Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
kOiaWLNKXpjayWeM.dll

Overview

General Information

Sample Name:kOiaWLNKXpjayWeM.dll
Analysis ID:750456
MD5:b7d93d2b47d14264b8b986b2d8fc7a49
SHA1:9310b16c2d7f9195c65cdbecf8c5648525cb80e5
SHA256:139c1faa496ae6c7d7c5140b9f4ac4e34f153bf40cd080c856b96bbd7ae716d2
Infos:

Detection

Emotet
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Yara detected Emotet
System process connects to network (likely due to code injection or exploit)
Antivirus detection for URL or domain
Snort IDS alert for network traffic
Creates an autostart registry key pointing to binary in C:\Windows
C2 URLs / IPs found in malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Queries the volume information (name, serial number etc) of a device
One or more processes crash
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Deletes files inside the Windows folder
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Creates files inside the system directory
PE file contains sections with non-standard names
Internet Provider seen in connection with other malware
Detected potential crypto function
Found potential string decryption / allocating functions
Sample execution stops while process was sleeping (likely an evasion)
JA3 SSL client fingerprint seen in connection with other malware
Contains functionality to communicate with device drivers
Uses the system / local time for branch decision (may execute only at specific dates)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Tries to load missing DLLs
Drops PE files to the windows directory (C:\Windows)
Checks if the current process is being debugged
Connects to several IPs in different countries
Registers a DLL
Found large amount of non-executed APIs
Uses Microsoft's Enhanced Cryptographic Provider
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • loaddll64.exe (PID: 6112 cmdline: loaddll64.exe "C:\Users\user\Desktop\kOiaWLNKXpjayWeM.dll" MD5: C676FC0263EDD17D4CE7D644B8F3FCD6)
    • conhost.exe (PID: 6096 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • cmd.exe (PID: 6044 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\kOiaWLNKXpjayWeM.dll",#1 MD5: 4E2ACF4F8A396486AB4268C94A6A245F)
      • rundll32.exe (PID: 6128 cmdline: rundll32.exe "C:\Users\user\Desktop\kOiaWLNKXpjayWeM.dll",#1 MD5: 73C519F050C20580F8A62C849D49215A)
        • WerFault.exe (PID: 5204 cmdline: C:\Windows\system32\WerFault.exe -u -p 6128 -s 480 MD5: 2AFFE478D86272288BBEF5A00BBEF6A0)
    • regsvr32.exe (PID: 6076 cmdline: regsvr32.exe /s C:\Users\user\Desktop\kOiaWLNKXpjayWeM.dll MD5: D78B75FC68247E8A63ACBA846182740E)
      • regsvr32.exe (PID: 5252 cmdline: C:\Windows\system32\regsvr32.exe "C:\Windows\system32\WVVZhuligM\KuLiEStglluewHbC.dll" MD5: D78B75FC68247E8A63ACBA846182740E)
    • rundll32.exe (PID: 2424 cmdline: rundll32.exe C:\Users\user\Desktop\kOiaWLNKXpjayWeM.dll,?AddArrayString@JKDefragLib@@QEAAPEAPEA_WPEAPEA_WPEA_W@Z MD5: 73C519F050C20580F8A62C849D49215A)
      • WerFault.exe (PID: 3332 cmdline: C:\Windows\system32\WerFault.exe -u -p 2424 -s 472 MD5: 2AFFE478D86272288BBEF5A00BBEF6A0)
    • rundll32.exe (PID: 5228 cmdline: rundll32.exe C:\Users\user\Desktop\kOiaWLNKXpjayWeM.dll,?CallShowStatus@JKDefragLib@@QEAAXPEAUDefragDataStruct@@HH@Z MD5: 73C519F050C20580F8A62C849D49215A)
    • rundll32.exe (PID: 1788 cmdline: rundll32.exe C:\Users\user\Desktop\kOiaWLNKXpjayWeM.dll,?ColorizeItem@JKDefragLib@@QEAAXPEAUDefragDataStruct@@PEAUItemStruct@@_K2H@Z MD5: 73C519F050C20580F8A62C849D49215A)
  • regsvr32.exe (PID: 6128 cmdline: C:\Windows\system32\regsvr32.exe" "C:\Windows\system32\WVVZhuligM\KuLiEStglluewHbC.dll MD5: D78B75FC68247E8A63ACBA846182740E)
    • regsvr32.exe (PID: 5288 cmdline: C:\Windows\system32\regsvr32.exe "C:\Users\user\AppData\Local\WrWLj\BwssvzQrG.dll" MD5: D78B75FC68247E8A63ACBA846182740E)
  • cleanup
{"C2 list": ["218.38.121.17:443", "186.250.48.5:443", "80.211.107.116:8080", "174.138.33.49:7080", "165.22.254.236:8080", "185.148.169.10:8080", "62.171.178.147:8080", "128.199.217.206:443", "210.57.209.142:8080", "36.67.23.59:443", "160.16.143.191:8080", "128.199.242.164:8080", "178.238.225.252:8080", "118.98.72.86:443", "202.134.4.210:7080", "82.98.180.154:7080", "54.37.228.122:443", "64.227.55.231:8080", "195.77.239.39:8080", "103.254.12.236:7080", "103.85.95.4:8080", "178.62.112.199:8080", "83.229.80.93:8080", "114.79.130.68:443", "51.75.33.122:443", "139.196.72.155:8080", "188.165.79.151:443", "190.145.8.4:443", "196.44.98.190:8080", "198.199.70.22:8080", "103.56.149.105:8080", "104.244.79.94:443", "87.106.97.83:7080", "103.71.99.57:8080", "46.101.98.60:8080", "103.126.216.86:443", "103.224.241.74:8080", "37.44.244.177:8080", "85.214.67.203:8080", "202.28.34.99:8080", "175.126.176.79:8080", "85.25.120.45:8080", "93.104.209.107:8080", "103.41.204.169:8080", "78.47.204.80:443", "139.59.80.108:8080"], "Public Key": ["RUNTMSAAAAD0LxqDNhonUYwk8sqo7IWuUllRdUiUBnACc6romsQoe1YJD7wIe4AheqYofpZFucPDXCZ0z9i+ooUffqeoLZU0Hbtn0QADAJI=", "RUNLMSAAAADYNZPXY4tQxd/N4Wn5sTYAm5tUOxY2ol1ELrI4MNhHNi640vSLasjYTHpFRBoG+o84vtr7AJachCzOHjaAJFCWGLt60QACAIg="]}
SourceRuleDescriptionAuthorStrings
00000004.00000000.253014513.0000022AB0991000.00000020.00001000.00020000.00000000.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
    00000003.00000002.254435708.0000000002401000.00000020.00001000.00020000.00000000.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
      00000005.00000000.253546936.0000021CE85C1000.00000020.00001000.00020000.00000000.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
        00000016.00000002.371644938.0000000002A00000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
          00000003.00000002.254242832.0000000000B00000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
            Click to see the 14 entries
            SourceRuleDescriptionAuthorStrings
            5.2.rundll32.exe.21ce8590000.1.raw.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
              5.2.rundll32.exe.21ce8590000.1.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
                3.2.regsvr32.exe.b00000.0.raw.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
                  5.0.rundll32.exe.21ce8590000.3.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
                    4.0.rundll32.exe.22ab0780000.3.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
                      Click to see the 13 entries
                      No Sigma rule has matched
                      Timestamp:192.168.2.3218.38.121.17497144432404324 11/21/22-03:33:25.830611
                      SID:2404324
                      Source Port:49714
                      Destination Port:443
                      Protocol:TCP
                      Classtype:A Network Trojan was detected

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection

                      barindex
                      Source: kOiaWLNKXpjayWeM.dllReversingLabs: Detection: 88%
                      Source: kOiaWLNKXpjayWeM.dllVirustotal: Detection: 73%Perma Link
                      Source: https://218.38.121.17/$Avira URL Cloud: Label: malware
                      Source: 00000008.00000002.767607073.0000000000F14000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: Emotet {"C2 list": ["218.38.121.17:443", "186.250.48.5:443", "80.211.107.116:8080", "174.138.33.49:7080", "165.22.254.236:8080", "185.148.169.10:8080", "62.171.178.147:8080", "128.199.217.206:443", "210.57.209.142:8080", "36.67.23.59:443", "160.16.143.191:8080", "128.199.242.164:8080", "178.238.225.252:8080", "118.98.72.86:443", "202.134.4.210:7080", "82.98.180.154:7080", "54.37.228.122:443", "64.227.55.231:8080", "195.77.239.39:8080", "103.254.12.236:7080", "103.85.95.4:8080", "178.62.112.199:8080", "83.229.80.93:8080", "114.79.130.68:443", "51.75.33.122:443", "139.196.72.155:8080", "188.165.79.151:443", "190.145.8.4:443", "196.44.98.190:8080", "198.199.70.22:8080", "103.56.149.105:8080", "104.244.79.94:443", "87.106.97.83:7080", "103.71.99.57:8080", "46.101.98.60:8080", "103.126.216.86:443", "103.224.241.74:8080", "37.44.244.177:8080", "85.214.67.203:8080", "202.28.34.99:8080", "175.126.176.79:8080", "85.25.120.45:8080", "93.104.209.107:8080", "103.41.204.169:8080", "78.47.204.80:443", "139.59.80.108:8080"], "Public Key": ["RUNTMSAAAAD0LxqDNhonUYwk8sqo7IWuUllRdUiUBnACc6romsQoe1YJD7wIe4AheqYofpZFucPDXCZ0z9i+ooUffqeoLZU0Hbtn0QADAJI=", "RUNLMSAAAADYNZPXY4tQxd/N4Wn5sTYAm5tUOxY2ol1ELrI4MNhHNi640vSLasjYTHpFRBoG+o84vtr7AJachCzOHjaAJFCWGLt60QACAIg="]}
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800017A0 CryptStringToBinaryA,CryptStringToBinaryA,
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800017A0 CryptStringToBinaryA,CryptStringToBinaryA,
                      Source: unknownHTTPS traffic detected: 218.38.121.17:443 -> 192.168.2.3:49714 version: TLS 1.2
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018000E504 GetSystemTime,SystemTimeToFileTime,FindFirstFileW,swprintf,swprintf,CloseHandle,swprintf,FindNextFileW,FindClose,
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018000E504 GetSystemTime,SystemTimeToFileTime,FindFirstFileW,swprintf,swprintf,CloseHandle,swprintf,FindNextFileW,FindClose,
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_029D32FC FindNextFileW,FindFirstFileW,FindClose,
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018000DCA0 RegCreateKeyExW,RegQueryValueExW,RegCloseKey,GetLogicalDriveStringsW,GetLogicalDriveStringsW,GetLastError,

                      Networking

                      barindex
                      Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 218.38.121.17 443
                      Source: TrafficSnort IDS: 2404324 ET CNC Feodo Tracker Reported CnC Server TCP group 13 192.168.2.3:49714 -> 218.38.121.17:443
                      Source: Malware configuration extractorIPs: 218.38.121.17:443
                      Source: Malware configuration extractorIPs: 186.250.48.5:443
                      Source: Malware configuration extractorIPs: 80.211.107.116:8080
                      Source: Malware configuration extractorIPs: 174.138.33.49:7080
                      Source: Malware configuration extractorIPs: 165.22.254.236:8080
                      Source: Malware configuration extractorIPs: 185.148.169.10:8080
                      Source: Malware configuration extractorIPs: 62.171.178.147:8080
                      Source: Malware configuration extractorIPs: 128.199.217.206:443
                      Source: Malware configuration extractorIPs: 210.57.209.142:8080
                      Source: Malware configuration extractorIPs: 36.67.23.59:443
                      Source: Malware configuration extractorIPs: 160.16.143.191:8080
                      Source: Malware configuration extractorIPs: 128.199.242.164:8080
                      Source: Malware configuration extractorIPs: 178.238.225.252:8080
                      Source: Malware configuration extractorIPs: 118.98.72.86:443
                      Source: Malware configuration extractorIPs: 202.134.4.210:7080
                      Source: Malware configuration extractorIPs: 82.98.180.154:7080
                      Source: Malware configuration extractorIPs: 54.37.228.122:443
                      Source: Malware configuration extractorIPs: 64.227.55.231:8080
                      Source: Malware configuration extractorIPs: 195.77.239.39:8080
                      Source: Malware configuration extractorIPs: 103.254.12.236:7080
                      Source: Malware configuration extractorIPs: 103.85.95.4:8080
                      Source: Malware configuration extractorIPs: 178.62.112.199:8080
                      Source: Malware configuration extractorIPs: 83.229.80.93:8080
                      Source: Malware configuration extractorIPs: 114.79.130.68:443
                      Source: Malware configuration extractorIPs: 51.75.33.122:443
                      Source: Malware configuration extractorIPs: 139.196.72.155:8080
                      Source: Malware configuration extractorIPs: 188.165.79.151:443
                      Source: Malware configuration extractorIPs: 190.145.8.4:443
                      Source: Malware configuration extractorIPs: 196.44.98.190:8080
                      Source: Malware configuration extractorIPs: 198.199.70.22:8080
                      Source: Malware configuration extractorIPs: 103.56.149.105:8080
                      Source: Malware configuration extractorIPs: 104.244.79.94:443
                      Source: Malware configuration extractorIPs: 87.106.97.83:7080
                      Source: Malware configuration extractorIPs: 103.71.99.57:8080
                      Source: Malware configuration extractorIPs: 46.101.98.60:8080
                      Source: Malware configuration extractorIPs: 103.126.216.86:443
                      Source: Malware configuration extractorIPs: 103.224.241.74:8080
                      Source: Malware configuration extractorIPs: 37.44.244.177:8080
                      Source: Malware configuration extractorIPs: 85.214.67.203:8080
                      Source: Malware configuration extractorIPs: 202.28.34.99:8080
                      Source: Malware configuration extractorIPs: 175.126.176.79:8080
                      Source: Malware configuration extractorIPs: 85.25.120.45:8080
                      Source: Malware configuration extractorIPs: 93.104.209.107:8080
                      Source: Malware configuration extractorIPs: 103.41.204.169:8080
                      Source: Malware configuration extractorIPs: 78.47.204.80:443
                      Source: Malware configuration extractorIPs: 139.59.80.108:8080
                      Source: Joe Sandbox ViewASN Name: OVHFR OVHFR
                      Source: Joe Sandbox ViewASN Name: EcobandGH EcobandGH
                      Source: Joe Sandbox ViewJA3 fingerprint: 8916410db85077a5460817142dcbc8de
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1Connection: Keep-AliveCookie: CZwFFyjqj=PsvUh5dfSTgXF3Yfky8rapppSN7mDiCvH+dhS2Yyfelw3Uamqit8NZor2F3Wy+WwSOWoqN5+2o3Zhw2FNT71LtRpaSkxFWR1Kg0o99Yo3iDlozWdXVbDKN+LNEQRdtHZJN1d10Z33/NnObB/sxIul9Ns9qbwBnIwcHleye3lvrsI/kzOGvqg3ckWLYjTGAiII7OQEACc/Vokb0xydc70YHeGOJ5LxNaj2PY1k1evPoZnUp8rd747CdSB5js=Host: 218.38.121.17
                      Source: Joe Sandbox ViewIP Address: 188.165.79.151 188.165.79.151
                      Source: Joe Sandbox ViewIP Address: 196.44.98.190 196.44.98.190
                      Source: unknownNetwork traffic detected: IP country count 21
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49714 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49714
                      Source: unknownTCP traffic detected without corresponding DNS query: 218.38.121.17
                      Source: unknownTCP traffic detected without corresponding DNS query: 218.38.121.17
                      Source: unknownTCP traffic detected without corresponding DNS query: 218.38.121.17
                      Source: unknownTCP traffic detected without corresponding DNS query: 218.38.121.17
                      Source: unknownTCP traffic detected without corresponding DNS query: 218.38.121.17
                      Source: unknownTCP traffic detected without corresponding DNS query: 218.38.121.17
                      Source: unknownTCP traffic detected without corresponding DNS query: 218.38.121.17
                      Source: unknownTCP traffic detected without corresponding DNS query: 218.38.121.17
                      Source: unknownTCP traffic detected without corresponding DNS query: 218.38.121.17
                      Source: unknownTCP traffic detected without corresponding DNS query: 218.38.121.17
                      Source: regsvr32.exe, 00000008.00000003.339955681.0000000000FB3000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000008.00000002.768245490.0000000000FB3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
                      Source: regsvr32.exe, 00000008.00000003.468907128.0000000000F78000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000008.00000002.767607073.0000000000F14000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000008.00000003.468748774.0000000000F78000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000008.00000002.768041150.0000000000F78000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000008.00000003.339924936.0000000000F78000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://218.38.121.17/
                      Source: regsvr32.exe, 00000008.00000002.767607073.0000000000F14000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://218.38.121.17/$
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1Connection: Keep-AliveCookie: CZwFFyjqj=PsvUh5dfSTgXF3Yfky8rapppSN7mDiCvH+dhS2Yyfelw3Uamqit8NZor2F3Wy+WwSOWoqN5+2o3Zhw2FNT71LtRpaSkxFWR1Kg0o99Yo3iDlozWdXVbDKN+LNEQRdtHZJN1d10Z33/NnObB/sxIul9Ns9qbwBnIwcHleye3lvrsI/kzOGvqg3ckWLYjTGAiII7OQEACc/Vokb0xydc70YHeGOJ5LxNaj2PY1k1evPoZnUp8rd747CdSB5js=Host: 218.38.121.17
                      Source: unknownHTTPS traffic detected: 218.38.121.17:443 -> 192.168.2.3:49714 version: TLS 1.2

                      E-Banking Fraud

                      barindex
                      Source: Yara matchFile source: 00000008.00000002.767607073.0000000000F14000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 5.2.rundll32.exe.21ce8590000.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.rundll32.exe.21ce8590000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.regsvr32.exe.b00000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.0.rundll32.exe.21ce8590000.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.0.rundll32.exe.22ab0780000.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.0.rundll32.exe.22ab0780000.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.regsvr32.exe.b00000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 22.2.regsvr32.exe.2a00000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.0.rundll32.exe.22ab0780000.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.22ab0780000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.0.rundll32.exe.21ce8590000.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.regsvr32.exe.2990000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.0.rundll32.exe.22ab0780000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.0.rundll32.exe.21ce8590000.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.22ab0780000.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 22.2.regsvr32.exe.2a00000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.0.rundll32.exe.21ce8590000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.regsvr32.exe.2990000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000004.00000000.253014513.0000022AB0991000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.254435708.0000000002401000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000000.253546936.0000021CE85C1000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000016.00000002.371644938.0000000002A00000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.254242832.0000000000B00000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000016.00000002.371681565.0000000002A31000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000008.00000002.768911804.00000000029C1000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.287369701.0000022AB0780000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000000.254193655.0000022AB0991000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000000.253580195.0000022AB0780000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.287814441.0000022AB0991000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000000.255111695.0000021CE8590000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.287467703.0000021CE8590000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000008.00000002.768771937.0000000002990000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000000.255327053.0000021CE85C1000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000000.253497739.0000021CE8590000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.287612874.0000021CE85C1000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000000.251796872.0000022AB0780000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 6128 -s 480
                      Source: C:\Windows\System32\regsvr32.exeFile deleted: C:\Windows\System32\WVVZhuligM\KuLiEStglluewHbC.dll:Zone.IdentifierJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeFile created: C:\Windows\system32\WVVZhuligM\Jump to behavior
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180033FF8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018002C000
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180032008
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180006024
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018005F03C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180035048
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018003A05C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180037060
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180047064
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018002A098
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800530E0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018000D0E0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800330E4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018003B0EC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180042108
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018000B10C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180032114
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180048120
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180038120
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180034148
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180035154
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018005C18C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800391A0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018005423C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180033250
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018003A260
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180037264
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180032280
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180034298
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018005F2B8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800352C0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800072D8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018003B320
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018003832C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180033358
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180049388
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180032388
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800293B0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800353C8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800393D4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800133E8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800343EC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180033460
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018003A464
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018000F464
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180010488
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180037490
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180032490
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800354D0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800474CC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018000E504
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180034528
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180048524
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180038530
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018006E538
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018003356C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018002C580
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180011580
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018003259C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800355DC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800395E0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180034630
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018003A690
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180037694
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800076A8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800066D4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800336D8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018000B6FC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180032708
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180034738
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180035748
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018003875C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800337E0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800397EC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800497EC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180032814
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180034844
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180035850
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180001850
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180013860
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018003A894
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800378A0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800748CC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800338E8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018005C8EC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180047904
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180032920
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180035958
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180038960
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018004196C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800349B0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800579B8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800489E8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800039EC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800339F0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018000A9F4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180039A20
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018002CA20
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180012A20
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180032A2C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180036A2C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180035A64
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018003AAA0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180034AB8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180007ABC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180037AD4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180029AE8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180033B58
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180038B64
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180003B84
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180032B98
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180034BC0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180068BC8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180039C2C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180036C30
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180046C2C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180033C60
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180049C7C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180032C9C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018000DCA0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018000CCC4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180034CCC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018003ACD4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180037CE0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180041CF0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018001CCF0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018005BCF8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180047D08
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018000FD40
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180033D68
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180053D6C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180038D90
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180032DC8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180003DE0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180031DF0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180052E20
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180039E30
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180034E38
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180010E48
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180036E5C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180033E74
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180048EC4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180032ED0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018003AEE0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180004EE0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180037EEC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180031EFC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180012F00
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180034F40
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180073F98
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180038F94
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180032FD8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00B30000
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02409AC0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_024143B4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_024018F0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0241A788
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_024247AC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0240DC7C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0242AC7C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_024184BC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0242A244
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0240D250
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02427A68
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02402A6C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02414274
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0240421C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02423228
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0241CA34
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0241DA34
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0241EA38
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0242B23C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_024122C8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_024072CC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02406ADC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_024012F0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02412288
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02412AA6
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02404B50
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02429360
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02417B68
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02403B78
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0240FB04
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0241E30C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0240A31C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0241531C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0241FBD8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_024043F4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0240C3F4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0242539C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_024033A8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_024233B0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_024243B8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02406BBC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02423840
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0241B058
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0240D87C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0240C800
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0242B814
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02403824
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02417824
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0242803C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0242B0C4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_024040EC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_024288F8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_024098AC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_024168B0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_024078B4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_024190BC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0241D150
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02415958
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02422158
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02403970
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0241A170
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02404918
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02421918
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0240C930
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0240F138
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02425938
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0240E93C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_024031C4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0240C1E0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0241298D
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02411194
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0240A198
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02429198
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02423E4C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02401650
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0240EE5C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0242765C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02415E70
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02417E74
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0240F60C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0241E61C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02407620
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0240BE20
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0241DE2C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0242B6C0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0241C6CC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02420ED4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_024116DC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_024166E8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_024036FC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0240FE84
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_024056BC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02401744
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02418764
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02428768
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02410F74
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0240D704
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02415714
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0240E720
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02424F30
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02412FC8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0241FFD8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_024117E0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0241D7F8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02418F80
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02416F84
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0242A784
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_024027B8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02426FBC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02419C4C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0240145C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0241DC00
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0241EC08
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02407418
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02425C1C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0240A42C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0240E42C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02428C38
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02417CC0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02426CD0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0240BCD8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_024114E0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_024154EC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02402480
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02420490
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_024164B0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02402D54
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02410D54
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0242B55C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02404D70
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0241FD00
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0242A518
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02420D20
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0241A524
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0240D52C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0241B5C4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0241FDF4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02424D84
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0242358C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02429590
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02421594
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0241D5B0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02427DB8
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180033FF8
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018002C000
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180032008
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180006024
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018005F03C
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180035048
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018003A05C
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180037060
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180047064
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018002A098
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800530E0
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018000D0E0
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800330E4
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018003B0EC
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180042108
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018000B10C
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180032114
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180048120
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180038120
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180034148
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180035154
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018005C18C
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800391A0
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018005423C
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180033250
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018003A260
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180037264
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180032280
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180034298
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018005F2B8
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800352C0
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800072D8
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018003B320
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018003832C
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180033358
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180049388
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180032388
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800293B0
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800353C8
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800393D4
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800133E8
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800343EC
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180033460
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018003A464
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018000F464
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180010488
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180037490
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180032490
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800354D0
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800474CC
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018000E504
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180034528
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180048524
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180038530
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018006E538
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018003356C
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018002C580
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180011580
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018003259C
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800355DC
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800395E0
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180034630
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018003A690
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180037694
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800076A8
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800066D4
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800336D8
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018000B6FC
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180032708
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180034738
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180035748
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018003875C
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800337E0
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800397EC
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800497EC
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180032814
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180034844
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180035850
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180001850
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180013860
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018003A894
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800378A0
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800748CC
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800338E8
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018005C8EC
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180047904
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180032920
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180035958
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180038960
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018004196C
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800349B0
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800579B8
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800489E8
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800039EC
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800339F0
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018000A9F4
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180039A20
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018002CA20
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180012A20
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180032A2C
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180036A2C
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180035A64
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018003AAA0
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180034AB8
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180007ABC
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180037AD4
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180029AE8
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180033B58
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180038B64
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180003B84
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180032B98
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180034BC0
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180068BC8
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180039C2C
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180036C30
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180046C2C
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180033C60
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180049C7C
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180032C9C
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018000DCA0
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018000CCC4
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180034CCC
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018003ACD4
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180037CE0
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180041CF0
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018001CCF0
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018005BCF8
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180047D08
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018000FD40
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180033D68
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180053D6C
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180038D90
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180032DC8
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180003DE0
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180031DF0
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180052E20
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180039E30
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180034E38
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180010E48
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180036E5C
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180033E74
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180048EC4
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180032ED0
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018003AEE0
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180004EE0
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180037EEC
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180031EFC
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180012F00
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180034F40
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180073F98
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180038F94
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180032FD8
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000022AB0980000
                      Source: C:\Windows\System32\rundll32.exeCode function: 5_2_0000021CE6CA0000
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_027E0000
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_029C8688
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_029C78B4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_029C58C0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_029D32FC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_029C18F0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_029E5C1C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_029CDC7C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_029EAC7C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_029D5E70
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_029DA788
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_029D43B4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_029DD5B0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_029E2334
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_029C9D2C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_029E9094
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_029E0490
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_029CFE84
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_029C2480
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_029C56BC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_029D84BC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_029D90BC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_029E6AB8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_029D64B0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_029D68B0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_029C98AC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_029C6ADC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_029D16DC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_029CBCD8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_029E0ED4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_029E6CD0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_029C72CC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_029DC6CC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_029EB0C4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_029C9AC0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_029D7CC0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_029EB6C0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_029C36FC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_029E88F8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_029C12F0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_029C40EC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_029D54EC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_029D66E8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_029D14E0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_029C421C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_029DE61C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_029C7418
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_029EB814
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_029CF60C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_029DEC08
                      Source: C:\Windows\System32\rundll32.exeCode function: String function: 0000000180004968 appears 32 times
                      Source: C:\Windows\System32\regsvr32.exeCode function: String function: 0000000180004968 appears 32 times
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018000B10C: DeviceIoControl,GetLastError,GetLastError,
                      Source: C:\Windows\System32\regsvr32.exeSection loaded: sfc.dll
                      Source: C:\Windows\System32\regsvr32.exeSection loaded: sfc.dll
                      Source: C:\Windows\System32\regsvr32.exeSection loaded: sfc.dll
                      Source: C:\Windows\System32\regsvr32.exeSection loaded: sfc.dll
                      Source: kOiaWLNKXpjayWeM.dllReversingLabs: Detection: 88%
                      Source: kOiaWLNKXpjayWeM.dllVirustotal: Detection: 73%
                      Source: kOiaWLNKXpjayWeM.dllStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      Source: C:\Windows\System32\loaddll64.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                      Source: unknownProcess created: C:\Windows\System32\loaddll64.exe loaddll64.exe "C:\Users\user\Desktop\kOiaWLNKXpjayWeM.dll"
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\kOiaWLNKXpjayWeM.dll",#1
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\kOiaWLNKXpjayWeM.dll
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\kOiaWLNKXpjayWeM.dll",#1
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\kOiaWLNKXpjayWeM.dll,?AddArrayString@JKDefragLib@@QEAAPEAPEA_WPEAPEA_WPEA_W@Z
                      Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\System32\regsvr32.exe C:\Windows\system32\regsvr32.exe "C:\Windows\system32\WVVZhuligM\KuLiEStglluewHbC.dll"
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\kOiaWLNKXpjayWeM.dll,?CallShowStatus@JKDefragLib@@QEAAXPEAUDefragDataStruct@@HH@Z
                      Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 6128 -s 480
                      Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 2424 -s 472
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\kOiaWLNKXpjayWeM.dll,?ColorizeItem@JKDefragLib@@QEAAXPEAUDefragDataStruct@@PEAUItemStruct@@_K2H@Z
                      Source: unknownProcess created: C:\Windows\System32\regsvr32.exe C:\Windows\system32\regsvr32.exe" "C:\Windows\system32\WVVZhuligM\KuLiEStglluewHbC.dll
                      Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\regsvr32.exe C:\Windows\system32\regsvr32.exe "C:\Users\user\AppData\Local\WrWLj\BwssvzQrG.dll"
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\kOiaWLNKXpjayWeM.dll",#1
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\kOiaWLNKXpjayWeM.dll
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\kOiaWLNKXpjayWeM.dll,?AddArrayString@JKDefragLib@@QEAAPEAPEA_WPEAPEA_WPEA_W@Z
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\kOiaWLNKXpjayWeM.dll,?CallShowStatus@JKDefragLib@@QEAAXPEAUDefragDataStruct@@HH@Z
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\kOiaWLNKXpjayWeM.dll,?ColorizeItem@JKDefragLib@@QEAAXPEAUDefragDataStruct@@PEAUItemStruct@@_K2H@Z
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\kOiaWLNKXpjayWeM.dll",#1
                      Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\System32\regsvr32.exe C:\Windows\system32\regsvr32.exe "C:\Windows\system32\WVVZhuligM\KuLiEStglluewHbC.dll"
                      Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\System32\regsvr32.exe C:\Windows\system32\regsvr32.exe "C:\Users\user\AppData\Local\WrWLj\BwssvzQrG.dll"
                      Source: C:\Windows\System32\regsvr32.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180007ABC GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetVolumePathNameW,swprintf,GetVolumeNameForVolumeMountPointW,GetLastError,swprintf,swprintf,_fread_nolock,CreateFileW,GetLastError,DeviceIoControl,GetLastError,CloseHandle,GetDiskFreeSpaceExW,DeviceIoControl,swprintf,swprintf,FlushFileBuffers,CloseHandle,FlushFileBuffers,CloseHandle,CloseHandle,
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180007ABC GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetVolumePathNameW,swprintf,GetVolumeNameForVolumeMountPointW,GetLastError,swprintf,swprintf,_fread_nolock,CreateFileW,GetLastError,DeviceIoControl,GetLastError,CloseHandle,GetDiskFreeSpaceExW,DeviceIoControl,swprintf,swprintf,FlushFileBuffers,CloseHandle,FlushFileBuffers,CloseHandle,CloseHandle,
                      Source: C:\Windows\System32\regsvr32.exeFile created: C:\Users\user\AppData\Local\WrWLj\Jump to behavior
                      Source: C:\Windows\System32\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\WER1F6F.tmpJump to behavior
                      Source: classification engineClassification label: mal100.troj.evad.winDLL@21/8@0/47
                      Source: C:\Windows\System32\regsvr32.exeFile read: C:\Users\desktop.iniJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180007ABC GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetVolumePathNameW,swprintf,GetVolumeNameForVolumeMountPointW,GetLastError,swprintf,swprintf,_fread_nolock,CreateFileW,GetLastError,DeviceIoControl,GetLastError,CloseHandle,GetDiskFreeSpaceExW,DeviceIoControl,swprintf,swprintf,FlushFileBuffers,CloseHandle,FlushFileBuffers,CloseHandle,CloseHandle,
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_029C9D2C FindCloseChangeNotification,Process32NextW,CreateToolhelp32Snapshot,Process32FirstW,
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\kOiaWLNKXpjayWeM.dll",#1
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6096:120:WilError_01
                      Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess6128
                      Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess2424
                      Source: C:\Windows\System32\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Windows\System32\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Windows\System32\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Windows\System32\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Windows\System32\rundll32.exeAutomated click: OK
                      Source: C:\Windows\System32\rundll32.exeAutomated click: OK
                      Source: C:\Windows\System32\regsvr32.exeAutomated click: OK
                      Source: Window RecorderWindow detected: More than 3 window changes detected
                      Source: kOiaWLNKXpjayWeM.dllStatic PE information: Image base 0x180000000 > 0x60000000
                      Source: kOiaWLNKXpjayWeM.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                      Source: kOiaWLNKXpjayWeM.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                      Source: kOiaWLNKXpjayWeM.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                      Source: kOiaWLNKXpjayWeM.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                      Source: kOiaWLNKXpjayWeM.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                      Source: kOiaWLNKXpjayWeM.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                      Source: kOiaWLNKXpjayWeM.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                      Source: kOiaWLNKXpjayWeM.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                      Source: kOiaWLNKXpjayWeM.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                      Source: kOiaWLNKXpjayWeM.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                      Source: kOiaWLNKXpjayWeM.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                      Source: kOiaWLNKXpjayWeM.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02408A56 push ebp; iretd
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02406212 push ebp; iretd
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02405A82 push ebp; iretd
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02406870 push ebp; iretd
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_024230F3 push ebp; iretd
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02409097 push ebp; iretd
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02406957 push ebp; iretd
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02408E30 push ebp; iretd
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02406633 push ebp; retf
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02408F44 push ebp; iretd
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02406738 push 45C7D274h; iretd
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02406415 push ebp; retf
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_024224FA push ebp; ret
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02408D61 push ebp; iretd
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0240658C push ebp; iretd
                      Source: C:\Windows\System32\regsvr32.exeCode function: 22_2_02A35A82 push ebp; iretd
                      Source: C:\Windows\System32\regsvr32.exeCode function: 22_2_02A36633 push ebp; retf
                      Source: C:\Windows\System32\regsvr32.exeCode function: 22_2_02A38E30 push ebp; iretd
                      Source: C:\Windows\System32\regsvr32.exeCode function: 22_2_02A36212 push ebp; iretd
                      Source: C:\Windows\System32\regsvr32.exeCode function: 22_2_02A38A56 push ebp; iretd
                      Source: C:\Windows\System32\regsvr32.exeCode function: 22_2_02A36738 push 45C7D274h; iretd
                      Source: C:\Windows\System32\regsvr32.exeCode function: 22_2_02A38F44 push ebp; iretd
                      Source: C:\Windows\System32\regsvr32.exeCode function: 22_2_02A39097 push ebp; iretd
                      Source: C:\Windows\System32\regsvr32.exeCode function: 22_2_02A530F3 push ebp; iretd
                      Source: C:\Windows\System32\regsvr32.exeCode function: 22_2_02A524FA push ebp; ret
                      Source: C:\Windows\System32\regsvr32.exeCode function: 22_2_02A36415 push ebp; retf
                      Source: C:\Windows\System32\regsvr32.exeCode function: 22_2_02A36870 push ebp; iretd
                      Source: C:\Windows\System32\regsvr32.exeCode function: 22_2_02A3658C push ebp; iretd
                      Source: C:\Windows\System32\regsvr32.exeCode function: 22_2_02A38D61 push ebp; iretd
                      Source: C:\Windows\System32\regsvr32.exeCode function: 22_2_02A36957 push ebp; iretd
                      Source: kOiaWLNKXpjayWeM.dllStatic PE information: section name: _RDATA
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\kOiaWLNKXpjayWeM.dll
                      Source: C:\Windows\System32\regsvr32.exePE file moved: C:\Windows\System32\WVVZhuligM\KuLiEStglluewHbC.dllJump to behavior

                      Boot Survival

                      barindex
                      Source: C:\Windows\System32\regsvr32.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run KuLiEStglluewHbC.dllJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run KuLiEStglluewHbC.dllJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run KuLiEStglluewHbC.dllJump to behavior

                      Hooking and other Techniques for Hiding and Protection

                      barindex
                      Source: C:\Windows\System32\regsvr32.exeFile opened: C:\Windows\system32\WVVZhuligM\KuLiEStglluewHbC.dll:Zone.Identifier read attributes | delete
                      Source: C:\Windows\System32\regsvr32.exeFile opened: C:\Users\user\AppData\Local\WrWLj\BwssvzQrG.dll:Zone.Identifier read attributes | delete
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\regsvr32.exe TID: 3420Thread sleep time: -30000s >= -30000s
                      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018000B6FC GetSystemTimeAsFileTime followed by cmp: cmp dword ptr [rax+7ch], 01h and CTI: je 000000018000B7A2h
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018000B6FC GetSystemTimeAsFileTime followed by cmp: cmp dword ptr [rax+00000080h], 01h and CTI: je 000000018000B7A2h
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018000B6FC GetSystemTimeAsFileTime followed by cmp: cmp dword ptr [rax+7ch], 01h and CTI: je 000000018000B7A2h
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018000B6FC GetSystemTimeAsFileTime followed by cmp: cmp dword ptr [rax+00000080h], 01h and CTI: je 000000018000B7A2h
                      Source: C:\Windows\System32\regsvr32.exeAPI coverage: 5.8 %
                      Source: C:\Windows\System32\rundll32.exeAPI coverage: 5.5 %
                      Source: C:\Windows\System32\regsvr32.exeProcess information queried: ProcessInformation
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018000E504 GetSystemTime,SystemTimeToFileTime,FindFirstFileW,swprintf,swprintf,CloseHandle,swprintf,FindNextFileW,FindClose,
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018000E504 GetSystemTime,SystemTimeToFileTime,FindFirstFileW,swprintf,swprintf,CloseHandle,swprintf,FindNextFileW,FindClose,
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_029D32FC FindNextFileW,FindFirstFileW,FindClose,
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018000DCA0 RegCreateKeyExW,RegQueryValueExW,RegCloseKey,GetLogicalDriveStringsW,GetLogicalDriveStringsW,GetLastError,
                      Source: C:\Windows\System32\regsvr32.exeFile Volume queried: C:\ FullSizeInformation
                      Source: C:\Windows\System32\regsvr32.exeFile Volume queried: C:\ FullSizeInformation
                      Source: regsvr32.exe, 00000008.00000002.768165460.0000000000FA0000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000008.00000002.768182445.0000000000FA8000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000008.00000003.468875093.0000000000F9F000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000008.00000003.468641649.0000000000FA2000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000008.00000003.468687202.0000000000F98000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000008.00000003.339812172.0000000000F95000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                      Source: regsvr32.exe, 00000008.00000003.468708556.0000000000F61000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000008.00000002.767971584.0000000000F61000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW`
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180025630 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
                      Source: C:\Windows\System32\loaddll64.exeProcess queried: DebugPort
                      Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPort
                      Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPort
                      Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPort
                      Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPort
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180025630 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018001579C IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180015984 SetUnhandledExceptionFilter,
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180014A60 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180025630 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018001579C IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180015984 SetUnhandledExceptionFilter,
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180014A60 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,

                      HIPS / PFW / Operating System Protection Evasion

                      barindex
                      Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 218.38.121.17 443
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\kOiaWLNKXpjayWeM.dll",#1
                      Source: C:\Windows\System32\regsvr32.exeQueries volume information: C:\ VolumeInformation
                      Source: C:\Windows\System32\regsvr32.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180006024 GetSystemTime,SystemTimeToFileTime,
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018005F03C _get_daylight,_get_daylight,_get_daylight,_get_daylight,_get_daylight,GetTimeZoneInformation,
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180001850 GetCommandLineW,CommandLineToArgvW,GetVersionExA,

                      Stealing of Sensitive Information

                      barindex
                      Source: Yara matchFile source: 00000008.00000002.767607073.0000000000F14000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 5.2.rundll32.exe.21ce8590000.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.rundll32.exe.21ce8590000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.regsvr32.exe.b00000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.0.rundll32.exe.21ce8590000.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.0.rundll32.exe.22ab0780000.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.0.rundll32.exe.22ab0780000.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.regsvr32.exe.b00000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 22.2.regsvr32.exe.2a00000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.0.rundll32.exe.22ab0780000.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.22ab0780000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.0.rundll32.exe.21ce8590000.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.regsvr32.exe.2990000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.0.rundll32.exe.22ab0780000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.0.rundll32.exe.21ce8590000.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.22ab0780000.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 22.2.regsvr32.exe.2a00000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.0.rundll32.exe.21ce8590000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.regsvr32.exe.2990000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000004.00000000.253014513.0000022AB0991000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.254435708.0000000002401000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000000.253546936.0000021CE85C1000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000016.00000002.371644938.0000000002A00000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.254242832.0000000000B00000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000016.00000002.371681565.0000000002A31000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000008.00000002.768911804.00000000029C1000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.287369701.0000022AB0780000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000000.254193655.0000022AB0991000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000000.253580195.0000022AB0780000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.287814441.0000022AB0991000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000000.255111695.0000021CE8590000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.287467703.0000021CE8590000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000008.00000002.768771937.0000000002990000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000000.255327053.0000021CE85C1000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000000.253497739.0000021CE8590000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.287612874.0000021CE85C1000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000000.251796872.0000022AB0780000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                      Valid AccountsWindows Management Instrumentation11
                      Registry Run Keys / Startup Folder
                      1
                      Access Token Manipulation
                      21
                      Masquerading
                      OS Credential Dumping12
                      System Time Discovery
                      Remote Services1
                      Archive Collected Data
                      Exfiltration Over Other Network Medium21
                      Encrypted Channel
                      Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                      Default AccountsScheduled Task/Job1
                      DLL Side-Loading
                      111
                      Process Injection
                      2
                      Virtualization/Sandbox Evasion
                      LSASS Memory21
                      Security Software Discovery
                      Remote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth1
                      Ingress Tool Transfer
                      Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                      Domain AccountsAt (Linux)Logon Script (Windows)11
                      Registry Run Keys / Startup Folder
                      1
                      Access Token Manipulation
                      Security Account Manager2
                      Virtualization/Sandbox Evasion
                      SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration1
                      Non-Application Layer Protocol
                      Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                      Local AccountsAt (Windows)Logon Script (Mac)1
                      DLL Side-Loading
                      111
                      Process Injection
                      NTDS2
                      Process Discovery
                      Distributed Component Object ModelInput CaptureScheduled Transfer12
                      Application Layer Protocol
                      SIM Card SwapCarrier Billing Fraud
                      Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
                      Deobfuscate/Decode Files or Information
                      LSA Secrets1
                      Remote System Discovery
                      SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                      Replication Through Removable MediaLaunchdRc.commonRc.common1
                      Hidden Files and Directories
                      Cached Domain Credentials3
                      File and Directory Discovery
                      VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                      External Remote ServicesScheduled TaskStartup ItemsStartup Items2
                      Obfuscated Files or Information
                      DCSync16
                      System Information Discovery
                      Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                      Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job1
                      Regsvr32
                      Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
                      Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)1
                      Rundll32
                      /etc/passwd and /etc/shadowSystem Network Connections DiscoverySoftware Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
                      Supply Chain CompromiseAppleScriptAt (Windows)At (Windows)1
                      DLL Side-Loading
                      Network SniffingProcess DiscoveryTaint Shared ContentLocal Data StagingExfiltration Over Unencrypted/Obfuscated Non-C2 ProtocolFile Transfer ProtocolsData Encrypted for Impact
                      Compromise Software Dependencies and Development ToolsWindows Command ShellCronCron1
                      File Deletion
                      Input CapturePermission Groups DiscoveryReplication Through Removable MediaRemote Data StagingExfiltration Over Physical MediumMail ProtocolsService Stop
                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet
                      behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 750456 Sample: kOiaWLNKXpjayWeM.dll Startdate: 21/11/2022 Architecture: WINDOWS Score: 100 35 103.224.241.74 WEBWERKS-AS-INWebWerksIndiaPvtLtdIN India 2->35 37 210.57.209.142 UNAIR-AS-IDUniversitasAirlanggaID Indonesia 2->37 39 43 other IPs or domains 2->39 45 Snort IDS alert for network traffic 2->45 47 Antivirus detection for URL or domain 2->47 49 Multi AV Scanner detection for submitted file 2->49 51 2 other signatures 2->51 9 loaddll64.exe 1 2->9         started        11 regsvr32.exe 2 2->11         started        signatures3 process4 signatures5 14 regsvr32.exe 2 9->14         started        17 rundll32.exe 9->17         started        19 cmd.exe 1 9->19         started        23 3 other processes 9->23 57 Hides that the sample has been downloaded from the Internet (zone.identifier) 11->57 21 regsvr32.exe 11->21         started        process6 signatures7 59 Hides that the sample has been downloaded from the Internet (zone.identifier) 14->59 25 regsvr32.exe 1 14->25         started        29 WerFault.exe 9 17->29         started        31 rundll32.exe 19->31         started        process8 dnsIp9 41 218.38.121.17, 443, 49714 SKB-ASSKBroadbandCoLtdKR Korea Republic of 25->41 53 System process connects to network (likely due to code injection or exploit) 25->53 55 Creates an autostart registry key pointing to binary in C:\Windows 25->55 43 192.168.2.1 unknown unknown 29->43 33 WerFault.exe 21 9 31->33         started        signatures10 process11

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                      windows-stand
                      SourceDetectionScannerLabelLink
                      kOiaWLNKXpjayWeM.dll88%ReversingLabsWin64.Trojan.Emotet
                      kOiaWLNKXpjayWeM.dll73%VirustotalBrowse
                      No Antivirus matches
                      SourceDetectionScannerLabelLinkDownload
                      4.0.rundll32.exe.22ab0780000.1.unpack100%AviraHEUR/AGEN.1215461Download File
                      3.2.regsvr32.exe.b00000.0.unpack100%AviraHEUR/AGEN.1215461Download File
                      5.0.rundll32.exe.21ce8590000.1.unpack100%AviraHEUR/AGEN.1215461Download File
                      5.0.rundll32.exe.21ce8590000.3.unpack100%AviraHEUR/AGEN.1215461Download File
                      5.2.rundll32.exe.21ce8590000.1.unpack100%AviraHEUR/AGEN.1215461Download File
                      4.0.rundll32.exe.22ab0780000.3.unpack100%AviraHEUR/AGEN.1215461Download File
                      4.2.rundll32.exe.22ab0780000.1.unpack100%AviraHEUR/AGEN.1215461Download File
                      22.2.regsvr32.exe.2a00000.0.unpack100%AviraHEUR/AGEN.1215461Download File
                      8.2.regsvr32.exe.2990000.0.unpack100%AviraHEUR/AGEN.1215461Download File
                      No Antivirus matches
                      SourceDetectionScannerLabelLink
                      https://218.38.121.17/0%URL Reputationsafe
                      https://218.38.121.17/$100%Avira URL Cloudmalware
                      No contacted domains info
                      NameMaliciousAntivirus DetectionReputation
                      https://218.38.121.17/true
                      • URL Reputation: safe
                      unknown
                      NameSourceMaliciousAntivirus DetectionReputation
                      https://218.38.121.17/$regsvr32.exe, 00000008.00000002.767607073.0000000000F14000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: malware
                      unknown
                      • No. of IPs < 25%
                      • 25% < No. of IPs < 50%
                      • 50% < No. of IPs < 75%
                      • 75% < No. of IPs
                      IPDomainCountryFlagASNASN NameMalicious
                      188.165.79.151
                      unknownFrance
                      16276OVHFRtrue
                      196.44.98.190
                      unknownGhana
                      327814EcobandGHtrue
                      174.138.33.49
                      unknownUnited States
                      14061DIGITALOCEAN-ASNUStrue
                      160.16.143.191
                      unknownJapan9370SAKURA-BSAKURAInternetIncJPtrue
                      36.67.23.59
                      unknownIndonesia
                      17974TELKOMNET-AS2-APPTTelekomunikasiIndonesiaIDtrue
                      103.41.204.169
                      unknownIndonesia
                      58397INFINYS-AS-IDPTInfinysSystemIndonesiaIDtrue
                      103.56.149.105
                      unknownIndonesia
                      55688BEON-AS-IDPTBeonIntermediaIDtrue
                      85.214.67.203
                      unknownGermany
                      6724STRATOSTRATOAGDEtrue
                      83.229.80.93
                      unknownUnited Kingdom
                      8513SKYVISIONGBtrue
                      85.25.120.45
                      unknownGermany
                      8972GD-EMEA-DC-SXB1DEtrue
                      198.199.70.22
                      unknownUnited States
                      14061DIGITALOCEAN-ASNUStrue
                      93.104.209.107
                      unknownGermany
                      8767MNET-ASGermanyDEtrue
                      186.250.48.5
                      unknownBrazil
                      262807RedfoxTelecomunicacoesLtdaBRtrue
                      175.126.176.79
                      unknownKorea Republic of
                      9523MOKWON-AS-KRMokwonUniversityKRtrue
                      139.196.72.155
                      unknownChina
                      37963CNNIC-ALIBABA-CN-NET-APHangzhouAlibabaAdvertisingCoLtdtrue
                      128.199.242.164
                      unknownUnited Kingdom
                      14061DIGITALOCEAN-ASNUStrue
                      103.126.216.86
                      unknownBangladesh
                      138482SKYVIEW-AS-APSKYVIEWONLINELTDBDtrue
                      178.238.225.252
                      unknownGermany
                      51167CONTABODEtrue
                      128.199.217.206
                      unknownUnited Kingdom
                      14061DIGITALOCEAN-ASNUStrue
                      190.145.8.4
                      unknownColombia
                      14080TelmexColombiaSACOtrue
                      46.101.98.60
                      unknownNetherlands
                      14061DIGITALOCEAN-ASNUStrue
                      82.98.180.154
                      unknownSpain
                      42612DINAHOSTING-ASEStrue
                      114.79.130.68
                      unknownIndia
                      45769DVOIS-IND-VoisBroadbandPvtLtdINtrue
                      103.71.99.57
                      unknownIndia
                      135682AWDHPL-AS-INAdvikaWebDevelopmentsHostingPvtLtdINtrue
                      103.224.241.74
                      unknownIndia
                      133296WEBWERKS-AS-INWebWerksIndiaPvtLtdINtrue
                      210.57.209.142
                      unknownIndonesia
                      38142UNAIR-AS-IDUniversitasAirlanggaIDtrue
                      202.28.34.99
                      unknownThailand
                      9562MSU-TH-APMahasarakhamUniversityTHtrue
                      87.106.97.83
                      unknownGermany
                      8560ONEANDONE-ASBrauerstrasse48DEtrue
                      103.254.12.236
                      unknownViet Nam
                      56151DIGISTAR-VNDigiStarCompanyLimitedVNtrue
                      103.85.95.4
                      unknownIndonesia
                      136077IDNIC-UNSRAT-AS-IDUniversitasIslamNegeriMataramIDtrue
                      80.211.107.116
                      unknownItaly
                      31034ARUBA-ASNITtrue
                      54.37.228.122
                      unknownFrance
                      16276OVHFRtrue
                      202.134.4.210
                      unknownIndonesia
                      7713TELKOMNET-AS-APPTTelekomunikasiIndonesiaIDtrue
                      218.38.121.17
                      unknownKorea Republic of
                      9318SKB-ASSKBroadbandCoLtdKRtrue
                      185.148.169.10
                      unknownGermany
                      44780EVERSCALE-ASDEtrue
                      165.22.254.236
                      unknownUnited States
                      14061DIGITALOCEAN-ASNUStrue
                      195.77.239.39
                      unknownSpain
                      60493FICOSA-ASEStrue
                      78.47.204.80
                      unknownGermany
                      24940HETZNER-ASDEtrue
                      118.98.72.86
                      unknownIndonesia
                      7713TELKOMNET-AS-APPTTelekomunikasiIndonesiaIDtrue
                      139.59.80.108
                      unknownSingapore
                      14061DIGITALOCEAN-ASNUStrue
                      178.62.112.199
                      unknownEuropean Union
                      14061DIGITALOCEAN-ASNUStrue
                      104.244.79.94
                      unknownUnited States
                      53667PONYNETUStrue
                      37.44.244.177
                      unknownGermany
                      47583AS-HOSTINGERLTtrue
                      62.171.178.147
                      unknownUnited Kingdom
                      51167CONTABODEtrue
                      51.75.33.122
                      unknownFrance
                      16276OVHFRtrue
                      64.227.55.231
                      unknownUnited States
                      14061DIGITALOCEAN-ASNUStrue
                      IP
                      192.168.2.1
                      Joe Sandbox Version:36.0.0 Rainbow Opal
                      Analysis ID:750456
                      Start date and time:2022-11-21 03:31:51 +01:00
                      Joe Sandbox Product:CloudBasic
                      Overall analysis duration:0h 9m 55s
                      Hypervisor based Inspection enabled:false
                      Report type:light
                      Sample file name:kOiaWLNKXpjayWeM.dll
                      Cookbook file name:default.jbs
                      Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
                      Number of analysed new started processes analysed:29
                      Number of new started drivers analysed:0
                      Number of existing processes analysed:0
                      Number of existing drivers analysed:0
                      Number of injected processes analysed:0
                      Technologies:
                      • HCA enabled
                      • EGA enabled
                      • HDC enabled
                      • AMSI enabled
                      Analysis Mode:default
                      Analysis stop reason:Timeout
                      Detection:MAL
                      Classification:mal100.troj.evad.winDLL@21/8@0/47
                      EGA Information:
                      • Successful, ratio: 100%
                      HDC Information:
                      • Successful, ratio: 90% (good quality ratio 84.4%)
                      • Quality average: 74.9%
                      • Quality standard deviation: 30.3%
                      HCA Information:
                      • Successful, ratio: 95%
                      • Number of executed functions: 0
                      • Number of non-executed functions: 0
                      Cookbook Comments:
                      • Found application associated with file extension: .dll
                      • Override analysis time to 240s for rundll32
                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, WerFault.exe, WMIADAP.exe, SgrmBroker.exe, conhost.exe, backgroundTaskHost.exe, svchost.exe
                      • Excluded IPs from analysis (whitelisted): 20.189.173.22, 20.189.173.21
                      • Excluded domains from analysis (whitelisted): fs.microsoft.com, login.live.com, blobcollector.events.data.trafficmanager.net, onedsblobprdwus17.westus.cloudapp.azure.com, onedsblobprdwus16.westus.cloudapp.azure.com, watson.telemetry.microsoft.com
                      • Not all processes where analyzed, report is missing behavior information
                      • Report size exceeded maximum capacity and may have missing behavior information.
                      • Report size exceeded maximum capacity and may have missing disassembly code.
                      • Report size getting too big, too many NtOpenKeyEx calls found.
                      • Report size getting too big, too many NtProtectVirtualMemory calls found.
                      • Report size getting too big, too many NtQueryValueKey calls found.
                      TimeTypeDescription
                      03:33:03API Interceptor2x Sleep call for process: WerFault.exe modified
                      03:33:28API Interceptor1x Sleep call for process: regsvr32.exe modified
                      03:33:30AutostartRun: HKLM64\Software\Microsoft\Windows\CurrentVersion\Run KuLiEStglluewHbC.dll C:\Windows\system32\regsvr32.exe "C:\Windows\system32\WVVZhuligM\KuLiEStglluewHbC.dll"
                      No context
                      No context
                      No context
                      No context
                      No context
                      Process:C:\Windows\System32\WerFault.exe
                      File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):65536
                      Entropy (8bit):0.872078121730829
                      Encrypted:false
                      SSDEEP:192:940idJK+HOiQCwej1hgc/u7sGS274ltZ:rijK2OVCwejH/u7sGX4ltZ
                      MD5:0B151449235445704F036E71D0B36121
                      SHA1:B9532A6B689DBBD101DB151FAEEBB0146969F3EC
                      SHA-256:1854F3636E6C08507C14FB1D5A4FAE2F3B84C51F775B761F17A1FAB51DB52C4E
                      SHA-512:5DB4AE49282BA891FB7FCA08913FCBA872F9CC725E9DD753D165FF544A137251E79C05E28BF19B06A63FE86B0CC7FFB841AD9D58232E485874F6216211C09866
                      Malicious:false
                      Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.1.3.5.0.3.9.6.9.8.7.1.9.8.8.0.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.1.3.5.0.3.9.7.0.8.7.2.0.0.2.3.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.1.f.e.9.d.a.1.2.-.5.a.f.5.-.4.5.a.c.-.a.5.4.d.-.1.6.0.9.6.9.e.8.b.1.3.f.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.6.8.8.a.3.9.1.2.-.6.0.0.c.-.4.4.c.4.-.a.3.2.9.-.d.a.6.1.a.3.4.8.1.5.0.6.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.r.u.n.d.l.l.3.2...e.x.e._.k.O.i.a.W.L.N.K.X.p.j.a.y.W.e.M...d.l.l.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.R.U.N.D.L.L.3.2...E.X.E.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.9.7.8.-.0.0.0.1.-.0.0.1.f.-.7.3.9.a.-.9.e.f.9.9.c.f.d.d.8.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.2.f.3.4.c.c.f.d.d.8.1.4.1.a.e.e.e.2.e.8.9.f.f.b.0.7.0.c.e.2.3.9.
                      Process:C:\Windows\System32\WerFault.exe
                      File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):65536
                      Entropy (8bit):0.8721527397559001
                      Encrypted:false
                      SSDEEP:192:/TiuJKeHOiQCwejQh/c/u7sGS274ltZy:biQKWOVCwej3/u7sGX4ltZ
                      MD5:89FB0C3122C98458BC77F378EE060B78
                      SHA1:5608AFA8320715CB8CECB3D19B4DBED117EE9D3D
                      SHA-256:1FB6A0DB37151B85B9A3886768CC49824A9089ACA1126845D28AD56E56B4C8E1
                      SHA-512:697CB0AB09C775EE8D2425D2635961DA13EF4EC7EBF12C95575131EEA2276A26D4B2075264BB60053B98DCBC1AAE4FB19A645000165F80D84B5901D2092611F9
                      Malicious:false
                      Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.1.3.5.0.3.9.6.9.3.0.7.7.1.8.9.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.1.3.5.0.3.9.7.0.5.1.0.8.3.6.3.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.f.5.9.1.e.c.a.b.-.e.6.1.9.-.4.e.a.b.-.a.b.a.c.-.c.d.6.7.4.5.d.3.9.6.7.f.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.6.7.8.0.9.e.e.6.-.f.3.d.e.-.4.a.d.b.-.9.f.1.b.-.1.0.b.0.f.e.e.8.d.1.5.6.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.r.u.n.d.l.l.3.2...e.x.e._.k.O.i.a.W.L.N.K.X.p.j.a.y.W.e.M...d.l.l.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.R.U.N.D.L.L.3.2...E.X.E.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.7.f.0.-.0.0.0.1.-.0.0.1.f.-.c.b.0.8.-.9.5.f.9.9.c.f.d.d.8.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.2.f.3.4.c.c.f.d.d.8.1.4.1.a.e.e.e.2.e.8.9.f.f.b.0.7.0.c.e.2.3.9.
                      Process:C:\Windows\System32\WerFault.exe
                      File Type:Mini DuMP crash report, 15 streams, Mon Nov 21 11:32:49 2022, 0x1205a4 type
                      Category:dropped
                      Size (bytes):68898
                      Entropy (8bit):2.2593657814055566
                      Encrypted:false
                      SSDEEP:384:CO95B3xDKkgXzqqCuQ922tpxKs1Tmg32J2TZO:/5Fx7RqCUqFrNO
                      MD5:6FDB4190A9D1E0E7993BEF4AC6CF4903
                      SHA1:709D61049D6C6D2E333A046DC248625624F7AF3B
                      SHA-256:78FB31A09D0A60E4A2684787E690065C7663FC5172BE2078F42074678A6B3CA7
                      SHA-512:A28808A8FEFED34B2536C210B9315D3FBEEECF7D29D900F0D08683578ED3939CFF4061546723003191FDEBDEB393840AFDB813BA5FEB5AC6282DA040F9CE2227
                      Malicious:false
                      Preview:MDMP....... ........a{c........................................H...........d@..........`.......8...........T...........H...............\&..........H(...................................................................U...........B.......(......Lw................3.z...T............a{c.............................0..................P.a.c.i.f.i.c. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................P.a.c.i.f.i.c. .D.a.y.l.i.g.h.t. .T.i.m.e...........................................1.7.1.3.4...1...a.m.d.6.4.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.....................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Windows\System32\WerFault.exe
                      File Type:Mini DuMP crash report, 15 streams, Mon Nov 21 11:32:50 2022, 0x1205a4 type
                      Category:dropped
                      Size (bytes):67910
                      Entropy (8bit):2.2872930224451897
                      Encrypted:false
                      SSDEEP:192:Usoh09UmSpt3w2JcK/MgXY4aOC5eJraHi7NbVpEtxmtROgM43SbNYzoL:UN09qt3wDKkgXzlCcSe5pEtxmmg3eY4
                      MD5:E2BEE3284D5782BF1CD920884AA0DDC0
                      SHA1:3ABFC6B1801276310175546F05106E4DCF0B051A
                      SHA-256:3435E6312400AD0F6341025145BA005652C7F38DE3F1833F0584D4378F3258CB
                      SHA-512:5D99ED0613DF6F616F8554C4C597BF842265C3545BF5E4DA86923D87F56D4B757B3F4695167D81E4AA5B7A28AD677F8AA6CA02489BD780DD253094D8E1B8AA48
                      Malicious:false
                      Preview:MDMP....... ........a{c........................................H...........d@..........`.......8...........T...............N...........\&..........H(...................................................................U...........B.......(......Lw................VK....T.......x....a{c.............................0..................P.a.c.i.f.i.c. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................P.a.c.i.f.i.c. .D.a.y.l.i.g.h.t. .T.i.m.e...........................................1.7.1.3.4...1...a.m.d.6.4.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.....................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Windows\System32\WerFault.exe
                      File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):8722
                      Entropy (8bit):3.6995272588026613
                      Encrypted:false
                      SSDEEP:192:Rrl7r3GLNi40jva6YNeEgmfZlfSmjqCprs89bPzqkfDFm:RrlsNizjva6Y0EgmfZlfS6rPzRfs
                      MD5:BE46A1CF0D47BF92350C02FBB7BC6DCE
                      SHA1:752B0D5513D543E34D6156EE78ECB3AA2CB7F583
                      SHA-256:2847471816764542AAD97F3B098092F28B49B4CFC309CD1A7B52518DAF3CFECE
                      SHA-512:C943406F61C34B3189F52B465875FC5C13458D5425419D958E54A4EC4F5483906581DDC7EB75CE3B39671AA0B147B2C8036212AED5FE4ABB5EA7448E00C1284D
                      Malicious:false
                      Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.7.1.3.4.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.7.1.3.4...1...a.m.d.6.4.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.1.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.1.0.3.3.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.6.1.2.8.<./.P.i.d.>.......
                      Process:C:\Windows\System32\WerFault.exe
                      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):4751
                      Entropy (8bit):4.494164486999496
                      Encrypted:false
                      SSDEEP:48:cvIwSD8zsblJgtBI91pWgc8sqYjrD/8fm8M4JCyCF2FW2yq85m2WZESC5Sgd:uITfb/LYgrsqYDkJK2LVvgd
                      MD5:1AD542F6150D682107751BA46FFBB1CF
                      SHA1:44F9DB01B37E1BAE1E3B8A74C67D2549D16E51A3
                      SHA-256:147687BCE9BB3A5FE3746E68606ED2BBE919299D7D41FB7CEBADD846F879A66C
                      SHA-512:376FEDF4CE7DB621ABA2739870C450521EC08DF77F28AD3935F9DB6719114226A9E0346C2CB3B1D9D294AF39CA8F192C4174076354635F41D851B066936E05CF
                      Malicious:false
                      Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="17134" />.. <arg nm="vercsdbld" val="1" />.. <arg nm="verqfe" val="1" />.. <arg nm="csdbld" val="1" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="1033" />.. <arg nm="geoid" val="244" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="1789723" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.1.17134.0-11.0.47" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="4096" />..
                      Process:C:\Windows\System32\WerFault.exe
                      File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):8520
                      Entropy (8bit):3.695214149866878
                      Encrypted:false
                      SSDEEP:192:Rrl7r3GLNi9VIB5BR6YtdqMgmfZlfSmjqCprS89bPjffJwFm:RrlsNiPI/H6YXqMgmfZlfS65P7fh
                      MD5:E5D5B3EE48668176FF7610C85F71B56F
                      SHA1:B901413E9C393AA46786DC36773BA7031D16921A
                      SHA-256:0989754C096D226569827F2C2BFBC6403C77B962534771CC1868E29BBA1B3631
                      SHA-512:B386D181783FD965E11F7920958E9BFC0B33B3B62D390E8EE2D04E239BA67ED78F8BB799BD30FF4A2AC033053F46BC78BC5E7C09A012BEDC0A5DF096D5BBBE85
                      Malicious:false
                      Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.7.1.3.4.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.7.1.3.4...1...a.m.d.6.4.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.1.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.1.0.3.3.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.2.4.2.4.<./.P.i.d.>.......
                      Process:C:\Windows\System32\WerFault.exe
                      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):4751
                      Entropy (8bit):4.493494717828344
                      Encrypted:false
                      SSDEEP:48:cvIwSD8zsblJgtBI91pWgc8sqYjr0F8fm8M4JCyCF2Fsyq85m23ZESC5S2d:uITfb/LYgrsqYPJAKVv2d
                      MD5:0D9B86BE737702FE9B1E0C59F154EA73
                      SHA1:D5FCD44963ADAC173C1B34308CF6F2C5EF1ADBCC
                      SHA-256:388A076160B1FD20113D856E8A9B2F9DFC64034E371B4FE06831AD9A63672DA5
                      SHA-512:95DD60EBECD29740A969C0FBE95E2CDFE90DAE51398DA0F303206B95D9CED8E56D6274D931BB3CA5FA531ED59BBFF85FF51C5B2E34E18CD95BFB25EC828A7C33
                      Malicious:false
                      Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="17134" />.. <arg nm="vercsdbld" val="1" />.. <arg nm="verqfe" val="1" />.. <arg nm="csdbld" val="1" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="1033" />.. <arg nm="geoid" val="244" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="1789723" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.1.17134.0-11.0.47" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="4096" />..
                      File type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                      Entropy (8bit):6.7768867083811415
                      TrID:
                      • Win64 Dynamic Link Library (generic) (102004/3) 86.43%
                      • Win64 Executable (generic) (12005/4) 10.17%
                      • Generic Win/DOS Executable (2004/3) 1.70%
                      • DOS Executable Generic (2002/1) 1.70%
                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.01%
                      File name:kOiaWLNKXpjayWeM.dll
                      File size:908800
                      MD5:b7d93d2b47d14264b8b986b2d8fc7a49
                      SHA1:9310b16c2d7f9195c65cdbecf8c5648525cb80e5
                      SHA256:139c1faa496ae6c7d7c5140b9f4ac4e34f153bf40cd080c856b96bbd7ae716d2
                      SHA512:ed83e77a65b7487c89bab393ecff7ea4315a319361e024196664903fd7ef2d42570d606d38a1554365c448d26b18c1b553bef78b708a2c9abfdf72036c599f5b
                      SSDEEP:12288:A0BQgtzAxM8q6BkmkxisTsxwJzCQ6TZ56lu4Vp4y1F9SFXCwQwbk:Ar6zAxVq6Bkm7saIzCXTZxUJFcJ
                      TLSH:4315BF12B3E503B9F4B7E139CA6A4A51EBB2BC4B5630E30F03E491966F23751493E716
                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...................................3...............................................=...Q.......Q.......Q.>.....Q.......Rich...........
                      Icon Hash:74f0e4ecccdce0e4
                      Entrypoint:0x180015150
                      Entrypoint Section:.text
                      Digitally signed:false
                      Imagebase:0x180000000
                      Subsystem:windows gui
                      Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, DLL
                      DLL Characteristics:HIGH_ENTROPY_VA, NX_COMPAT
                      Time Stamp:0x6364FEB9 [Fri Nov 4 11:59:53 2022 UTC]
                      TLS Callbacks:
                      CLR (.Net) Version:
                      OS Version Major:6
                      OS Version Minor:0
                      File Version Major:6
                      File Version Minor:0
                      Subsystem Version Major:6
                      Subsystem Version Minor:0
                      Import Hash:c8d1998b80cffee902d21a3223b8978f
                      Instruction
                      dec eax
                      mov dword ptr [esp+08h], ebx
                      dec eax
                      mov dword ptr [esp+10h], esi
                      push edi
                      dec eax
                      sub esp, 20h
                      dec ecx
                      mov edi, eax
                      mov ebx, edx
                      dec eax
                      mov esi, ecx
                      cmp edx, 01h
                      jne 00007F9D64CFE257h
                      call 00007F9D64CFE340h
                      dec esp
                      mov eax, edi
                      mov edx, ebx
                      dec eax
                      mov ecx, esi
                      dec eax
                      mov ebx, dword ptr [esp+30h]
                      dec eax
                      mov esi, dword ptr [esp+38h]
                      dec eax
                      add esp, 20h
                      pop edi
                      jmp 00007F9D64CFE0C0h
                      int3
                      int3
                      int3
                      dec eax
                      and dword ptr [ecx+10h], 00000000h
                      dec eax
                      lea eax, dword ptr [000692FCh]
                      dec eax
                      mov dword ptr [ecx], eax
                      dec eax
                      mov eax, ecx
                      dec eax
                      mov dword ptr [ecx+08h], edx
                      ret
                      int3
                      dec eax
                      sub esp, 48h
                      dec eax
                      lea ecx, dword ptr [esp+20h]
                      call 00007F9D64CFCF83h
                      dec eax
                      lea edx, dword ptr [000C0483h]
                      dec eax
                      lea ecx, dword ptr [esp+20h]
                      call 00007F9D64CFF7FAh
                      int3
                      dec eax
                      sub esp, 48h
                      dec eax
                      lea ecx, dword ptr [esp+20h]
                      call 00007F9D64CEA43Bh
                      dec eax
                      lea edx, dword ptr [000C0383h]
                      dec eax
                      lea ecx, dword ptr [esp+20h]
                      call 00007F9D64CFF7DAh
                      int3
                      jmp 00007F9D64D3CDC0h
                      int3
                      int3
                      int3
                      inc eax
                      push ebp
                      dec eax
                      mov ebp, esp
                      dec eax
                      sub esp, 20h
                      dec eax
                      and dword ptr [ebp+18h], 00000000h
                      dec eax
                      lea ecx, dword ptr [ebp+18h]
                      call dword ptr [00067FC8h]
                      dec eax
                      mov eax, dword ptr [ebp+18h]
                      dec eax
                      mov dword ptr [ebp+10h], eax
                      call dword ptr [0006815Ah]
                      mov eax, eax
                      NameVirtual AddressVirtual Size Is in Section
                      IMAGE_DIRECTORY_ENTRY_EXPORT0xd59a00x6c0.rdata
                      IMAGE_DIRECTORY_ENTRY_IMPORT0xd60600xb4.rdata
                      IMAGE_DIRECTORY_ENTRY_RESOURCE0xe20000x1e0.rsrc
                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0xdb0000x5808.pdata
                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                      IMAGE_DIRECTORY_ENTRY_BASERELOC0xe30000x914.reloc
                      IMAGE_DIRECTORY_ENTRY_DEBUG0xcc8d00x1c.rdata
                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xcc8f00x138.rdata
                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_IAT0x7d0000x5b0.rdata
                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                      NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                      .text0x10000x7b7300x7b800False0.4151379048582996zlib compressed data6.500974730197073IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      .rdata0x7d0000x5a4360x5a600False0.5386329745850622data6.216561858499759IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .data0xd80000x2dd80x1400False0.16875data2.74154034211106IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                      .pdata0xdb0000x58080x5a00False0.5075086805555555data5.885478337065417IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      _RDATA0xe10000xf40x200False0.3125data2.4589036841990084IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .rsrc0xe20000x1e00x200False0.52734375data4.711413092530877IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .reloc0xe30000x9140xa00False0.500390625data5.232229159197526IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                      NameRVASizeTypeLanguageCountry
                      RT_MANIFEST0xe20600x17dXML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States
                      DLLImport
                      gdiplus.dllGdipDrawString, GdipFree, GdiplusStartup, GdipAlloc, GdipDeleteFont, GdipCreateFont, GdipDeleteFontFamily, GdipCreateFontFamilyFromName, GdipGetVisibleClipBoundsI, GdipDrawImageI, GdipFillRectangleI, GdipDrawLineI, GdipDeleteGraphics, GdipCreateFromHDC, GdipCreateBitmapFromScan0, GdipGetImageGraphicsContext, GdipDisposeImage, GdipCloneImage, GdipDeletePen, GdipCreatePen1, GdipCreateLineBrushFromRectI, GdipCreateSolidFill, GdipDeleteBrush, GdipCloneBrush
                      CRYPT32.dllCryptStringToBinaryA
                      KERNEL32.dllSetEnvironmentVariableW, FreeEnvironmentStringsW, GetEnvironmentStringsW, WideCharToMultiByte, MultiByteToWideChar, GetCommandLineA, GetCPInfo, GetOEMCP, GetACP, IsValidCodePage, FindFirstFileExW, GetConsoleOutputCP, WriteFile, ReadConsoleW, GetProcessHeap, SetConsoleCtrlHandler, GetCommandLineW, CloseHandle, GetLastError, GetCurrentProcessId, CreateThread, GetVersionExA, VirtualAlloc, CreateToolhelp32Snapshot, Process32First, Process32Next, DeviceIoControl, ReleaseMutex, WaitForSingleObject, CreateMutexA, SetThreadExecutionState, CreateFileW, FindClose, FindFirstFileW, FindNextFileW, FlushFileBuffers, GetDiskFreeSpaceExW, GetStringTypeW, SetFilePointerEx, GetFileInformationByHandle, GetLogicalDriveStringsW, GetVolumeInformationW, GetVolumePathNameW, GetVolumeNameForVolumeMountPointW, Sleep, GetCurrentProcess, GetSystemTime, GetSystemTimeAsFileTime, FormatMessageW, SystemTimeToFileTime, FindFirstVolumeMountPointW, FindNextVolumeMountPointW, FindVolumeMountPointClose, GetLongPathNameW, GetShortPathNameW, GetModuleFileNameW, LocalFileTimeToFileTime, ReadFile, DosDateTimeToFileTime, GetConsoleMode, HeapReAlloc, EnumSystemLocalesW, GetUserDefaultLCID, IsValidLocale, GetLocaleInfoW, LCMapStringW, CompareStringW, GetTimeFormatW, GetDateFormatW, FlsFree, FlsSetValue, FlsGetValue, FlsAlloc, GetTempPathW, GetFileType, GetStdHandle, HeapFree, HeapAlloc, GetDriveTypeW, GetFileSizeEx, RtlUnwind, SetStdHandle, HeapSize, SetEndOfFile, WriteConsoleW, OutputDebugStringW, GetFileAttributesExW, GetCurrentThread, DeleteFileW, GetTimeZoneInformation, GetModuleHandleExW, RtlCaptureContext, RtlLookupFunctionEntry, RtlVirtualUnwind, UnhandledExceptionFilter, SetUnhandledExceptionFilter, TerminateProcess, IsProcessorFeaturePresent, QueryPerformanceCounter, GetCurrentThreadId, InitializeSListHead, IsDebuggerPresent, GetStartupInfoW, GetModuleHandleW, RtlPcToFileHeader, RaiseException, RtlUnwindEx, InterlockedPushEntrySList, InterlockedFlushSList, SetLastError, EncodePointer, EnterCriticalSection, LeaveCriticalSection, DeleteCriticalSection, InitializeCriticalSectionAndSpinCount, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, FreeLibrary, GetProcAddress, LoadLibraryExW, ExitProcess
                      USER32.dllShowWindow, LoadStringA, LoadIconA, LoadCursorA, MessageBoxW, InvalidateRect, EndPaint, BeginPaint, UpdateWindow, SetTimer, CreateWindowExW, RegisterClassExA, PostQuitMessage, DefWindowProcA, DispatchMessageA, TranslateMessage, GetMessageA
                      GDI32.dllGetStockObject
                      ADVAPI32.dllRegQueryValueExW, RegCreateKeyExW, RegCloseKey, LookupPrivilegeValueA, AdjustTokenPrivileges, OpenProcessToken
                      SHELL32.dllCommandLineToArgvW
                      ole32.dllCoLoadLibrary
                      NameOrdinalAddress
                      ?AddArrayString@JKDefragLib@@QEAAPEAPEA_WPEAPEA_WPEA_W@Z10x180005f7c
                      ?CallShowStatus@JKDefragLib@@QEAAXPEAUDefragDataStruct@@HH@Z20x180006a7c
                      ?ColorizeItem@JKDefragLib@@QEAAXPEAUDefragDataStruct@@PEAUItemStruct@@_K2H@Z30x180006f30
                      ?DeleteItemTree@JKDefragLib@@QEAAXPEAUItemStruct@@@Z40x18000adc0
                      ?FragmentCount@JKDefragLib@@QEAAHPEAUItemStruct@@@Z50x18000bcd0
                      ?GetItemLcn@JKDefragLib@@QEAA_KPEAUItemStruct@@@Z60x18000c048
                      ?GetLongPath@JKDefragLib@@QEAAPEA_WPEAUDefragDataStruct@@PEAUItemStruct@@@Z70x18000c06c
                      ?GetShortPath@JKDefragLib@@QEAAPEA_WPEAUDefragDataStruct@@PEAUItemStruct@@@Z80x18000c124
                      ?IsFragmented@JKDefragLib@@QEAAHPEAUItemStruct@@_K1@Z90x18000c1dc
                      ?MatchMask@JKDefragLib@@QEAAHPEA_W0@Z100x18000c290
                      ?RunJkDefrag@JKDefragLib@@QEAAXPEA_WHHNPEAPEA_W1PEAH1@Z110x18000dca0
                      ?ShowHex@JKDefragLib@@QEAAXPEAUDefragDataStruct@@PEAE_K@Z120x18000ecb4
                      ?SlowDown@JKDefragLib@@QEAAXPEAUDefragDataStruct@@@Z130x18000ee6c
                      ?StopJkDefrag@JKDefragLib@@QEAAXPEAHH@Z140x18000ef50
                      ?SystemErrorStr@JKDefragLib@@QEAAXKPEA_W_K@Z150x18000efac
                      ?TreeBiggest@JKDefragLib@@QEAAPEAUItemStruct@@PEAU2@@Z160x18000f07c
                      ?TreeDetach@JKDefragLib@@QEAAXPEAUDefragDataStruct@@PEAUItemStruct@@@Z170x18000f09c
                      ?TreeFirst@JKDefragLib@@QEAAPEAUItemStruct@@PEAU2@H@Z180x18000f1cc
                      ?TreeInsert@JKDefragLib@@QEAAXPEAUDefragDataStruct@@PEAUItemStruct@@@Z190x18000f208
                      ?TreeNext@JKDefragLib@@QEAAPEAUItemStruct@@PEAU2@@Z200x18000f3bc
                      ?TreeNextPrev@JKDefragLib@@QEAAPEAUItemStruct@@PEAU2@H@Z210x18000f3f8
                      ?TreePrev@JKDefragLib@@QEAAPEAUItemStruct@@PEAU2@@Z220x18000f408
                      ?TreeSmallest@JKDefragLib@@QEAAPEAUItemStruct@@PEAU2@@Z230x18000f444
                      ?stristr@JKDefragLib@@QEAAPEADPEAD0@Z240x18000f964
                      ?stristrW@JKDefragLib@@QEAAPEA_WPEA_W0@Z250x18000f9c4
                      DllRegisterServer260x180003218
                      Language of compilation systemCountry where language is spokenMap
                      EnglishUnited States
                      TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                      192.168.2.3218.38.121.17497144432404324 11/21/22-03:33:25.830611TCP2404324ET CNC Feodo Tracker Reported CnC Server TCP group 1349714443192.168.2.3218.38.121.17
                      TimestampSource PortDest PortSource IPDest IP
                      Nov 21, 2022 03:33:25.830610991 CET49714443192.168.2.3218.38.121.17
                      Nov 21, 2022 03:33:25.830670118 CET44349714218.38.121.17192.168.2.3
                      Nov 21, 2022 03:33:25.830774069 CET49714443192.168.2.3218.38.121.17
                      Nov 21, 2022 03:33:25.834296942 CET49714443192.168.2.3218.38.121.17
                      Nov 21, 2022 03:33:25.834327936 CET44349714218.38.121.17192.168.2.3
                      Nov 21, 2022 03:33:26.678919077 CET44349714218.38.121.17192.168.2.3
                      Nov 21, 2022 03:33:26.679049015 CET49714443192.168.2.3218.38.121.17
                      Nov 21, 2022 03:33:26.684890032 CET49714443192.168.2.3218.38.121.17
                      Nov 21, 2022 03:33:26.684900045 CET44349714218.38.121.17192.168.2.3
                      Nov 21, 2022 03:33:26.685220003 CET44349714218.38.121.17192.168.2.3
                      Nov 21, 2022 03:33:26.734738111 CET49714443192.168.2.3218.38.121.17
                      Nov 21, 2022 03:33:26.972662926 CET49714443192.168.2.3218.38.121.17
                      Nov 21, 2022 03:33:26.972714901 CET44349714218.38.121.17192.168.2.3
                      Nov 21, 2022 03:33:28.495560884 CET44349714218.38.121.17192.168.2.3
                      Nov 21, 2022 03:33:28.495716095 CET44349714218.38.121.17192.168.2.3
                      Nov 21, 2022 03:33:28.495820045 CET49714443192.168.2.3218.38.121.17
                      Nov 21, 2022 03:33:28.497793913 CET49714443192.168.2.3218.38.121.17
                      Nov 21, 2022 03:33:28.497824907 CET44349714218.38.121.17192.168.2.3
                      Nov 21, 2022 03:33:28.497879982 CET49714443192.168.2.3218.38.121.17
                      Nov 21, 2022 03:33:28.497911930 CET44349714218.38.121.17192.168.2.3
                      • 218.38.121.17

                      Click to jump to process

                      Target ID:0
                      Start time:03:32:44
                      Start date:21/11/2022
                      Path:C:\Windows\System32\loaddll64.exe
                      Wow64 process (32bit):false
                      Commandline:loaddll64.exe "C:\Users\user\Desktop\kOiaWLNKXpjayWeM.dll"
                      Imagebase:0x7ff600720000
                      File size:139776 bytes
                      MD5 hash:C676FC0263EDD17D4CE7D644B8F3FCD6
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high

                      Target ID:1
                      Start time:03:32:44
                      Start date:21/11/2022
                      Path:C:\Windows\System32\conhost.exe
                      Wow64 process (32bit):false
                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Imagebase:0x7ff745070000
                      File size:625664 bytes
                      MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high

                      Target ID:2
                      Start time:03:32:45
                      Start date:21/11/2022
                      Path:C:\Windows\System32\cmd.exe
                      Wow64 process (32bit):false
                      Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\kOiaWLNKXpjayWeM.dll",#1
                      Imagebase:0x7ff707bb0000
                      File size:273920 bytes
                      MD5 hash:4E2ACF4F8A396486AB4268C94A6A245F
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high

                      Target ID:3
                      Start time:03:32:45
                      Start date:21/11/2022
                      Path:C:\Windows\System32\regsvr32.exe
                      Wow64 process (32bit):false
                      Commandline:regsvr32.exe /s C:\Users\user\Desktop\kOiaWLNKXpjayWeM.dll
                      Imagebase:0x7ff7f5e80000
                      File size:24064 bytes
                      MD5 hash:D78B75FC68247E8A63ACBA846182740E
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Yara matches:
                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000003.00000002.254435708.0000000002401000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000003.00000002.254242832.0000000000B00000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                      Reputation:high

                      Target ID:4
                      Start time:03:32:45
                      Start date:21/11/2022
                      Path:C:\Windows\System32\rundll32.exe
                      Wow64 process (32bit):false
                      Commandline:rundll32.exe "C:\Users\user\Desktop\kOiaWLNKXpjayWeM.dll",#1
                      Imagebase:0x7ff63eb10000
                      File size:69632 bytes
                      MD5 hash:73C519F050C20580F8A62C849D49215A
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Yara matches:
                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000004.00000000.253014513.0000022AB0991000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000004.00000002.287369701.0000022AB0780000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000004.00000000.254193655.0000022AB0991000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000004.00000000.253580195.0000022AB0780000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000004.00000002.287814441.0000022AB0991000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000004.00000000.251796872.0000022AB0780000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                      Reputation:high

                      Target ID:5
                      Start time:03:32:45
                      Start date:21/11/2022
                      Path:C:\Windows\System32\rundll32.exe
                      Wow64 process (32bit):false
                      Commandline:rundll32.exe C:\Users\user\Desktop\kOiaWLNKXpjayWeM.dll,?AddArrayString@JKDefragLib@@QEAAPEAPEA_WPEAPEA_WPEA_W@Z
                      Imagebase:0x7ff63eb10000
                      File size:69632 bytes
                      MD5 hash:73C519F050C20580F8A62C849D49215A
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Yara matches:
                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000005.00000000.253546936.0000021CE85C1000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000005.00000000.255111695.0000021CE8590000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000005.00000002.287467703.0000021CE8590000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000005.00000000.255327053.0000021CE85C1000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000005.00000000.253497739.0000021CE8590000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000005.00000002.287612874.0000021CE85C1000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
                      Reputation:high

                      Target ID:8
                      Start time:03:32:48
                      Start date:21/11/2022
                      Path:C:\Windows\System32\regsvr32.exe
                      Wow64 process (32bit):false
                      Commandline:C:\Windows\system32\regsvr32.exe "C:\Windows\system32\WVVZhuligM\KuLiEStglluewHbC.dll"
                      Imagebase:0x7ff7f5e80000
                      File size:24064 bytes
                      MD5 hash:D78B75FC68247E8A63ACBA846182740E
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Yara matches:
                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000008.00000002.768911804.00000000029C1000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Emotet_3, Description: Yara detected Emotet, Source: 00000008.00000002.767607073.0000000000F14000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000008.00000002.768771937.0000000002990000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                      Reputation:high

                      Target ID:9
                      Start time:03:32:48
                      Start date:21/11/2022
                      Path:C:\Windows\System32\rundll32.exe
                      Wow64 process (32bit):false
                      Commandline:rundll32.exe C:\Users\user\Desktop\kOiaWLNKXpjayWeM.dll,?CallShowStatus@JKDefragLib@@QEAAXPEAUDefragDataStruct@@HH@Z
                      Imagebase:0x7ff63eb10000
                      File size:69632 bytes
                      MD5 hash:73C519F050C20580F8A62C849D49215A
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high

                      Target ID:10
                      Start time:03:32:48
                      Start date:21/11/2022
                      Path:C:\Windows\System32\WerFault.exe
                      Wow64 process (32bit):false
                      Commandline:C:\Windows\system32\WerFault.exe -u -p 6128 -s 480
                      Imagebase:0x7ff679980000
                      File size:494488 bytes
                      MD5 hash:2AFFE478D86272288BBEF5A00BBEF6A0
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high

                      Target ID:11
                      Start time:03:32:49
                      Start date:21/11/2022
                      Path:C:\Windows\System32\WerFault.exe
                      Wow64 process (32bit):false
                      Commandline:C:\Windows\system32\WerFault.exe -u -p 2424 -s 472
                      Imagebase:0x7ff679980000
                      File size:494488 bytes
                      MD5 hash:2AFFE478D86272288BBEF5A00BBEF6A0
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language

                      Target ID:12
                      Start time:03:32:51
                      Start date:21/11/2022
                      Path:C:\Windows\System32\rundll32.exe
                      Wow64 process (32bit):false
                      Commandline:rundll32.exe C:\Users\user\Desktop\kOiaWLNKXpjayWeM.dll,?ColorizeItem@JKDefragLib@@QEAAXPEAUDefragDataStruct@@PEAUItemStruct@@_K2H@Z
                      Imagebase:0x7ff63eb10000
                      File size:69632 bytes
                      MD5 hash:73C519F050C20580F8A62C849D49215A
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language

                      Target ID:22
                      Start time:03:33:38
                      Start date:21/11/2022
                      Path:C:\Windows\System32\regsvr32.exe
                      Wow64 process (32bit):false
                      Commandline:C:\Windows\system32\regsvr32.exe" "C:\Windows\system32\WVVZhuligM\KuLiEStglluewHbC.dll
                      Imagebase:0x7ff7f5e80000
                      File size:24064 bytes
                      MD5 hash:D78B75FC68247E8A63ACBA846182740E
                      Has elevated privileges:false
                      Has administrator privileges:false
                      Programmed in:C, C++ or other language
                      Yara matches:
                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000016.00000002.371644938.0000000002A00000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000016.00000002.371681565.0000000002A31000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security

                      Target ID:23
                      Start time:03:33:42
                      Start date:21/11/2022
                      Path:C:\Windows\System32\regsvr32.exe
                      Wow64 process (32bit):false
                      Commandline:C:\Windows\system32\regsvr32.exe "C:\Users\user\AppData\Local\WrWLj\BwssvzQrG.dll"
                      Imagebase:0x7ff7f5e80000
                      File size:24064 bytes
                      MD5 hash:D78B75FC68247E8A63ACBA846182740E
                      Has elevated privileges:false
                      Has administrator privileges:false
                      Programmed in:C, C++ or other language

                      No disassembly