                            RT_DIALOG0x5d7400x264dataEnglishUnited States
                            RT_DIALOG0x5f1a80xe8dataEnglishUnited States
                            RT_STRING0x5f4900x82dataEnglishUnited States
                            RT_STRING0x5f5180x2adataEnglishUnited States
                            RT_STRING0x5f5480x192dataEnglishUnited States
                            RT_STRING0x5f6e00x4e2dataEnglishUnited States
                            RT_STRING0x5ff580x31adataEnglishUnited States
                            RT_STRING0x5fc780x2dcdataEnglishUnited States
                            RT_STRING0x60ab80x8adataEnglishUnited States
                            RT_STRING0x5fbc80xacdataEnglishUnited States
                            RT_STRING0x609a80xdedataEnglishUnited States
                            RT_STRING0x602780x4c4dataEnglishUnited States
                            RT_STRING0x607400x264dataEnglishUnited States
                            RT_STRING0x60a880x2cdataEnglishUnited States
                            RT_STRING0x60b480x42dataEnglishUnited States
                            RT_GROUP_CURSOR0x5df200x22Lotus unknown worksheet or configuration, revision 0x2EnglishUnited States
                            RT_GROUP_CURSOR0x5e7100x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                            RT_GROUP_CURSOR0x5e0800x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                            RT_GROUP_CURSOR0x5e5c00x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                            RT_GROUP_CURSOR0x5e4700x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                            RT_GROUP_CURSOR0x5eda00x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                            RT_GROUP_CURSOR0x5e3200x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                            RT_GROUP_CURSOR0x5e9b00x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                            RT_GROUP_CURSOR0x5e1d00x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                            RT_GROUP_CURSOR0x5e8600x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                            RT_GROUP_CURSOR0x5eb000x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                            RT_GROUP_CURSOR0x5ec500x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                            RT_GROUP_CURSOR0x5eef00x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                            RT_GROUP_CURSOR0x5f0400x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                            RT_GROUP_CURSOR0x5f1900x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                            RT_GROUP_ICON0x3cf280x14dataEnglishUnited States
                            RT_VERSION0x5d9a80x388dataEnglishUnited States
                            DLLImport
                            KERNEL32.dllRtlUnwind, HeapFree, HeapAlloc, VirtualProtect, VirtualAlloc, GetSystemInfo, VirtualQuery, GetCommandLineA, HeapReAlloc, HeapSize, LCMapStringA, LCMapStringW, HeapDestroy, HeapCreate, VirtualFree, IsBadWritePtr, SetHandleCount, GetStdHandle, GetFileType, GetStartupInfoA, GetEnvironmentStrings, FreeEnvironmentStringsW, GetEnvironmentStringsW, UnhandledExceptionFilter, QueryPerformanceCounter, GetCurrentProcessId, GetSystemTimeAsFileTime, SetUnhandledExceptionFilter, GetStringTypeA, GetStringTypeW, GetTimeZoneInformation, IsBadReadPtr, IsBadCodePtr, SetStdHandle, SetEnvironmentVariableA, GetTickCount, GetFileTime, GetFileAttributesA, FileTimeToLocalFileTime, FileTimeToSystemTime, GetOEMCP, GetCPInfo, CreateFileA, GetFullPathNameA, GetVolumeInformationA, FindFirstFileA, FindClose, GetCurrentProcess, DuplicateHandle, GetFileSize, SetEndOfFile, UnlockFile, LockFile, FlushFileBuffers, SetFilePointer, WriteFile, ReadFile, TlsFree, LocalReAlloc, TlsSetValue, TlsAlloc, TlsGetValue, EnterCriticalSection, GlobalHandle, GlobalReAlloc, LeaveCriticalSection, LocalAlloc, DeleteCriticalSection, InitializeCriticalSection, RaiseException, GlobalFlags, InterlockedIncrement, WritePrivateProfileStringA, FormatMessageA, LocalFree, MulDiv, SetLastError, GlobalGetAtomNameA, GlobalFindAtomA, lstrcatA, lstrcmpW, lstrcpynA, InterlockedDecrement, GlobalUnlock, GlobalFree, FreeResource, GlobalAddAtomA, FindResourceA, LoadResource, LockResource, SizeofResource, GetCurrentThread, GetCurrentThreadId, GlobalLock, GlobalAlloc, FreeLibrary, GlobalDeleteAtom, lstrcmpA, GetModuleFileNameA, GetModuleHandleA, GetProcAddress, ConvertDefaultLocale, EnumResourceLanguagesA, lstrcpyA, LoadLibraryA, CompareStringW, CompareStringA, lstrlenA, lstrcmpiA, GetVersion, GetLastError, WideCharToMultiByte, MultiByteToWideChar, GetVersionExA, GetThreadLocale, GetLocaleInfoA, GetACP, InterlockedExchange, OpenProcess, TerminateProcess, Sleep, CreateToolhelp32Snapshot, Process32First, Process32Next, CloseHandle, FreeEnvironmentStringsA, ExitProcess
                            USER32.dllRegisterClipboardFormatA, PostThreadMessageA, MessageBeep, GetNextDlgGroupItem, InvalidateRgn, InvalidateRect, CopyAcceleratorTableA, SetRect, IsRectEmpty, CharNextA, GetSysColorBrush, ReleaseCapture, LoadCursorA, SetCapture, EndPaint, BeginPaint, GetWindowDC, ClientToScreen, GrayStringA, DrawTextExA, DrawTextA, TabbedTextOutA, wsprintfA, MoveWindow, SetWindowTextA, IsDialogMessageA, RegisterWindowMessageA, WinHelpA, GetCapture, CreateWindowExA, GetClassLongA, GetClassInfoExA, SetPropA, GetPropA, RemovePropA, SendDlgItemMessageA, SetFocus, IsChild, GetForegroundWindow, GetTopWindow, GetMessagePos, MapWindowPoints, SetForegroundWindow, UpdateWindow, GetMenu, GetSubMenu, GetMenuItemID, GetMenuItemCount, GetSysColor, AdjustWindowRectEx, EqualRect, GetClassInfoA, RegisterClassA, UnregisterClassA, GetDlgCtrlID, DefWindowProcA, CallWindowProcA, SetWindowLongA, OffsetRect, DrawIcon, SendMessageA, IsIconic, GetClientRect, EnableWindow, LoadIconA, GetSystemMetrics, GetWindowTextLengthA, IsWindowVisible, GetWindowRect, GetWindowTextA, GetClassNameA, EnumWindows, IntersectRect, SystemParametersInfoA, GetWindowPlacement, PtInRect, UnhookWindowsHookEx, GetWindow, SetWindowContextHelpId, MapDialogRect, SetWindowPos, ReleaseDC, GetDC, CopyRect, GetDesktopWindow, SetActiveWindow, CreateDialogIndirectParamA, DestroyWindow, IsWindow, GetDlgItem, GetNextDlgTabItem, EndDialog, SetMenuItemBitmaps, GetFocus, ModifyMenuA, GetMenuState, EnableMenuItem, GetMessageTime, DestroyMenu, ShowWindow, PostMessageA, CharUpperA, PostQuitMessage, SetCursor, IsWindowEnabled, GetLastActivePopup, GetWindowLongA, GetParent, MessageBoxA, ValidateRect, GetCursorPos, PeekMessageA, GetKeyState, GetActiveWindow, DispatchMessageA, TranslateMessage, GetMessageA, CallNextHookEx, SetWindowsHookExA, LoadBitmapA, GetMenuCheckMarkDimensions, CheckMenuItem
                            GDI32.dllGetMapMode, GetTextColor, GetRgnBox, GetDeviceCaps, GetStockObject, DeleteDC, ExtSelectClipRgn, ScaleWindowExtEx, SetWindowExtEx, ScaleViewportExtEx, SetViewportExtEx, OffsetViewportOrgEx, SetViewportOrgEx, GetBkColor, CreateBitmap, Escape, ExtTextOutA, TextOutA, RectVisible, PtVisible, GetWindowExtEx, GetViewportExtEx, DeleteObject, SetMapMode, RestoreDC, SaveDC, GetObjectA, SetBkColor, SetTextColor, GetClipBox, CreateRectRgnIndirect, SelectObject
                            comdlg32.dllGetFileTitleA
                            WINSPOOL.DRVOpenPrinterA, DocumentPropertiesA, ClosePrinter
                            ADVAPI32.dllRegQueryValueExA, RegOpenKeyExA, RegDeleteKeyA, RegEnumKeyA, RegOpenKeyA, RegQueryValueA, RegCreateKeyExA, RegSetValueExA, RegCloseKey
                            COMCTL32.dllImageList_Destroy
                            SHLWAPI.dllPathFindFileNameA, PathStripToRootA, PathFindExtensionA, PathIsUNCA
                            oledlg.dll
                            ole32.dllCreateILockBytesOnHGlobal, StgCreateDocfileOnILockBytes, StgOpenStorageOnILockBytes, CoGetClassObject, CoTaskMemAlloc, CoTaskMemFree, CLSIDFromString, CLSIDFromProgID, OleUninitialize, CoFreeUnusedLibraries, CoRegisterMessageFilter, OleFlushClipboard, OleIsCurrentClipboard, CoRevokeClassObject, OleInitialize
                            OLEAUT32.dllSysFreeString, SysAllocStringLen, VariantClear, VariantChangeType, VariantInit, SysStringLen, SysAllocStringByteLen, OleCreateFontIndirect, SystemTimeToVariantTime, SafeArrayDestroy, SysAllocString, VariantCopy
                            NameOrdinalAddress
                            DllRegisterServer10x100048a0
                            DllUnregisterServerrrrrrrrrrrr20x100048d0
                            Language of compilation systemCountry where language is spokenMap
                            EnglishUnited States
                            TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                            192.168.2.6119.193.124.414985970802404304 07/20/22-01:13:31.686515TCP2404304ET CNC Feodo Tracker Reported CnC Server TCP group 3498597080192.168.2.6119.193.124.41
                            192.168.2.651.91.76.894984480802404338 07/20/22-01:13:29.114997TCP2404338ET CNC Feodo Tracker Reported CnC Server TCP group 20498448080192.168.2.651.91.76.89
                            TimestampSource PortDest PortSource IPDest IP
                            Jul 20, 2022 01:12:37.545278072 CEST497738080192.168.2.6216.120.236.62
                            Jul 20, 2022 01:12:40.626862049 CEST497738080192.168.2.6216.120.236.62
                            Jul 20, 2022 01:12:46.650408030 CEST497738080192.168.2.6216.120.236.62
                            Jul 20, 2022 01:12:58.788846016 CEST49803443192.168.2.6189.232.46.161
                            Jul 20, 2022 01:12:58.788919926 CEST44349803189.232.46.161192.168.2.6
                            Jul 20, 2022 01:12:58.789094925 CEST49803443192.168.2.6189.232.46.161
                            Jul 20, 2022 01:12:58.832343102 CEST49803443192.168.2.6189.232.46.161
                            Jul 20, 2022 01:12:58.832392931 CEST44349803189.232.46.161192.168.2.6
                            Jul 20, 2022 01:13:29.083200932 CEST49803443192.168.2.6189.232.46.161
                            Jul 20, 2022 01:13:29.114996910 CEST498448080192.168.2.651.91.76.89
                            Jul 20, 2022 01:13:29.136509895 CEST80804984451.91.76.89192.168.2.6
                            Jul 20, 2022 01:13:29.722778082 CEST498448080192.168.2.651.91.76.89
                            Jul 20, 2022 01:13:29.745616913 CEST80804984451.91.76.89192.168.2.6
                            Jul 20, 2022 01:13:30.323734999 CEST498448080192.168.2.651.91.76.89
                            Jul 20, 2022 01:13:30.349111080 CEST80804984451.91.76.89192.168.2.6
                            Jul 20, 2022 01:13:30.386081934 CEST498558080192.168.2.6217.182.25.250
                            Jul 20, 2022 01:13:30.417004108 CEST808049855217.182.25.250192.168.2.6
                            Jul 20, 2022 01:13:30.952959061 CEST498558080192.168.2.6217.182.25.250
                            Jul 20, 2022 01:13:30.982132912 CEST808049855217.182.25.250192.168.2.6
                            Jul 20, 2022 01:13:31.526103020 CEST498558080192.168.2.6217.182.25.250
                            Jul 20, 2022 01:13:31.560188055 CEST808049855217.182.25.250192.168.2.6
                            Jul 20, 2022 01:13:31.686515093 CEST498597080192.168.2.6119.193.124.41
                            Jul 20, 2022 01:13:31.950680971 CEST708049859119.193.124.41192.168.2.6
                            Jul 20, 2022 01:13:31.955549002 CEST498597080192.168.2.6119.193.124.41
                            Jul 20, 2022 01:13:31.956378937 CEST498597080192.168.2.6119.193.124.41
                            Jul 20, 2022 01:13:32.217185974 CEST708049859119.193.124.41192.168.2.6
                            Jul 20, 2022 01:13:32.231532097 CEST708049859119.193.124.41192.168.2.6
                            Jul 20, 2022 01:13:32.231570959 CEST708049859119.193.124.41192.168.2.6
                            Jul 20, 2022 01:13:32.243074894 CEST498597080192.168.2.6119.193.124.41
                            Jul 20, 2022 01:13:37.208336115 CEST498597080192.168.2.6119.193.124.41
                            Jul 20, 2022 01:13:37.470942020 CEST708049859119.193.124.41192.168.2.6
                            Jul 20, 2022 01:13:37.474697113 CEST498597080192.168.2.6119.193.124.41
                            Jul 20, 2022 01:13:37.478393078 CEST498597080192.168.2.6119.193.124.41
                            Jul 20, 2022 01:13:37.783706903 CEST708049859119.193.124.41192.168.2.6
                            Jul 20, 2022 01:13:38.629363060 CEST708049859119.193.124.41192.168.2.6
                            Jul 20, 2022 01:13:38.629446983 CEST498597080192.168.2.6119.193.124.41
                            Jul 20, 2022 01:13:41.630054951 CEST708049859119.193.124.41192.168.2.6
                            Jul 20, 2022 01:13:41.630089045 CEST708049859119.193.124.41192.168.2.6
                            Jul 20, 2022 01:13:41.630225897 CEST498597080192.168.2.6119.193.124.41
                            Jul 20, 2022 01:14:27.472696066 CEST498597080192.168.2.6119.193.124.41
                            Jul 20, 2022 01:14:27.472757101 CEST498597080192.168.2.6119.193.124.41
                            Jul 20, 2022 01:14:27.734839916 CEST708049859119.193.124.41192.168.2.6
                            Jul 20, 2022 01:14:27.735079050 CEST498597080192.168.2.6119.193.124.41
                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                            Jul 20, 2022 01:12:48.819976091 CEST8.8.8.8192.168.2.60xdbb6No error (0)au.c-0001.c-msedge.netc-0001.c-msedge.netCNAME (Canonical name)IN (0x0001)
                            Jul 20, 2022 01:12:48.819976091 CEST8.8.8.8192.168.2.60xdbb6No error (0)c-0001.c-msedge.net13.107.4.50A (IP address)IN (0x0001)

                            Click to jump to process

                            Target ID:0
                            Start time:01:12:04
                            Start date:20/07/2022
                            Path:C:\Windows\System32\loaddll32.exe
                            Wow64 process (32bit):true
                            Commandline:loaddll32.exe "C:\Users\user\Desktop\6xfFjxyRXf.dll"
                            Imagebase:0x70000
                            File size:116736 bytes
                            MD5 hash:7DEB5DB86C0AC789123DEC286286B938
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high

                            Target ID:1
                            Start time:01:12:05
                            Start date:20/07/2022
                            Path:C:\Windows\SysWOW64\cmd.exe
                            Wow64 process (32bit):true
                            Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\6xfFjxyRXf.dll",#1
                            Imagebase:0xed0000
                            File size:232960 bytes
                            MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high

                            Target ID:2
                            Start time:01:12:06
                            Start date:20/07/2022
                            Path:C:\Windows\SysWOW64\regsvr32.exe
                            Wow64 process (32bit):true
                            Commandline:regsvr32.exe /s C:\Users\user\Desktop\6xfFjxyRXf.dll
                            Imagebase:0x1d0000
                            File size:20992 bytes
                            MD5 hash:426E7499F6A7346F0410DEAD0805586B
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Yara matches:
                            • Rule: JoeSecurity_Emotet, Description: Yara detected Emotet, Source: 00000002.00000002.415134102.0000000004F61000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000002.00000002.415134102.0000000004F61000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_Emotet, Description: Yara detected Emotet, Source: 00000002.00000002.414918130.0000000004F00000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000002.00000002.414918130.0000000004F00000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                            Reputation:high

                            Target ID:3
                            Start time:01:12:06
                            Start date:20/07/2022
                            Path:C:\Windows\SysWOW64\rundll32.exe
                            Wow64 process (32bit):true
                            Commandline:rundll32.exe "C:\Users\user\Desktop\6xfFjxyRXf.dll",#1
                            Imagebase:0x1210000
                            File size:61952 bytes
                            MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Yara matches:
                            • Rule: JoeSecurity_Emotet, Description: Yara detected Emotet, Source: 00000003.00000002.406595295.0000000000BF0000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000003.00000002.406595295.0000000000BF0000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_Emotet, Description: Yara detected Emotet, Source: 00000003.00000002.406684150.0000000000C21000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000003.00000002.406684150.0000000000C21000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
                            Reputation:high

                            Target ID:4
                            Start time:01:12:07
                            Start date:20/07/2022
                            Path:C:\Windows\SysWOW64\rundll32.exe
                            Wow64 process (32bit):true
                            Commandline:rundll32.exe C:\Users\user\Desktop\6xfFjxyRXf.dll,DllRegisterServer
                            Imagebase:0x1210000
                            File size:61952 bytes
                            MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Yara matches:
                            • Rule: JoeSecurity_Emotet, Description: Yara detected Emotet, Source: 00000004.00000002.406621589.00000000046B1000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000004.00000002.406621589.00000000046B1000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_Emotet, Description: Yara detected Emotet, Source: 00000004.00000002.406594585.0000000004680000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000004.00000002.406594585.0000000004680000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                            Reputation:high

                            Target ID:5
                            Start time:01:12:12
                            Start date:20/07/2022
                            Path:C:\Windows\SysWOW64\regsvr32.exe
                            Wow64 process (32bit):true
                            Commandline:C:\Windows\SysWOW64\regsvr32.exe /s "C:\Windows\SysWOW64\Nrzawqzutwib\qenu.dlv"
                            Imagebase:0x1d0000
                            File size:20992 bytes
                            MD5 hash:426E7499F6A7346F0410DEAD0805586B
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Yara matches:
                            • Rule: JoeSecurity_Emotet, Description: Yara detected Emotet, Source: 00000005.00000002.917544011.0000000002B50000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000005.00000002.917544011.0000000002B50000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_Emotet, Description: Yara detected Emotet, Source: 00000005.00000002.917618972.0000000004481000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000005.00000002.917618972.0000000004481000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
                            Reputation:high

                            Target ID:6
                            Start time:01:12:12
                            Start date:20/07/2022
                            Path:C:\Windows\SysWOW64\rundll32.exe
                            Wow64 process (32bit):true
                            Commandline:rundll32.exe C:\Users\user\Desktop\6xfFjxyRXf.dll,DllUnregisterServerrrrrrrrrrrr
                            Imagebase:0x1210000
                            File size:61952 bytes
                            MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high

                            Target ID:9
                            Start time:01:12:26
                            Start date:20/07/2022
                            Path:C:\Windows\System32\svchost.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p
                            Imagebase:0x7ff726010000
                            File size:51288 bytes
                            MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high

                            Target ID:11
                            Start time:01:12:43
                            Start date:20/07/2022
                            Path:C:\Windows\System32\svchost.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
                            Imagebase:0x7ff726010000
                            File size:51288 bytes
                            MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language

                            Target ID:12
                            Start time:01:12:49
                            Start date:20/07/2022
                            Path:C:\Windows\System32\svchost.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p
                            Imagebase:0x7ff726010000
                            File size:51288 bytes
                            MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language

                            Target ID:14
                            Start time:01:13:08
                            Start date:20/07/2022
                            Path:C:\Windows\System32\svchost.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p
                            Imagebase:0x7ff726010000
                            File size:51288 bytes
                            MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language

                            Target ID:21
                            Start time:01:14:07
                            Start date:20/07/2022
                            Path:C:\Windows\System32\svchost.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p
                            Imagebase:0x7ff726010000
                            File size:51288 bytes
                            MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language

                            No disassembly