Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
5CUFfVMSaQ.dll

Overview

General Information

Sample Name:5CUFfVMSaQ.dll
Analysis ID:671666
MD5:5d4728494832d03bbfb75367836fef4e
SHA1:abcbd283801a05390995862f59dcb5310f3d3d88
SHA256:caa60b9025dfba07efac6cae5438a8e20d9b7c210a721a4cf1f9d7b6df4d7d90
Tags:exeOpenCTIBRSandboxed
Infos:

Detection

Emotet
Score:96
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Yara detected Emotet
System process connects to network (likely due to code injection or exploit)
Snort IDS alert for network traffic
C2 URLs / IPs found in malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Queries the volume information (name, serial number etc) of a device
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query locales information (e.g. system language)
Deletes files inside the Windows folder
Uses code obfuscation techniques (call, push, ret)
Creates files inside the system directory
PE file contains sections with non-standard names
Internet Provider seen in connection with other malware
Detected potential crypto function
Contains functionality to query CPU information (cpuid)
Found potential string decryption / allocating functions
JA3 SSL client fingerprint seen in connection with other malware
HTTP GET or POST without a user agent
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Program does not show much activity (idle)
IP address seen in connection with other malware
Tries to load missing DLLs
Drops PE files to the windows directory (C:\Windows)
Checks if the current process is being debugged
Connects to several IPs in different countries
Registers a DLL
PE file contains more sections than normal
Found large amount of non-executed APIs
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • loaddll64.exe (PID: 6804 cmdline: loaddll64.exe "C:\Users\user\Desktop\5CUFfVMSaQ.dll" MD5: 4E8A40CAD6CCC047914E3A7830A2D8AA)
    • cmd.exe (PID: 6812 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\5CUFfVMSaQ.dll",#1 MD5: 4E2ACF4F8A396486AB4268C94A6A245F)
      • rundll32.exe (PID: 6856 cmdline: rundll32.exe "C:\Users\user\Desktop\5CUFfVMSaQ.dll",#1 MD5: 73C519F050C20580F8A62C849D49215A)
    • regsvr32.exe (PID: 6844 cmdline: regsvr32.exe /s C:\Users\user\Desktop\5CUFfVMSaQ.dll MD5: D78B75FC68247E8A63ACBA846182740E)
      • regsvr32.exe (PID: 6964 cmdline: C:\Windows\system32\regsvr32.exe "C:\Windows\system32\ZJPGATOTIe\uLEHsZT.dll" MD5: D78B75FC68247E8A63ACBA846182740E)
    • rundll32.exe (PID: 6880 cmdline: rundll32.exe C:\Users\user\Desktop\5CUFfVMSaQ.dll,ABeFtrnwmgAedx MD5: 73C519F050C20580F8A62C849D49215A)
    • rundll32.exe (PID: 6924 cmdline: rundll32.exe C:\Users\user\Desktop\5CUFfVMSaQ.dll,AEjATaIExpQg MD5: 73C519F050C20580F8A62C849D49215A)
    • rundll32.exe (PID: 6980 cmdline: rundll32.exe C:\Users\user\Desktop\5CUFfVMSaQ.dll,AbfBlUFQKbpevAFdaCpElBdscB MD5: 73C519F050C20580F8A62C849D49215A)
  • svchost.exe (PID: 4376 cmdline: C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 6864 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 4724 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 5144 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • cleanup
{"C2 list": ["188.165.79.151:443", "93.104.209.107:8080", "83.229.80.93:8080", "196.44.98.190:8080", "165.232.185.110:8080", "46.101.234.246:8080", "5.253.30.17:7080", "103.224.241.74:8080", "88.217.172.165:8080", "198.199.70.22:8080", "36.67.23.59:443", "157.245.111.0:8080", "128.199.242.164:8080", "139.196.72.155:8080", "202.29.239.162:443", "37.44.244.177:8080", "104.248.225.227:8080", "103.56.149.105:8080", "175.126.176.79:8080", "118.98.72.86:443", "157.230.99.206:8080", "103.85.95.4:8080", "103.71.99.57:8080", "104.244.79.94:443", "85.214.67.203:8080", "46.101.98.60:8080", "54.37.106.167:8080", "128.199.217.206:443", "178.62.112.199:8080", "103.41.204.169:8080", "103.254.12.236:7080", "116.124.128.206:8080", "54.37.228.122:443", "210.57.209.142:8080", "195.77.239.39:8080", "165.22.254.236:8080", "37.187.114.15:8080", "85.25.120.45:8080", "190.107.19.179:443", "62.171.178.147:8080", "87.106.97.83:7080", "139.59.80.108:8080", "103.126.216.86:443", "188.225.32.231:4143", "64.227.55.231:8080", "43.129.209.178:443", "202.134.4.210:7080", "202.28.34.99:8080", "190.145.8.4:443", "78.47.204.80:443"], "Public Key": ["RUNTMSAAAAD0LxqDNhonUYwk8sqo7IWuUllRdUiUBnACc6romsQoe1YJD7wIe4AheqYofpZFucPDXCZ0z9i+ooUffqeoLZU0F12ZrwACAIg=", "RUNLMSAAAADYNZPXY4tQxd/N4Wn5sTYAm5tUOxY2ol1ELrI4MNhHNi640vSLasjYTHpFRBoG+o84vtr7AJachCzOHjaAJFCWSV3XrwAMAIg="]}
SourceRuleDescriptionAuthorStrings
5CUFfVMSaQ.dllJoeSecurity_Emotet_2Yara detected EmotetJoe Security
    SourceRuleDescriptionAuthorStrings
    00000007.00000002.783905665.0000000000EE8000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_Emotet_3Joe Security
      00000003.00000002.404900294.0000000002681000.00000020.00001000.00020000.00000000.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
        00000006.00000002.404253356.0000026BAB700000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
          00000004.00000002.398318822.000001ED72500000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
            00000005.00000002.399047583.000001766C2B0000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
              Click to see the 8 entries
              SourceRuleDescriptionAuthorStrings
              6.2.rundll32.exe.26bab700000.0.raw.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
                7.2.regsvr32.exe.e50000.0.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
                  5.2.rundll32.exe.1766c2b0000.0.raw.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
                    6.2.rundll32.exe.26bab700000.0.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
                      5.2.rundll32.exe.1766c2b0000.0.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
                        Click to see the 7 entries
                        No Sigma rule has matched
                        Timestamp:192.168.2.5188.165.79.151497724432404320 07/22/22-13:16:45.923727
                        SID:2404320
                        Source Port:49772
                        Destination Port:443
                        Protocol:TCP
                        Classtype:A Network Trojan was detected

                        Click to jump to signature section

                        Show All Signature Results

                        AV Detection

                        barindex
                        Source: 5CUFfVMSaQ.dllVirustotal: Detection: 21%Perma Link
                        Source: 5CUFfVMSaQ.dllMetadefender: Detection: 45%Perma Link
                        Source: 5CUFfVMSaQ.dllReversingLabs: Detection: 80%
                        Source: 00000007.00000002.783905665.0000000000EE8000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: Emotet {"C2 list": ["188.165.79.151:443", "93.104.209.107:8080", "83.229.80.93:8080", "196.44.98.190:8080", "165.232.185.110:8080", "46.101.234.246:8080", "5.253.30.17:7080", "103.224.241.74:8080", "88.217.172.165:8080", "198.199.70.22:8080", "36.67.23.59:443", "157.245.111.0:8080", "128.199.242.164:8080", "139.196.72.155:8080", "202.29.239.162:443", "37.44.244.177:8080", "104.248.225.227:8080", "103.56.149.105:8080", "175.126.176.79:8080", "118.98.72.86:443", "157.230.99.206:8080", "103.85.95.4:8080", "103.71.99.57:8080", "104.244.79.94:443", "85.214.67.203:8080", "46.101.98.60:8080", "54.37.106.167:8080", "128.199.217.206:443", "178.62.112.199:8080", "103.41.204.169:8080", "103.254.12.236:7080", "116.124.128.206:8080", "54.37.228.122:443", "210.57.209.142:8080", "195.77.239.39:8080", "165.22.254.236:8080", "37.187.114.15:8080", "85.25.120.45:8080", "190.107.19.179:443", "62.171.178.147:8080", "87.106.97.83:7080", "139.59.80.108:8080", "103.126.216.86:443", "188.225.32.231:4143", "64.227.55.231:8080", "43.129.209.178:443", "202.134.4.210:7080", "202.28.34.99:8080", "190.145.8.4:443", "78.47.204.80:443"], "Public Key": ["RUNTMSAAAAD0LxqDNhonUYwk8sqo7IWuUllRdUiUBnACc6romsQoe1YJD7wIe4AheqYofpZFucPDXCZ0z9i+ooUffqeoLZU0F12ZrwACAIg=", "RUNLMSAAAADYNZPXY4tQxd/N4Wn5sTYAm5tUOxY2ol1ELrI4MNhHNi640vSLasjYTHpFRBoG+o84vtr7AJachCzOHjaAJFCWSV3XrwAMAIg="]}
                        Source: unknownHTTPS traffic detected: 188.165.79.151:443 -> 192.168.2.6:49750 version: TLS 1.2
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800426C8 _invalid_parameter_noinfo,_invalid_parameter_noinfo,FindFirstFileExW,FindNextFileW,FindClose,FindClose,
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800436B4 FindFirstFileExW,
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018004383C FindFirstFileExW,FindNextFileW,FindClose,FindClose,
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180043DBC FindFirstFileExW,FindNextFileW,FindClose,FindClose,
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00EA0A20 FindFirstFileW,FindNextFileW,

                        Networking

                        barindex
                        Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 188.165.79.151 443
                        Source: TrafficSnort IDS: 2404320 ET CNC Feodo Tracker Reported CnC Server TCP group 11 192.168.2.5:49772 -> 188.165.79.151:443
                        Source: Malware configuration extractorIPs: 188.165.79.151:443
                        Source: Malware configuration extractorIPs: 93.104.209.107:8080
                        Source: Malware configuration extractorIPs: 83.229.80.93:8080
                        Source: Malware configuration extractorIPs: 196.44.98.190:8080
                        Source: Malware configuration extractorIPs: 165.232.185.110:8080
                        Source: Malware configuration extractorIPs: 46.101.234.246:8080
                        Source: Malware configuration extractorIPs: 5.253.30.17:7080
                        Source: Malware configuration extractorIPs: 103.224.241.74:8080
                        Source: Malware configuration extractorIPs: 88.217.172.165:8080
                        Source: Malware configuration extractorIPs: 198.199.70.22:8080
                        Source: Malware configuration extractorIPs: 36.67.23.59:443
                        Source: Malware configuration extractorIPs: 157.245.111.0:8080
                        Source: Malware configuration extractorIPs: 128.199.242.164:8080
                        Source: Malware configuration extractorIPs: 139.196.72.155:8080
                        Source: Malware configuration extractorIPs: 202.29.239.162:443
                        Source: Malware configuration extractorIPs: 37.44.244.177:8080
                        Source: Malware configuration extractorIPs: 104.248.225.227:8080
                        Source: Malware configuration extractorIPs: 103.56.149.105:8080
                        Source: Malware configuration extractorIPs: 175.126.176.79:8080
                        Source: Malware configuration extractorIPs: 118.98.72.86:443
                        Source: Malware configuration extractorIPs: 157.230.99.206:8080
                        Source: Malware configuration extractorIPs: 103.85.95.4:8080
                        Source: Malware configuration extractorIPs: 103.71.99.57:8080
                        Source: Malware configuration extractorIPs: 104.244.79.94:443
                        Source: Malware configuration extractorIPs: 85.214.67.203:8080
                        Source: Malware configuration extractorIPs: 46.101.98.60:8080
                        Source: Malware configuration extractorIPs: 54.37.106.167:8080
                        Source: Malware configuration extractorIPs: 128.199.217.206:443
                        Source: Malware configuration extractorIPs: 178.62.112.199:8080
                        Source: Malware configuration extractorIPs: 103.41.204.169:8080
                        Source: Malware configuration extractorIPs: 103.254.12.236:7080
                        Source: Malware configuration extractorIPs: 116.124.128.206:8080
                        Source: Malware configuration extractorIPs: 54.37.228.122:443
                        Source: Malware configuration extractorIPs: 210.57.209.142:8080
                        Source: Malware configuration extractorIPs: 195.77.239.39:8080
                        Source: Malware configuration extractorIPs: 165.22.254.236:8080
                        Source: Malware configuration extractorIPs: 37.187.114.15:8080
                        Source: Malware configuration extractorIPs: 85.25.120.45:8080
                        Source: Malware configuration extractorIPs: 190.107.19.179:443
                        Source: Malware configuration extractorIPs: 62.171.178.147:8080
                        Source: Malware configuration extractorIPs: 87.106.97.83:7080
                        Source: Malware configuration extractorIPs: 139.59.80.108:8080
                        Source: Malware configuration extractorIPs: 103.126.216.86:443
                        Source: Malware configuration extractorIPs: 188.225.32.231:4143
                        Source: Malware configuration extractorIPs: 64.227.55.231:8080
                        Source: Malware configuration extractorIPs: 43.129.209.178:443
                        Source: Malware configuration extractorIPs: 202.134.4.210:7080
                        Source: Malware configuration extractorIPs: 202.28.34.99:8080
                        Source: Malware configuration extractorIPs: 190.145.8.4:443
                        Source: Malware configuration extractorIPs: 78.47.204.80:443
                        Source: Joe Sandbox ViewASN Name: DIGITALOCEAN-ASNUS DIGITALOCEAN-ASNUS
                        Source: Joe Sandbox ViewASN Name: OVHFR OVHFR
                        Source: Joe Sandbox ViewJA3 fingerprint: 51c64c77e60f3980eea90869b68c58a8
                        Source: global trafficHTTP traffic detected: GET / HTTP/1.1Cookie: CQHd=zROF5f0ZV1ZxZOeiJnhhFnLT/eIdAOEXkS+UqWmvXeeUa5HALooquXLstVuCCdmOVXvsMahuGIil7Z/r6qOuFjhQfDI8A2ofEM43G9ttUICAE9uNx6Fhx1n2lrRsMMMTx3azM7U+3k65+iRIhu5mKmMzhsnLsyfOfT+iQxewJc6NKVR9NE+e3qcP1Y3CnYPdyxgLKnYwwKKfunxCRdsXDWoB+OQyPwn+AGHfjdB6T5vGh5leD3pSUO5Ugv+Zrf4TmbS68/7svPcIMrtO2sDXc6RbVzCzf0fXaatnTZT1WjG8ZjSZDVfUeqe5k106rGD3Tg==Host: 188.165.79.151Connection: Keep-AliveCache-Control: no-cache
                        Source: Joe Sandbox ViewIP Address: 157.230.99.206 157.230.99.206
                        Source: unknownNetwork traffic detected: IP country count 21
                        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49750
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49750 -> 443
                        Source: unknownTCP traffic detected without corresponding DNS query: 188.165.79.151
                        Source: unknownTCP traffic detected without corresponding DNS query: 188.165.79.151
                        Source: unknownTCP traffic detected without corresponding DNS query: 188.165.79.151
                        Source: unknownTCP traffic detected without corresponding DNS query: 188.165.79.151
                        Source: unknownTCP traffic detected without corresponding DNS query: 188.165.79.151
                        Source: unknownTCP traffic detected without corresponding DNS query: 188.165.79.151
                        Source: unknownTCP traffic detected without corresponding DNS query: 188.165.79.151
                        Source: unknownTCP traffic detected without corresponding DNS query: 188.165.79.151
                        Source: unknownTCP traffic detected without corresponding DNS query: 188.165.79.151
                        Source: unknownTCP traffic detected without corresponding DNS query: 188.165.79.151
                        Source: regsvr32.exe, 00000007.00000002.784206191.0000000000F84000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000003.475529987.0000000000F84000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
                        Source: regsvr32.exe, 00000007.00000002.784206191.0000000000F84000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000003.475529987.0000000000F84000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.v
                        Source: regsvr32.exe, 00000007.00000003.475792765.0000000000F33000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000002.784016944.0000000000F33000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000002.784076102.0000000000F51000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000003.475615056.0000000000F33000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000003.475742934.0000000000F50000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://188.165.79.151/
                        Source: regsvr32.exe, 00000007.00000002.783905665.0000000000EE8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://188.165.79.151/6S#
                        Source: regsvr32.exe, 00000007.00000003.475792765.0000000000F33000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000002.784016944.0000000000F33000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000003.475615056.0000000000F33000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://188.165.79.151/~r
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00E9C324 InternetReadFile,
                        Source: global trafficHTTP traffic detected: GET / HTTP/1.1Cookie: CQHd=zROF5f0ZV1ZxZOeiJnhhFnLT/eIdAOEXkS+UqWmvXeeUa5HALooquXLstVuCCdmOVXvsMahuGIil7Z/r6qOuFjhQfDI8A2ofEM43G9ttUICAE9uNx6Fhx1n2lrRsMMMTx3azM7U+3k65+iRIhu5mKmMzhsnLsyfOfT+iQxewJc6NKVR9NE+e3qcP1Y3CnYPdyxgLKnYwwKKfunxCRdsXDWoB+OQyPwn+AGHfjdB6T5vGh5leD3pSUO5Ugv+Zrf4TmbS68/7svPcIMrtO2sDXc6RbVzCzf0fXaatnTZT1WjG8ZjSZDVfUeqe5k106rGD3Tg==Host: 188.165.79.151Connection: Keep-AliveCache-Control: no-cache
                        Source: unknownHTTPS traffic detected: 188.165.79.151:443 -> 192.168.2.6:49750 version: TLS 1.2

                        E-Banking Fraud

                        barindex
                        Source: Yara matchFile source: 00000007.00000002.783905665.0000000000EE8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 6.2.rundll32.exe.26bab700000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 7.2.regsvr32.exe.e50000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 5.2.rundll32.exe.1766c2b0000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 6.2.rundll32.exe.26bab700000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 5.2.rundll32.exe.1766c2b0000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 7.2.regsvr32.exe.e50000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 3.2.regsvr32.exe.2650000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 4.2.rundll32.exe.1ed72500000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 3.2.regsvr32.exe.2650000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 4.2.rundll32.exe.1ed72500000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000003.00000002.404900294.0000000002681000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000006.00000002.404253356.0000026BAB700000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000004.00000002.398318822.000001ED72500000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000005.00000002.399047583.000001766C2B0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000004.00000002.398411719.000001ED72641000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000006.00000002.404280554.0000026BAB731000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000007.00000002.783816835.0000000000E81000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000005.00000002.399210556.000001766C3F1000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000007.00000002.783761119.0000000000E50000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000003.00000002.404818681.0000000002650000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 5CUFfVMSaQ.dll, type: SAMPLE
                        Source: Yara matchFile source: 3.2.regsvr32.exe.180000000.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 7.2.regsvr32.exe.180000000.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000007.00000002.784489149.0000000180001000.00000020.00000001.01000000.00000006.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000003.00000002.406068538.0000000180001000.00000020.00000001.01000000.00000006.sdmp, type: MEMORY
                        Source: C:\Windows\System32\regsvr32.exeFile deleted: C:\Windows\System32\ZJPGATOTIe\uLEHsZT.dll:Zone.IdentifierJump to behavior
                        Source: C:\Windows\System32\regsvr32.exeFile created: C:\Windows\system32\ZJPGATOTIe\Jump to behavior
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018001C00C
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018001E038
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018001E224
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018001C23C
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018001A248
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018001A390
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800143D4
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018001E424
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018001C46C
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018001A4D8
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180056540
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018001C574
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180018598
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018001A5E4
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018001E60C
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018001C67C
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800126AC
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800426C8
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800086C4
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018001A6EC
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018000A734
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018001C784
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800227D0
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018001E7F4
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180016828
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018001C88C
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800228DC
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018001A918
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180024934
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018004E9B0
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800229E4
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018001E9F0
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180024A40
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180008A50
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018001CAB8
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180022AF0
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018001EB0C
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018001AB44
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180024B48
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018000EB58
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180022BF8
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018001EC14
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180024C54
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018001CCE4
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180022D00
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018001ED54
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180024D5C
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018001AD70
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180022E08
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180044E04
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018001EE60
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180024E64
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018001AE78
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180022F10
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018001CF10
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018001EF68
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180024F6C
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018000EF80
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018001AFA8
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180020FCC
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018004AFD0
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018004CFEC
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018001D018
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180013044
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180009070
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180025074
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018001B0C4
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018001D120
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018002713C
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018001D23C
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018003D290
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018001B2B0
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180027328
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018004B380
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018000D3A0
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018001D428
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018001B49C
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018001F4C0
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800234CC
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180027514
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180011540
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018002557C
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800235D4
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018000B5D8
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018003F5E4
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018000F608
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018001D614
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018002964C
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018003D650
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180025684
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800436B4
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800236DC
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018001B6DC
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180027714
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018002578C
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800237E4
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018004383C
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018005784C
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018001D854
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180025894
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018001B8C4
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800238EC
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800498EC
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800278FC
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018004B940
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018000B96C
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018002599C
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800199DC
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800239F4
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180059A0C
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018001DA3C
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180025AA4
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018001BAAC
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018003DAC0
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180027AE4
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180019AE4
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180023AF8
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180031B10
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180045B80
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180025BA8
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180023C00
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018001DC24
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180025CB0
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018001BCD4
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180019D14
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180015D9C
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180043DBC
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018001BDDC
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018004BE14
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018001DE4C
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018001FE64
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180019F44
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018000BF8C
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02640000
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_026A0358
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_026983D8
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0269606C
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02692008
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0269061C
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0269BA54
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02681A84
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02690B94
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_026A29A0
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02684FEC
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02699DE4
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0269327C
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02699270
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02681228
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0269223C
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_026892E8
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_026972F8
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0269A2DC
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02685360
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02691350
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0269F320
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_026A1320
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0269C324
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_026A53DC
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_026843A0
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0268E3B4
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0269C078
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02693044
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02682050
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02681000
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0269101C
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0269D0E8
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_026940E0
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_026A60C8
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_026A50D0
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_026830B8
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02699084
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0268D148
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0269115C
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_026A1150
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02698154
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0268B1E0
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_026951F0
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_026971F0
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0269C18C
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_026A4184
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0269E668
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_026A6644
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_026A3604
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_026926C4
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_026836D0
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0268E6B8
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0268175C
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0269373C
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0269B7C4
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_026997B0
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02697780
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02697468
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02696444
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_026A14EC
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0268A4C8
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_026884B8
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0269D484
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02694490
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0268F54C
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_026A2528
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0268E534
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0269051C
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_026885EC
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_026835B8
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0268CA68
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02694A38
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02691A08
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02696A00
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_026A3AE8
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02692AB4
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_026A6A84
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02693B28
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02687B30
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0268AB08
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02682B04
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02689BF8
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02692BF0
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0269ABBC
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_026A386C
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0269F854
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02683800
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0268881C
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0269C810
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02689814
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_026A5898
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02689938
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0269D93C
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_026A19AC
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_026A4980
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02688E6C
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_026A3E4C
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0269EE18
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0269BE10
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02682EA8
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_026A5F48
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0268CF5C
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02696F5C
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0268AF54
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_026A1F54
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02699F24
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02693F18
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_026A3FD8
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02685FBC
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02686F8C
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02687C64
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_026A1C50
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_026A5C18
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02681CAC
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02696D48
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02694D40
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02689D50
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0268DD20
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02684D84
                        Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000001ED724F0000
                        Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000001766C2A0000
                        Source: C:\Windows\System32\rundll32.exeCode function: 6_2_0000026BAB520000
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00E40000
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00EA3AE8
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00E8A4C8
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00E81A84
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00E9606C
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00E9F854
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00E9BA54
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00EA0A20
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00E9061C
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00E84FEC
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00E99DE4
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00E951F0
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00E983D8
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00E85FBC
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00E86F8C
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00EA0358
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00E9C324
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00E9AD10
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00E892E8
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00E9D0E8
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00EA14EC
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00E940E0
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00E972F8
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00EA60C8
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00E926C4
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00E9A2DC
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00E836D0
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00EA50D0
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00E82EA8
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00E81CAC
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00E830B8
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00E884B8
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00E8E6B8
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00E92AB4
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00E9D484
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00E99084
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00EA6A84
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00EA5898
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00E94490
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00E8CA68
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00E9E668
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00E97468
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00E88E6C
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00EA386C
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00E87C64
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00E9C078
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00E9327C
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00E99270
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00EA3E4C
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00E93044
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00E96444
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00EA6644
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00E82050
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00EA1C50
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00E81228
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00E94A38
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00E9223C
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00E91A08
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00E92008
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00E83800
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00E81000
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00E96A00
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00EA3604
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00E9EE18
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00EA5C18
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00E8881C
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00E9101C
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00E9C810
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00E9BE10
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00E89814
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00E885EC
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00E8B1E0
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00E89BF8
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00E92BF0
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00E971F0
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00E9B7C4
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00EA3FD8
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00EA53DC
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00EA19AC
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00E843A0
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00EA29A0
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00E835B8
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00E9ABBC
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00E997B0
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00E8E3B4
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00E9C18C
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00E97780
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00EA4980
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00E84D84
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00EA4184
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00E90B94
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00E85360
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00E8D148
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00E96D48
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00EA5F48
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00E8F54C
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00E94D40
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00E8175C
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00E8CF5C
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00E96F5C
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00E9115C
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00E89D50
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00E91350
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00EA1150
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00E8AF54
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00E98154
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00EA1F54
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00E93B28
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00EA2528
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00E8DD20
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00E9F320
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00EA1320
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00E99F24
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00E89938
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00E9D93C
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00E9373C
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00E87B30
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00E8E534
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00E8AB08
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00E82B04
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00E93F18
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00E9051C
                        Source: C:\Windows\System32\regsvr32.exeCode function: String function: 0000000180037D34 appears 44 times
                        Source: C:\Windows\System32\regsvr32.exeSection loaded: sfc.dll
                        Source: C:\Windows\System32\regsvr32.exeSection loaded: sfc.dll
                        Source: 5CUFfVMSaQ.dllStatic PE information: Number of sections : 12 > 10
                        Source: 5CUFfVMSaQ.dllVirustotal: Detection: 21%
                        Source: 5CUFfVMSaQ.dllMetadefender: Detection: 45%
                        Source: 5CUFfVMSaQ.dllReversingLabs: Detection: 80%
                        Source: 5CUFfVMSaQ.dllStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                        Source: C:\Windows\System32\loaddll64.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                        Source: unknownProcess created: C:\Windows\System32\loaddll64.exe loaddll64.exe "C:\Users\user\Desktop\5CUFfVMSaQ.dll"
                        Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\5CUFfVMSaQ.dll",#1
                        Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\5CUFfVMSaQ.dll
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\5CUFfVMSaQ.dll",#1
                        Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\5CUFfVMSaQ.dll,ABeFtrnwmgAedx
                        Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\5CUFfVMSaQ.dll,AEjATaIExpQg
                        Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\System32\regsvr32.exe C:\Windows\system32\regsvr32.exe "C:\Windows\system32\ZJPGATOTIe\uLEHsZT.dll"
                        Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\5CUFfVMSaQ.dll,AbfBlUFQKbpevAFdaCpElBdscB
                        Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
                        Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p
                        Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p
                        Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p
                        Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\5CUFfVMSaQ.dll",#1
                        Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\5CUFfVMSaQ.dll
                        Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\5CUFfVMSaQ.dll,ABeFtrnwmgAedx
                        Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\5CUFfVMSaQ.dll,AEjATaIExpQg
                        Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\5CUFfVMSaQ.dll,AbfBlUFQKbpevAFdaCpElBdscB
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\5CUFfVMSaQ.dll",#1
                        Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\System32\regsvr32.exe C:\Windows\system32\regsvr32.exe "C:\Windows\system32\ZJPGATOTIe\uLEHsZT.dll"
                        Source: C:\Windows\System32\regsvr32.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{D105A4D4-344C-48EB-9866-EE378D90658B}\InProcServer32
                        Source: classification engineClassification label: mal96.troj.evad.winDLL@19/0@0/51
                        Source: C:\Windows\System32\regsvr32.exeFile read: C:\Users\desktop.iniJump to behavior
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0269BA54 CreateToolhelp32Snapshot,Process32FirstW,FindCloseChangeNotification,
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\5CUFfVMSaQ.dll",#1
                        Source: 5CUFfVMSaQ.dllStatic PE information: More than 133 > 100 exports found
                        Source: 5CUFfVMSaQ.dllStatic PE information: Image base 0x180000000 > 0x60000000
                        Source: 5CUFfVMSaQ.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                        Source: 5CUFfVMSaQ.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                        Source: 5CUFfVMSaQ.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                        Source: 5CUFfVMSaQ.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                        Source: 5CUFfVMSaQ.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018007CB0E push rsp; retf
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018007CEE0 push rsp; retf
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018007D180 push rsp; retf
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018002D2C9 push rdi; ret
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018007D420 push rsp; retf
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018007D7C0 push rsp; retf
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018002D8FD push rdi; ret
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0269B61A push ebp; retf
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0269B540 push esi; iretd
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0269AE42 push ebp; iretd
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00E8236C push esp; retf
                        Source: 5CUFfVMSaQ.dllStatic PE information: section name: .00cfg
                        Source: 5CUFfVMSaQ.dllStatic PE information: section name: .gehcont
                        Source: 5CUFfVMSaQ.dllStatic PE information: section name: .gxfg
                        Source: 5CUFfVMSaQ.dllStatic PE information: section name: .retplne
                        Source: 5CUFfVMSaQ.dllStatic PE information: section name: .voltbl
                        Source: 5CUFfVMSaQ.dllStatic PE information: section name: _RDATA
                        Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\5CUFfVMSaQ.dll
                        Source: C:\Windows\System32\regsvr32.exePE file moved: C:\Windows\System32\ZJPGATOTIe\uLEHsZT.dllJump to behavior

                        Hooking and other Techniques for Hiding and Protection

                        barindex
                        Source: C:\Windows\System32\regsvr32.exeFile opened: C:\Windows\system32\ZJPGATOTIe\uLEHsZT.dll:Zone.Identifier read attributes | delete
                        Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                        Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
                        Source: C:\Windows\System32\regsvr32.exeAPI coverage: 4.9 %
                        Source: C:\Windows\System32\regsvr32.exeProcess information queried: ProcessInformation
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800426C8 _invalid_parameter_noinfo,_invalid_parameter_noinfo,FindFirstFileExW,FindNextFileW,FindClose,FindClose,
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800436B4 FindFirstFileExW,
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018004383C FindFirstFileExW,FindNextFileW,FindClose,FindClose,
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180043DBC FindFirstFileExW,FindNextFileW,FindClose,FindClose,
                        Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00EA0A20 FindFirstFileW,FindNextFileW,
                        Source: C:\Windows\System32\regsvr32.exeFile Volume queried: C:\ FullSizeInformation
                        Source: regsvr32.exe, 00000007.00000003.475792765.0000000000F33000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000002.784016944.0000000000F33000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000003.475615056.0000000000F33000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWP
                        Source: regsvr32.exe, 00000007.00000002.784076102.0000000000F51000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000003.475615056.0000000000F33000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000003.475742934.0000000000F50000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                        Source: svchost.exe, 0000000C.00000002.783802892.000001FB92800000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: HvHostWdiSystemHostScDeviceEnumWiaRpctrkwksAudioEndpointBuilderhidservdot3svcDsSvcfhsvcWPDBusEnumsvsvcwlansvcEmbeddedModeirmonSensorServicevmicvssNgcSvcsysmainDevQueryBrokerStorSvcvmickvpexchangevmicshutdownvmicguestinterfacevmicvmsessionNcbServiceNetmanDeviceAssociationServiceTabletInputServicePcaSvcIPxlatCfgSvcCscServiceUmRdpService
                        Source: svchost.exe, 0000000C.00000002.783857058.000001FB92824000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018003A8BC RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800385E0 GetProcessHeap,
                        Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
                        Source: C:\Windows\System32\loaddll64.exeProcess queried: DebugPort
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018003A8BC RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180003794 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180003A24 SetUnhandledExceptionFilter,
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180003A34 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,

                        HIPS / PFW / Operating System Protection Evasion

                        barindex
                        Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 188.165.79.151 443
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\5CUFfVMSaQ.dll",#1
                        Source: C:\Windows\System32\regsvr32.exeQueries volume information: C:\ VolumeInformation
                        Source: C:\Windows\System32\regsvr32.exeQueries volume information: C:\ VolumeInformation
                        Source: C:\Windows\System32\regsvr32.exeCode function: EnumSystemLocalesW,
                        Source: C:\Windows\System32\regsvr32.exeCode function: EnumSystemLocalesW,
                        Source: C:\Windows\System32\regsvr32.exeCode function: EnumSystemLocalesW,
                        Source: C:\Windows\System32\regsvr32.exeCode function: EnumSystemLocalesW,GetUserDefaultLCID,ProcessCodePage,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,
                        Source: C:\Windows\System32\regsvr32.exeCode function: GetLocaleInfoW,
                        Source: C:\Windows\System32\regsvr32.exeCode function: EnumSystemLocalesW,
                        Source: C:\Windows\System32\regsvr32.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,
                        Source: C:\Windows\System32\regsvr32.exeCode function: EnumSystemLocalesW,
                        Source: C:\Windows\System32\regsvr32.exeCode function: GetLocaleInfoW,
                        Source: C:\Windows\System32\regsvr32.exeCode function: EnumSystemLocalesW,
                        Source: C:\Windows\System32\regsvr32.exeCode function: GetLocaleInfoW,
                        Source: C:\Windows\System32\regsvr32.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,
                        Source: C:\Windows\System32\regsvr32.exeCode function: GetLocaleInfoW,
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180045B10 cpuid
                        Source: C:\Windows\System32\regsvr32.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
                        Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180004050 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,

                        Stealing of Sensitive Information

                        barindex
                        Source: Yara matchFile source: 00000007.00000002.783905665.0000000000EE8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 6.2.rundll32.exe.26bab700000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 7.2.regsvr32.exe.e50000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 5.2.rundll32.exe.1766c2b0000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 6.2.rundll32.exe.26bab700000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 5.2.rundll32.exe.1766c2b0000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 7.2.regsvr32.exe.e50000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 3.2.regsvr32.exe.2650000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 4.2.rundll32.exe.1ed72500000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 3.2.regsvr32.exe.2650000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 4.2.rundll32.exe.1ed72500000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000003.00000002.404900294.0000000002681000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000006.00000002.404253356.0000026BAB700000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000004.00000002.398318822.000001ED72500000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000005.00000002.399047583.000001766C2B0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000004.00000002.398411719.000001ED72641000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000006.00000002.404280554.0000026BAB731000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000007.00000002.783816835.0000000000E81000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000005.00000002.399210556.000001766C3F1000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000007.00000002.783761119.0000000000E50000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000003.00000002.404818681.0000000002650000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 5CUFfVMSaQ.dll, type: SAMPLE
                        Source: Yara matchFile source: 3.2.regsvr32.exe.180000000.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 7.2.regsvr32.exe.180000000.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000007.00000002.784489149.0000000180001000.00000020.00000001.01000000.00000006.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000003.00000002.406068538.0000000180001000.00000020.00000001.01000000.00000006.sdmp, type: MEMORY
                        Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                        Valid AccountsWindows Management Instrumentation1
                        DLL Side-Loading
                        111
                        Process Injection
                        2
                        Masquerading
                        OS Credential Dumping1
                        System Time Discovery
                        Remote Services1
                        Archive Collected Data
                        Exfiltration Over Other Network Medium11
                        Encrypted Channel
                        Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                        Default AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
                        DLL Side-Loading
                        1
                        Virtualization/Sandbox Evasion
                        LSASS Memory31
                        Security Software Discovery
                        Remote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth2
                        Ingress Tool Transfer
                        Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                        Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)111
                        Process Injection
                        Security Account Manager1
                        Virtualization/Sandbox Evasion
                        SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration1
                        Non-Application Layer Protocol
                        Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                        Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)1
                        Deobfuscate/Decode Files or Information
                        NTDS2
                        Process Discovery
                        Distributed Component Object ModelInput CaptureScheduled Transfer12
                        Application Layer Protocol
                        SIM Card SwapCarrier Billing Fraud
                        Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
                        Hidden Files and Directories
                        LSA Secrets2
                        File and Directory Discovery
                        SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                        Replication Through Removable MediaLaunchdRc.commonRc.common2
                        Obfuscated Files or Information
                        Cached Domain Credentials34
                        System Information Discovery
                        VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                        External Remote ServicesScheduled TaskStartup ItemsStartup Items1
                        Regsvr32
                        DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                        Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job1
                        Rundll32
                        Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
                        Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)1
                        DLL Side-Loading
                        /etc/passwd and /etc/shadowSystem Network Connections DiscoverySoftware Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
                        Supply Chain CompromiseAppleScriptAt (Windows)At (Windows)1
                        File Deletion
                        Network SniffingProcess DiscoveryTaint Shared ContentLocal Data StagingExfiltration Over Unencrypted/Obfuscated Non-C2 ProtocolFile Transfer ProtocolsData Encrypted for Impact
                        Hide Legend

                        Legend:

                        • Process
                        • Signature
                        • Created File
                        • DNS/IP Info
                        • Is Dropped
                        • Is Windows Process
                        • Number of created Registry Values
                        • Number of created Files
                        • Visual Basic
                        • Delphi
                        • Java
                        • .Net C# or VB.NET
                        • C, C++ or other language
                        • Is malicious
                        • Internet
                        behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 671666 Sample: 5CUFfVMSaQ.dll Startdate: 22/07/2022 Architecture: WINDOWS Score: 96 32 103.224.241.74 WEBWERKS-AS-INWebWerksIndiaPvtLtdIN India 2->32 34 202.29.239.162 UNINET-AS-APUNINET-TH Thailand 2->34 36 47 other IPs or domains 2->36 44 Snort IDS alert for network traffic 2->44 46 Multi AV Scanner detection for submitted file 2->46 48 2->48 50 2 other signatures 2->50 8 loaddll64.exe 1 2->8         started        10 svchost.exe 2->10         started        13 svchost.exe 1 2->13         started        15 2 other processes 2->15 signatures3 process4 dnsIp5 17 regsvr32.exe 5 8->17         started        20 cmd.exe 1 8->20         started        22 rundll32.exe 8->22         started        24 2 other processes 8->24 38 192.168.2.1 unknown unknown 10->38 process6 signatures7 42 Hides that the sample has been downloaded from the Internet (zone.identifier) 17->42 26 regsvr32.exe 17->26         started        30 rundll32.exe 20->30         started        process8 dnsIp9 40 188.165.79.151, 443, 49750 OVHFR France 26->40 52 System process connects to network (likely due to code injection or exploit) 26->52 signatures10

                        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                        windows-stand
                        SourceDetectionScannerLabelLink
                        5CUFfVMSaQ.dll21%VirustotalBrowse
                        5CUFfVMSaQ.dll46%MetadefenderBrowse
                        5CUFfVMSaQ.dll81%ReversingLabsWin64.Trojan.Emotet
                        No Antivirus matches
                        No Antivirus matches
                        No Antivirus matches
                        SourceDetectionScannerLabelLink
                        https://188.165.79.151/6S#0%Avira URL Cloudsafe
                        https://188.165.79.151/0%URL Reputationsafe
                        http://crl.v0%URL Reputationsafe
                        https://188.165.79.151/~r0%Avira URL Cloudsafe
                        No contacted domains info
                        NameMaliciousAntivirus DetectionReputation
                        https://188.165.79.151/true
                        • URL Reputation: safe
                        unknown
                        NameSourceMaliciousAntivirus DetectionReputation
                        https://188.165.79.151/6S#regsvr32.exe, 00000007.00000002.783905665.0000000000EE8000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://crl.vregsvr32.exe, 00000007.00000002.784206191.0000000000F84000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000003.475529987.0000000000F84000.00000004.00000020.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        https://188.165.79.151/~rregsvr32.exe, 00000007.00000003.475792765.0000000000F33000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000002.784016944.0000000000F33000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000003.475615056.0000000000F33000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        • No. of IPs < 25%
                        • 25% < No. of IPs < 50%
                        • 50% < No. of IPs < 75%
                        • 75% < No. of IPs
                        IPDomainCountryFlagASNASN NameMalicious
                        157.230.99.206
                        unknownUnited States
                        14061DIGITALOCEAN-ASNUStrue
                        188.165.79.151
                        unknownFrance
                        16276OVHFRtrue
                        196.44.98.190
                        unknownGhana
                        327814EcobandGHtrue
                        43.129.209.178
                        unknownJapan4249LILLY-ASUStrue
                        36.67.23.59
                        unknownIndonesia
                        17974TELKOMNET-AS2-APPTTelekomunikasiIndonesiaIDtrue
                        103.41.204.169
                        unknownIndonesia
                        58397INFINYS-AS-IDPTInfinysSystemIndonesiaIDtrue
                        5.253.30.17
                        unknownLatvia
                        18978ENZUINC-UStrue
                        85.214.67.203
                        unknownGermany
                        6724STRATOSTRATOAGDEtrue
                        83.229.80.93
                        unknownUnited Kingdom
                        8513SKYVISIONGBtrue
                        198.199.70.22
                        unknownUnited States
                        14061DIGITALOCEAN-ASNUStrue
                        93.104.209.107
                        unknownGermany
                        8767MNET-ASGermanyDEtrue
                        188.225.32.231
                        unknownRussian Federation
                        9123TIMEWEB-ASRUtrue
                        175.126.176.79
                        unknownKorea Republic of
                        9523MOKWON-AS-KRMokwonUniversityKRtrue
                        128.199.242.164
                        unknownUnited Kingdom
                        14061DIGITALOCEAN-ASNUStrue
                        104.248.225.227
                        unknownUnited States
                        14061DIGITALOCEAN-ASNUStrue
                        46.101.98.60
                        unknownNetherlands
                        14061DIGITALOCEAN-ASNUStrue
                        190.145.8.4
                        unknownColombia
                        14080TelmexColombiaSACOtrue
                        103.71.99.57
                        unknownIndia
                        135682AWDHPL-AS-INAdvikaWebDevelopmentsHostingPvtLtdINtrue
                        87.106.97.83
                        unknownGermany
                        8560ONEANDONE-ASBrauerstrasse48DEtrue
                        103.254.12.236
                        unknownViet Nam
                        56151DIGISTAR-VNDigiStarCompanyLimitedVNtrue
                        103.85.95.4
                        unknownIndonesia
                        136077IDNIC-UNSRAT-AS-IDUniversitasIslamNegeriMataramIDtrue
                        202.134.4.210
                        unknownIndonesia
                        7713TELKOMNET-AS-APPTTelekomunikasiIndonesiaIDtrue
                        88.217.172.165
                        unknownGermany
                        8767MNET-ASGermanyDEtrue
                        165.22.254.236
                        unknownUnited States
                        14061DIGITALOCEAN-ASNUStrue
                        78.47.204.80
                        unknownGermany
                        24940HETZNER-ASDEtrue
                        118.98.72.86
                        unknownIndonesia
                        7713TELKOMNET-AS-APPTTelekomunikasiIndonesiaIDtrue
                        139.59.80.108
                        unknownSingapore
                        14061DIGITALOCEAN-ASNUStrue
                        37.44.244.177
                        unknownGermany
                        47583AS-HOSTINGERLTtrue
                        104.244.79.94
                        unknownUnited States
                        53667PONYNETUStrue
                        157.245.111.0
                        unknownUnited States
                        14061DIGITALOCEAN-ASNUStrue
                        54.37.106.167
                        unknownFrance
                        16276OVHFRtrue
                        202.29.239.162
                        unknownThailand
                        4621UNINET-AS-APUNINET-THtrue
                        103.56.149.105
                        unknownIndonesia
                        55688BEON-AS-IDPTBeonIntermediaIDtrue
                        85.25.120.45
                        unknownGermany
                        8972GD-EMEA-DC-SXB1DEtrue
                        37.187.114.15
                        unknownFrance
                        16276OVHFRtrue
                        46.101.234.246
                        unknownNetherlands
                        14061DIGITALOCEAN-ASNUStrue
                        139.196.72.155
                        unknownChina
                        37963CNNIC-ALIBABA-CN-NET-APHangzhouAlibabaAdvertisingCoLtdtrue
                        165.232.185.110
                        unknownUnited States
                        22255ALLEGHENYHEALTHNETWORKUStrue
                        103.126.216.86
                        unknownBangladesh
                        138482SKYVIEW-AS-APSKYVIEWONLINELTDBDtrue
                        128.199.217.206
                        unknownUnited Kingdom
                        14061DIGITALOCEAN-ASNUStrue
                        116.124.128.206
                        unknownKorea Republic of
                        9318SKB-ASSKBroadbandCoLtdKRtrue
                        103.224.241.74
                        unknownIndia
                        133296WEBWERKS-AS-INWebWerksIndiaPvtLtdINtrue
                        210.57.209.142
                        unknownIndonesia
                        38142UNAIR-AS-IDUniversitasAirlanggaIDtrue
                        190.107.19.179
                        unknownColombia
                        27951MediaCommercePartnersSACOtrue
                        202.28.34.99
                        unknownThailand
                        9562MSU-TH-APMahasarakhamUniversityTHtrue
                        54.37.228.122
                        unknownFrance
                        16276OVHFRtrue
                        195.77.239.39
                        unknownSpain
                        60493FICOSA-ASEStrue
                        178.62.112.199
                        unknownEuropean Union
                        14061DIGITALOCEAN-ASNUStrue
                        62.171.178.147
                        unknownUnited Kingdom
                        51167CONTABODEtrue
                        64.227.55.231
                        unknownUnited States
                        14061DIGITALOCEAN-ASNUStrue
                        IP
                        192.168.2.1
                        Joe Sandbox Version:35.0.0 Citrine
                        Analysis ID:671666
                        Start date and time: 22/07/202213:26:182022-07-22 13:26:18 +02:00
                        Joe Sandbox Product:CloudBasic
                        Overall analysis duration:0h 9m 16s
                        Hypervisor based Inspection enabled:false
                        Report type:light
                        Sample file name:5CUFfVMSaQ.dll
                        Cookbook file name:default.jbs
                        Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                        Run name:Run with higher sleep bypass
                        Number of analysed new started processes analysed:21
                        Number of new started drivers analysed:0
                        Number of existing processes analysed:0
                        Number of existing drivers analysed:0
                        Number of injected processes analysed:0
                        Technologies:
                        • HCA enabled
                        • EGA enabled
                        • HDC enabled
                        • AMSI enabled
                        Analysis Mode:default
                        Analysis stop reason:Timeout
                        Detection:MAL
                        Classification:mal96.troj.evad.winDLL@19/0@0/51
                        EGA Information:
                        • Successful, ratio: 100%
                        HDC Information:
                        • Successful, ratio: 88.8% (good quality ratio 83.1%)
                        • Quality average: 75.3%
                        • Quality standard deviation: 30.7%
                        HCA Information:
                        • Successful, ratio: 100%
                        • Number of executed functions: 0
                        • Number of non-executed functions: 0
                        Cookbook Comments:
                        • Found application associated with file extension: .dll
                        • Adjust boot time
                        • Enable AMSI
                        • Sleeps bigger than 300000ms are automatically reduced to 1000ms
                        • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, WMIADAP.exe, conhost.exe, backgroundTaskHost.exe
                        • Excluded IPs from analysis (whitelisted): 20.54.89.106
                        • Excluded domains from analysis (whitelisted): www.bing.com, ris.api.iris.microsoft.com, client.wns.windows.com, store-images.s-microsoft.com, login.live.com, sls.update.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, arc.msn.com, glb.sls.prod.dcat.dsp.trafficmanager.net
                        • Not all processes where analyzed, report is missing behavior information
                        • Report size exceeded maximum capacity and may have missing behavior information.
                        • Report size exceeded maximum capacity and may have missing disassembly code.
                        • Report size getting too big, too many NtOpenKeyEx calls found.
                        • Report size getting too big, too many NtProtectVirtualMemory calls found.
                        • Report size getting too big, too many NtQueryValueKey calls found.
                        No simulations
                        No context
                        No context
                        No context
                        No context
                        No context
                        No created / dropped files found
                        File type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                        Entropy (8bit):6.931234965672042
                        TrID:
                        • Win64 Dynamic Link Library (generic) (102004/3) 86.43%
                        • Win64 Executable (generic) (12005/4) 10.17%
                        • Generic Win/DOS Executable (2004/3) 1.70%
                        • DOS Executable Generic (2002/1) 1.70%
                        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.01%
                        File name:5CUFfVMSaQ.dll
                        File size:691200
                        MD5:5d4728494832d03bbfb75367836fef4e
                        SHA1:abcbd283801a05390995862f59dcb5310f3d3d88
                        SHA256:caa60b9025dfba07efac6cae5438a8e20d9b7c210a721a4cf1f9d7b6df4d7d90
                        SHA512:89f38029d8cc4718af304e325a290294a000e68fea0d036fbe118cc04bd3ae5a676cab2dbc6ea4d1c53eeac804cd23756c01dce378a317cb683200365ad5079a
                        SSDEEP:12288:pBBKShhc/bQisqkxf3CJS+HQ58B6loNJYlvw9zaaxRHdAsxuvt3a1gYao3ovJK6S:bBHlvw9GanHrot3hoW
                        TLSH:45E4BE56ABE404B1E1B7D235C9128E81FAB3FC544724AB8B03E095B62F233AC557F716
                        File Content Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..d......b.........." ................d?.......................................0............ ........................................
                        Icon Hash:74f0e4ecccdce0e4
                        Entrypoint:0x180003f64
                        Entrypoint Section:.text
                        Digitally signed:false
                        Imagebase:0x180000000
                        Subsystem:windows gui
                        Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, DLL
                        DLL Characteristics:HIGH_ENTROPY_VA, NX_COMPAT
                        Time Stamp:0x62BAE9E7 [Tue Jun 28 11:45:43 2022 UTC]
                        TLS Callbacks:
                        CLR (.Net) Version:
                        OS Version Major:6
                        OS Version Minor:0
                        File Version Major:6
                        File Version Minor:0
                        Subsystem Version Major:6
                        Subsystem Version Minor:0
                        Import Hash:6cc0be0d01417a15b61c3b6a580e87ed
                        Instruction
                        dec eax
                        mov dword ptr [esp+08h], ebx
                        dec eax
                        mov dword ptr [esp+10h], esi
                        push edi
                        dec eax
                        sub esp, 20h
                        dec ecx
                        mov edi, eax
                        mov ebx, edx
                        dec eax
                        mov esi, ecx
                        cmp edx, 01h
                        jne 00007F6430A07C37h
                        call 00007F6430A07C54h
                        dec esp
                        mov eax, edi
                        mov edx, ebx
                        dec eax
                        mov ecx, esi
                        dec eax
                        mov ebx, dword ptr [esp+30h]
                        dec eax
                        mov esi, dword ptr [esp+38h]
                        dec eax
                        add esp, 20h
                        pop edi
                        jmp 00007F6430A07AC4h
                        int3
                        int3
                        int3
                        dec eax
                        mov dword ptr [esp+20h], ebx
                        push ebp
                        dec eax
                        mov ebp, esp
                        dec eax
                        sub esp, 20h
                        dec eax
                        mov eax, dword ptr [0006E0C0h]
                        dec eax
                        mov ebx, 2DDFA232h
                        cdq
                        sub eax, dword ptr [eax]
                        add byte ptr [eax+3Bh], cl
                        ret
                        jne 00007F6430A07CA6h
                        dec eax
                        and dword ptr [ebp+18h], 00000000h
                        dec eax
                        lea ecx, dword ptr [ebp+18h]
                        call dword ptr [0006741Ah]
                        dec eax
                        mov eax, dword ptr [ebp+18h]
                        dec eax
                        mov dword ptr [ebp+10h], eax
                        call dword ptr [0006738Ch]
                        mov eax, eax
                        dec eax
                        xor dword ptr [ebp+10h], eax
                        call dword ptr [00067370h]
                        mov eax, eax
                        dec eax
                        lea ecx, dword ptr [ebp+20h]
                        dec eax
                        xor dword ptr [ebp+10h], eax
                        call dword ptr [00067490h]
                        mov eax, dword ptr [ebp+20h]
                        dec eax
                        lea ecx, dword ptr [ebp+10h]
                        dec eax
                        shl eax, 20h
                        dec eax
                        xor eax, dword ptr [ebp+20h]
                        dec eax
                        xor eax, dword ptr [ebp+10h]
                        dec eax
                        xor eax, ecx
                        dec eax
                        mov ecx, FFFFFFFFh
                        NameVirtual AddressVirtual Size Is in Section
                        IMAGE_DIRECTORY_ENTRY_EXPORT0x69f180xe9d.rdata
                        IMAGE_DIRECTORY_ENTRY_IMPORT0x6adb50x50.rdata
                        IMAGE_DIRECTORY_ENTRY_RESOURCE0x890000x28080.rsrc
                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x750000x4620.pdata
                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                        IMAGE_DIRECTORY_ENTRY_BASERELOC0xb20000x808.reloc
                        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x5ed800x138.rdata
                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_IAT0x6b1b80x3b0.rdata
                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                        NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                        .text0x10000x5c9660x5ca00False0.4055093412618084data6.495336903226537IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                        .rdata0x5e0000x131740x13200False0.41204554738562094data5.399737438631881IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        .data0x720000x28940xe00False0.15625data2.3008281540935718IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                        .pdata0x750000x46200x4800False0.4896918402777778data5.7263789636668765IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        .00cfg0x7a0000x280x200False0.05859375data0.37171553503035126IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        .gehcont0x7b0000x500x200False0.130859375PGP\011Secret Sub-key -0.5546627733147627IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        .gxfg0x7c0000x9eb00xa000False0.336083984375data5.261757688277708IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        .retplne0x860000x5c0x200False0.087890625data0.8458487823546629
                        .voltbl0x870000x540x200False0.18359375data1.322754253639915
                        _RDATA0x880000xf40x200False0.314453125data1.9917660782863578IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        .rsrc0x890000x280800x28200False0.8353168808411215data7.725336511078031IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        .reloc0xb20000x8080xa00False0.454296875data4.922299312910362IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                        NameRVASizeTypeLanguageCountry
                        RT_STRING0xb10380x48dataEnglishUnited States
                        RT_HTML0x892380x27e00dataEnglishUnited States
                        RT_MANIFEST0x890f00x143XML 1.0 document, ASCII textEnglishUnited States
                        DLLImport
                        GDI32.dllCreatePen, DeleteObject, LineTo, MoveToEx, Polyline, SelectObject
                        USER32.dllBeginPaint, CloseGestureInfoHandle, CreateWindowExW, DefWindowProcW, DestroyWindow, DispatchMessageW, EndPaint, GetGestureInfo, GetMessageW, InvalidateRect, LoadCursorW, LoadStringW, PostQuitMessage, RegisterClassExW, ScreenToClient, SetGestureConfig, ShowWindow, TranslateAcceleratorW, TranslateMessage, UpdateWindow
                        KERNEL32.dllCloseHandle, CompareStringW, CreateFileW, DeleteCriticalSection, EncodePointer, EnterCriticalSection, EnumSystemLocalesW, ExitProcess, FindClose, FindFirstFileExW, FindNextFileW, FlsAlloc, FlsFree, FlsGetValue, FlsSetValue, FlushFileBuffers, FreeEnvironmentStringsW, FreeLibrary, GetACP, GetCPInfo, GetCommandLineA, GetCommandLineW, GetConsoleMode, GetConsoleOutputCP, GetCurrentProcess, GetCurrentProcessId, GetCurrentThread, GetCurrentThreadId, GetDateFormatW, GetEnvironmentStringsW, GetFileSizeEx, GetFileType, GetLastError, GetLocaleInfoW, GetModuleFileNameW, GetModuleHandleExW, GetModuleHandleW, GetOEMCP, GetProcAddress, GetProcessHeap, GetStartupInfoW, GetStdHandle, GetStringTypeW, GetSystemTimeAsFileTime, GetTimeFormatW, GetUserDefaultLCID, HeapAlloc, HeapFree, HeapReAlloc, HeapSize, InitializeCriticalSectionAndSpinCount, InitializeSListHead, InterlockedFlushSList, InterlockedPushEntrySList, IsDebuggerPresent, IsProcessorFeaturePresent, IsValidCodePage, IsValidLocale, LCMapStringW, LeaveCriticalSection, LoadLibraryExW, MultiByteToWideChar, OutputDebugStringW, QueryPerformanceCounter, RaiseException, ReadConsoleW, ReadFile, RtlCaptureContext, RtlLookupFunctionEntry, RtlPcToFileHeader, RtlUnwind, RtlUnwindEx, RtlVirtualUnwind, SetConsoleCtrlHandler, SetEnvironmentVariableW, SetFilePointerEx, SetLastError, SetStdHandle, SetUnhandledExceptionFilter, TerminateProcess, TlsAlloc, TlsFree, TlsGetValue, TlsSetValue, UnhandledExceptionFilter, VirtualAlloc, WideCharToMultiByte, WriteConsoleW, WriteFile
                        NameOrdinalAddress
                        ABeFtrnwmgAedx10x1800029d0
                        AEjATaIExpQg20x180002890
                        AbfBlUFQKbpevAFdaCpElBdscB30x180002200
                        AhCiOqhwyUiZbbsGncKmyLU40x1800026f0
                        AppWcUGsNPSALiojxbzmIncLqw50x1800028f0
                        BuDIuWLYHzeYLi60x180002260
                        BzspXLkN70x1800024f0
                        CAJbrnGzThPxKInHYeNbeiD80x180002980
                        CAizYoExRRpdPoWVbPYKFDwgiU90x180002800
                        DllRegisterServer100x180002170
                        DsznQIJtSEfpoaC110x1800022b0
                        DwKmpHIDu120x180002930
                        ECDzEWMCYJeoRkryuQOsYJpmq130x1800022e0
                        FAcdRHAWz140x180002610
                        FFgOwmblMRuJiEZKeYTYiuzs150x1800023f0
                        FGcNCKAIdduwyHBYG160x180002860
                        FrsmtxAdhb170x180002590
                        FycDPRFayBivcQtViJFBB180x180002320
                        GGGPAvQKBPbfXZZaHVp190x180002920
                        GKgyyDJNJDeNTLdDtczKsL200x180002340
                        GMWWgDWCipXlIkjHwoUVUkcYR210x1800026e0
                        GXJpVyiTrLHOne220x1800023d0
                        HJTFoxcPliQgvLgH230x180002820
                        HLCABIQMByMWBQl240x180002720
                        HSSmJwdyKCypI250x180002650
                        HuenqNYbiVIeAyMGFYkiYBPFpc260x180002770
                        IxremlDMjrvkDxgZfhGQZrk270x180002700
                        IxvOJTyBGbJYNRuYaPxjyAUmf280x180002380
                        JQPbXc290x180002270
                        JcMTbvPHZlumePpXUBhRJWcp300x180002350
                        JnZLIBBbkn310x1800025e0
                        JohOupoqASpLhYFLsyWn320x180002950
                        JwPmjlqZQXgHaQjgtKwKH330x180002940
                        LsCgTlMZDLwMutNSvzYIEdEhwL340x180002330
                        MPWJOPLDpgeYBymjBqgQIjmNoZ350x180002360
                        MXztYxhtX360x1800021f0
                        McniJoPJlmcEHlRCsaUz370x180002550
                        MhvpJKCzeAS380x180002620
                        MmBOoLzloNcLojEtz390x1800027a0
                        MoxtcCOHATssMTmiLf400x1800029e0
                        MpzzLNccslEpsqsI410x180002540
                        NqTxbmWhjf420x1800027e0
                        NsnrjJneCojFavepwQt430x180002430
                        OFTAEmNeIKkEpTykdZkNKIzp440x180002520
                        OguNFmV450x1800025f0
                        PXDdTdN460x1800026d0
                        PvWkibWuSiAacbZGzrkJUt470x1800021b0
                        QFGNloHdiwsP480x180002450
                        QOFKcQtiQXM490x180002830
                        QmukeRFviFO500x1800021a0
                        QupOoHScTGifO510x1800026a0
                        QyvetqDJywCLrVJLzofDOegxwP520x180002710
                        RmPpiUfGU530x180002750
                        SIkquaNCflVmESatNcndpdTlpe540x1800028d0
                        SfIHxYaArvTuFNrMVIbyX550x180002470
                        UWpelES560x180002880
                        UkLettFcomFXma570x180002990
                        VLdhIHLdMhyW580x1800025b0
                        VcULfipZVLXGKZRfrueex590x180002500
                        VqpcWzxeRjlVhQwQzv600x180002410
                        WBpPkPKcWeqGwAzzvNIH610x180002790
                        WEDyKrcivTPPlSwCwT620x180002370
                        WoptoKqfVNqOqwssFKVZfo630x180002670
                        XnGdCqyiMLdhVnMShSkq640x180002630
                        YMyyyHvdBObwWJjXdFk650x180002250
                        YihCWA660x180002530
                        YweLMeZukpQkvnZnYHkhCM670x180002780
                        ZLVzkIypQXUkzx680x180002900
                        ZSoNGzxKLdyqDghj690x180002640
                        ZkiQhRLkrjLkJNX700x180002730
                        ZmqtKkySX710x180002210
                        aPfqQAbMTzuJNp720x180002390
                        aehnZNNrhIsF730x1800029a0
                        amxdxgjfMZcXaFUifsfcvLXi740x1800022a0
                        bPfPnNT750x1800023a0
                        bubLuYEWIvIWsBNJTUOnl760x1800023e0
                        cTcqyCZyBDJvEFnsvQYDCOLAoT770x1800022f0
                        cYubuRW780x1800027f0
                        clFUgmrVuPSljrxXorVz790x180002230
                        dbMiEkrHbNnvlIaysX800x180002600
                        dgAUOlElUrm810x1800021d0
                        dxEatgtTYroSUkMiQaL820x180002220
                        eCkbiLnmCybWxEn830x180002440
                        efVluiugFvmsD840x1800029b0
                        exoEcLTZltlKDhXcTPLBLvM850x1800026b0
                        fAgLiyKNqrsT860x180002660
                        fEeZsQFKbuLaABrhuAbOhNj870x180002420
                        gYiNJrEBUixiSygWCLlsEf880x180002680
                        gpObsYCSb890x1800023c0
                        gtbMrIHBEjSZnmBWPb900x180002840
                        hCcvyzzlUZCYlRNZCTK910x1800027b0
                        hPDZNFuvABEgQeoD920x180002850
                        hsEYnjr930x180002460
                        iLEOjsJklFUGkNI940x1800025c0
                        iLjGFeOafkDi950x1800024d0
                        jcCPKYwgGqRpySHQKBnfIdayWD960x1800022c0
                        jjTWNPlegZljgiNVCWFLUDkFH970x180002280
                        kffHAP980x180002560
                        lUlTXKofnHgBxwxJLPdDPpCz990x1800028c0
                        lYaeKiHDZBLcjXyoPcEOBUc1000x1800024c0
                        lpGoEIn1010x1800023b0
                        mAtENYctTeMWWmtQ1020x180002760
                        mEiZkvnenxFVSgbXocseslt1030x1800028a0
                        mSkIHCWnxYjPAvLhkizRM1040x180002480
                        nciUfwCE1050x1800025a0
                        nfBvdBN1060x180002310
                        ngwzyo1070x180002960
                        njQxmJYMOWniVIJCxlqYaGwyco1080x180002290
                        pikxaDuNdKkEyUKlBLtRo1090x1800024b0
                        qYcNCgPzHhoixH1100x180002400
                        qbLCbNjvgZccfXANyoilYHLz1110x1800024a0
                        rIgvWBvLm1120x180002810
                        rMHLHjIymAUoTHNFdsfNPiQH1130x1800028b0
                        riiAnEEXhiFVUIdp1140x180002870
                        sCXUQoygEhYAvHSLAtQPOlI1150x180002910
                        sNgDDxTXeDBSWJVL1160x1800021c0
                        sjmfaFHjAYLiTOs1170x180002970
                        uFvBoQlDuBHPbcggfbqTz1180x180002240
                        uKxBgklrkubs1190x180002300
                        ueGFocoIB1200x180002690
                        ueINzYdzNpuGfNAPnf1210x1800029c0
                        vAVSflnhL1220x1800022d0
                        vJROvhiSqVeOiIsH1230x1800021e0
                        vfDcFWpsvSWqEKgMwpzmloZ1240x1800027c0
                        vzyObHl1250x1800027d0
                        wAavZUBVHJ1260x180002740
                        wCHWOvC1270x1800026c0
                        wQlVOK1280x1800028e0
                        wZFewnVovChWmNJWJDqUTvJm1290x180002580
                        wkraMphf1300x1800025d0
                        xkQCLrMtQvyCjJhPSdk1310x1800024e0
                        yYodwLnmm1320x180002510
                        ysdKIUzdVU1330x180002570
                        zFCiVYrpvmmXdRHTSKMcojyZb1340x180002490
                        Language of compilation systemCountry where language is spokenMap
                        EnglishUnited States
                        TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                        192.168.2.5188.165.79.151497724432404320 07/22/22-13:16:45.923727TCP2404320ET CNC Feodo Tracker Reported CnC Server TCP group 1149772443192.168.2.5188.165.79.151
                        TimestampSource PortDest PortSource IPDest IP
                        Jul 22, 2022 13:28:19.643986940 CEST49750443192.168.2.6188.165.79.151
                        Jul 22, 2022 13:28:19.644041061 CEST44349750188.165.79.151192.168.2.6
                        Jul 22, 2022 13:28:19.644174099 CEST49750443192.168.2.6188.165.79.151
                        Jul 22, 2022 13:28:19.676512957 CEST49750443192.168.2.6188.165.79.151
                        Jul 22, 2022 13:28:19.676542997 CEST44349750188.165.79.151192.168.2.6
                        Jul 22, 2022 13:28:19.796740055 CEST44349750188.165.79.151192.168.2.6
                        Jul 22, 2022 13:28:19.797034025 CEST49750443192.168.2.6188.165.79.151
                        Jul 22, 2022 13:28:20.188575983 CEST49750443192.168.2.6188.165.79.151
                        Jul 22, 2022 13:28:20.188611031 CEST44349750188.165.79.151192.168.2.6
                        Jul 22, 2022 13:28:20.188957930 CEST44349750188.165.79.151192.168.2.6
                        Jul 22, 2022 13:28:20.189049959 CEST49750443192.168.2.6188.165.79.151
                        Jul 22, 2022 13:28:20.193274975 CEST49750443192.168.2.6188.165.79.151
                        Jul 22, 2022 13:28:20.236506939 CEST44349750188.165.79.151192.168.2.6
                        Jul 22, 2022 13:28:20.432982922 CEST44349750188.165.79.151192.168.2.6
                        Jul 22, 2022 13:28:20.433113098 CEST49750443192.168.2.6188.165.79.151
                        Jul 22, 2022 13:28:20.433130026 CEST44349750188.165.79.151192.168.2.6
                        Jul 22, 2022 13:28:20.433193922 CEST49750443192.168.2.6188.165.79.151
                        Jul 22, 2022 13:28:20.441657066 CEST49750443192.168.2.6188.165.79.151
                        Jul 22, 2022 13:28:20.441689968 CEST44349750188.165.79.151192.168.2.6
                        • 188.165.79.151
                        Session IDSource IPSource PortDestination IPDestination PortProcess
                        0192.168.2.649750188.165.79.151443C:\Windows\System32\regsvr32.exe
                        TimestampkBytes transferredDirectionData
                        2022-07-22 11:28:20 UTC0OUTGET / HTTP/1.1
                        Cookie: CQHd=zROF5f0ZV1ZxZOeiJnhhFnLT/eIdAOEXkS+UqWmvXeeUa5HALooquXLstVuCCdmOVXvsMahuGIil7Z/r6qOuFjhQfDI8A2ofEM43G9ttUICAE9uNx6Fhx1n2lrRsMMMTx3azM7U+3k65+iRIhu5mKmMzhsnLsyfOfT+iQxewJc6NKVR9NE+e3qcP1Y3CnYPdyxgLKnYwwKKfunxCRdsXDWoB+OQyPwn+AGHfjdB6T5vGh5leD3pSUO5Ugv+Zrf4TmbS68/7svPcIMrtO2sDXc6RbVzCzf0fXaatnTZT1WjG8ZjSZDVfUeqe5k106rGD3Tg==
                        Host: 188.165.79.151
                        Connection: Keep-Alive
                        Cache-Control: no-cache
                        2022-07-22 11:28:20 UTC0INHTTP/1.1 200 OK
                        Server: nginx
                        Date: Fri, 22 Jul 2022 11:28:20 GMT
                        Content-Type: text/html; charset=UTF-8
                        Transfer-Encoding: chunked
                        Connection: close
                        2022-07-22 11:28:20 UTC0INData Raw: 32 65 66 0d 0a 40 3b 9e 82 cd 97 13 b8 f6 6d 02 bc 58 e4 e8 bd d4 4a 34 40 fc fc 38 09 84 4a ee a8 8c dc a9 ab 02 e8 65 7a 0d 0c 69 d0 d7 1c 6d 1d 9f 6a a9 5c 7a b1 ea 09 00 34 54 f7 21 03 d5 76 bb 1a 09 fc 3c ef 2f af 60 dc 80 7c 56 0f e7 1d a8 48 fc 26 f0 73 39 86 8d c7 cd 7e 1d 22 f6 75 a6 bd 7d 3d b2 d3 12 67 cd 61 85 74 00 51 75 cf 60 60 0c 13 50 0f 45 2b 68 ad b1 d4 fd 2e 4b de f3 45 9f 9b 5b b3 2e fa bb 03 53 ef 34 41 04 c4 c5 0d 1d 6f 90 2a 8c da f9 59 31 59 28 85 89 d9 45 f1 73 f0 12 b8 e8 2f 20 f5 56 ad d4 05 e6 ee b3 23 ce 7f ab 28 0f 4e 5c 6a 07 0e d1 6a ad 42 fe 1c 91 0b cc 31 d5 67 38 34 0c 16 e7 62 e6 07 52 38 fe 07 fa 57 6a 73 2c 1f 34 02 f2 05 a5 95 b3 7e 09 94 68 47 9c 98 1a ed 5e 61 99 57 b4 5f b3 a0 01 7f a8 7a 32 70 b9 08 88 a5 17 63
                        Data Ascii: 2ef@;mXJ4@8Jezimj\z4T!v</`|VH&s9~"u}=gatQu``PE+h.KE[.S4Ao*Y1Y(Es/ V#(N\jjB1g84bR8Wjs,4~hG^aW_z2pc


                        Click to jump to process

                        Target ID:0
                        Start time:13:27:38
                        Start date:22/07/2022
                        Path:C:\Windows\System32\loaddll64.exe
                        Wow64 process (32bit):false
                        Commandline:loaddll64.exe "C:\Users\user\Desktop\5CUFfVMSaQ.dll"
                        Imagebase:0x7ff641d20000
                        File size:140288 bytes
                        MD5 hash:4E8A40CAD6CCC047914E3A7830A2D8AA
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high

                        Target ID:1
                        Start time:13:27:38
                        Start date:22/07/2022
                        Path:C:\Windows\System32\cmd.exe
                        Wow64 process (32bit):false
                        Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\5CUFfVMSaQ.dll",#1
                        Imagebase:0x7ff6edbd0000
                        File size:273920 bytes
                        MD5 hash:4E2ACF4F8A396486AB4268C94A6A245F
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high

                        Target ID:3
                        Start time:13:27:39
                        Start date:22/07/2022
                        Path:C:\Windows\System32\regsvr32.exe
                        Wow64 process (32bit):false
                        Commandline:regsvr32.exe /s C:\Users\user\Desktop\5CUFfVMSaQ.dll
                        Imagebase:0x7ff608e30000
                        File size:24064 bytes
                        MD5 hash:D78B75FC68247E8A63ACBA846182740E
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Yara matches:
                        • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000003.00000002.404900294.0000000002681000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_Emotet_2, Description: Yara detected Emotet, Source: 00000003.00000002.406068538.0000000180001000.00000020.00000001.01000000.00000006.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000003.00000002.404818681.0000000002650000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                        Reputation:high

                        Target ID:4
                        Start time:13:27:39
                        Start date:22/07/2022
                        Path:C:\Windows\System32\rundll32.exe
                        Wow64 process (32bit):false
                        Commandline:rundll32.exe "C:\Users\user\Desktop\5CUFfVMSaQ.dll",#1
                        Imagebase:0x7ff6eb6e0000
                        File size:69632 bytes
                        MD5 hash:73C519F050C20580F8A62C849D49215A
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Yara matches:
                        • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000004.00000002.398318822.000001ED72500000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000004.00000002.398411719.000001ED72641000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
                        Reputation:high

                        Target ID:5
                        Start time:13:27:39
                        Start date:22/07/2022
                        Path:C:\Windows\System32\rundll32.exe
                        Wow64 process (32bit):false
                        Commandline:rundll32.exe C:\Users\user\Desktop\5CUFfVMSaQ.dll,ABeFtrnwmgAedx
                        Imagebase:0x7ff6eb6e0000
                        File size:69632 bytes
                        MD5 hash:73C519F050C20580F8A62C849D49215A
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Yara matches:
                        • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000005.00000002.399047583.000001766C2B0000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000005.00000002.399210556.000001766C3F1000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
                        Reputation:high

                        Target ID:6
                        Start time:13:27:43
                        Start date:22/07/2022
                        Path:C:\Windows\System32\rundll32.exe
                        Wow64 process (32bit):false
                        Commandline:rundll32.exe C:\Users\user\Desktop\5CUFfVMSaQ.dll,AEjATaIExpQg
                        Imagebase:0x7ff6eb6e0000
                        File size:69632 bytes
                        MD5 hash:73C519F050C20580F8A62C849D49215A
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Yara matches:
                        • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000006.00000002.404253356.0000026BAB700000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000006.00000002.404280554.0000026BAB731000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
                        Reputation:high

                        Target ID:7
                        Start time:13:27:45
                        Start date:22/07/2022
                        Path:C:\Windows\System32\regsvr32.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\regsvr32.exe "C:\Windows\system32\ZJPGATOTIe\uLEHsZT.dll"
                        Imagebase:0x7ff608e30000
                        File size:24064 bytes
                        MD5 hash:D78B75FC68247E8A63ACBA846182740E
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Yara matches:
                        • Rule: JoeSecurity_Emotet_3, Description: , Source: 00000007.00000002.783905665.0000000000EE8000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_Emotet_2, Description: Yara detected Emotet, Source: 00000007.00000002.784489149.0000000180001000.00000020.00000001.01000000.00000006.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000007.00000002.783816835.0000000000E81000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000007.00000002.783761119.0000000000E50000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                        Reputation:high

                        Target ID:8
                        Start time:13:27:47
                        Start date:22/07/2022
                        Path:C:\Windows\System32\rundll32.exe
                        Wow64 process (32bit):false
                        Commandline:rundll32.exe C:\Users\user\Desktop\5CUFfVMSaQ.dll,AbfBlUFQKbpevAFdaCpElBdscB
                        Imagebase:0x7ff6eb6e0000
                        File size:69632 bytes
                        MD5 hash:73C519F050C20580F8A62C849D49215A
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high

                        Target ID:12
                        Start time:13:28:17
                        Start date:22/07/2022
                        Path:C:\Windows\System32\svchost.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
                        Imagebase:0x7ff726010000
                        File size:51288 bytes
                        MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language

                        Target ID:16
                        Start time:13:29:51
                        Start date:22/07/2022
                        Path:C:\Windows\System32\svchost.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p
                        Imagebase:0x7ff726010000
                        File size:51288 bytes
                        MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language

                        Target ID:19
                        Start time:13:30:29
                        Start date:22/07/2022
                        Path:C:\Windows\System32\svchost.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p
                        Imagebase:0x7ff726010000
                        File size:51288 bytes
                        MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language

                        Target ID:20
                        Start time:13:30:37
                        Start date:22/07/2022
                        Path:C:\Windows\System32\svchost.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p
                        Imagebase:0x7ff726010000
                        File size:51288 bytes
                        MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language

                        No disassembly