Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
aOHLlvfakv.dll

Overview

General Information

Sample Name:aOHLlvfakv.dll
Analysis ID:828936
MD5:362f48619364efe57ecd00f83d1bca62
SHA1:ae142315393512fe3f3e03dc07aed88428b6e29b
SHA256:a873911592c3ce95d36e009f40bb376f587ad0ba6971a150a2ac10c87a2465f5
Infos:

Detection

Emotet
Score:96
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Yara detected Emotet
System process connects to network (likely due to code injection or exploit)
Antivirus detection for URL or domain
Snort IDS alert for network traffic
C2 URLs / IPs found in malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Queries the volume information (name, serial number etc) of a device
Contains functionality to query locales information (e.g. system language)
Deletes files inside the Windows folder
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Creates files inside the system directory
PE file contains sections with non-standard names
Internet Provider seen in connection with other malware
Detected potential crypto function
Found potential string decryption / allocating functions
Sample execution stops while process was sleeping (likely an evasion)
JA3 SSL client fingerprint seen in connection with other malware
Contains functionality to dynamically determine API calls
HTTP GET or POST without a user agent
Contains functionality which may be used to detect a debugger (GetProcessHeap)
IP address seen in connection with other malware
Found inlined nop instructions (likely shell or obfuscated code)
Tries to load missing DLLs
Drops PE files to the windows directory (C:\Windows)
Detected TCP or UDP traffic on non-standard ports
Checks if the current process is being debugged
Connects to several IPs in different countries
Registers a DLL
Found large amount of non-executed APIs
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64native
  • loaddll64.exe (PID: 8532 cmdline: loaddll64.exe "C:\Users\user\Desktop\aOHLlvfakv.dll" MD5: C676FC0263EDD17D4CE7D644B8F3FCD6)
    • conhost.exe (PID: 8560 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
    • cmd.exe (PID: 8704 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\aOHLlvfakv.dll",#1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • rundll32.exe (PID: 7436 cmdline: rundll32.exe "C:\Users\user\Desktop\aOHLlvfakv.dll",#1 MD5: EF3179D498793BF4234F708D3BE28633)
        • regsvr32.exe (PID: 8788 cmdline: C:\Windows\system32\regsvr32.exe "C:\Windows\system32\JAnzBeoSOFkqX\hUQcK.dll" MD5: B0C2FA35D14A9FAD919E99D9D75E1B9E)
    • regsvr32.exe (PID: 8688 cmdline: regsvr32.exe /s C:\Users\user\Desktop\aOHLlvfakv.dll MD5: B0C2FA35D14A9FAD919E99D9D75E1B9E)
      • regsvr32.exe (PID: 7592 cmdline: C:\Windows\system32\regsvr32.exe "C:\Windows\system32\SAolKOHOGzImreJl\DHZYcsMibMOGCXWD.dll" MD5: B0C2FA35D14A9FAD919E99D9D75E1B9E)
    • rundll32.exe (PID: 7448 cmdline: rundll32.exe C:\Users\user\Desktop\aOHLlvfakv.dll,DllRegisterServer MD5: EF3179D498793BF4234F708D3BE28633)
      • regsvr32.exe (PID: 7460 cmdline: C:\Windows\system32\regsvr32.exe "C:\Windows\system32\FAAMB\YSmuMEqbrrG.dll" MD5: B0C2FA35D14A9FAD919E99D9D75E1B9E)
    • rundll32.exe (PID: 372 cmdline: rundll32.exe C:\Users\user\Desktop\aOHLlvfakv.dll,__CPPdebugHook MD5: EF3179D498793BF4234F708D3BE28633)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
EmotetWhile Emotet historically was a banking malware organized in a botnet, nowadays Emotet is mostly seen as infrastructure as a service for content delivery. For example, since mid 2018 it is used by Trickbot for installs, which may also lead to ransomware attacks using Ryuk, a combination observed several times against high-profile targets.It is always stealing information from victims but what the criminal gang behind it did, was to open up another business channel by selling their infrastructure delivering additional malicious software. From malware analysts it has been classified into epochs depending on command and control, payloads, and delivery solutions which change over time.Emotet had been taken down by authorities in January 2021, though it appears to have sprung back to life in November 2021.
  • GOLD CABIN
  • MUMMY SPIDER
  • Mealybug
https://malpedia.caad.fkie.fraunhofer.de/details/win.emotet
{"C2 list": ["91.121.146.47:8080", "66.228.32.31:7080", "182.162.143.56:443", "187.63.160.88:80", "167.172.199.165:8080", "164.90.222.65:443", "104.168.155.143:8080", "91.207.28.33:8080", "72.15.201.15:8080", "183.111.227.137:8080", "103.132.242.26:8080", "159.65.88.10:8080", "173.212.193.249:8080", "82.223.21.224:8080", "172.105.226.75:8080", "103.43.75.120:443", "167.172.253.162:8080", "1.234.2.232:8080", "159.89.202.34:443", "186.194.240.217:443", "185.4.135.165:8080", "139.59.126.41:443", "164.68.99.3:8080", "95.217.221.146:8080", "129.232.188.93:443", "45.176.232.124:443", "163.44.196.120:8080", "79.137.35.198:8080", "153.92.5.27:8080", "160.16.142.56:8080", "202.129.205.3:8080", "201.94.166.162:443", "119.59.103.152:8080", "153.126.146.25:7080", "188.44.20.25:443", "115.68.227.76:8080", "147.139.166.154:8080", "149.56.131.28:8080", "107.170.39.149:8080", "213.239.212.5:443", "197.242.150.244:8080", "206.189.28.199:8080", "5.135.159.50:443", "169.57.156.166:8080", "103.75.201.2:443", "110.232.117.186:8080", "94.23.45.86:4143", "45.235.8.30:8080", "101.50.0.91:8080"], "Public Key": ["RUNTMSAAAABAX3S2xNjcDD0fBno33Ln5t71eii+mofIPoXkNFOX1MeiwCh48iz97kB0mJjGGZXwardnDXKxI8GCHGNl0PFj5n2amlQAjAIA=", "RUNLMSAAAADzozW1Di4r9DVWzQpMKT588RDdy7BPILP6AiDOTLYMHkSWvrQO5slbmr1OvZ2Pz+AQWzRMggQmAtO6rPH7nyx22WZ4lQAVAJA="]}
SourceRuleDescriptionAuthorStrings
00000004.00000002.2442517269.0000029592A20000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
    00000003.00000002.2442904998.0000000180001000.00000020.00001000.00020000.00000000.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
      00000005.00000002.2440735305.0000000180001000.00000020.00001000.00020000.00000000.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
        00000004.00000002.2440693096.0000000180001000.00000020.00001000.00020000.00000000.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
          00000003.00000002.2442401873.0000000002D30000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
            Click to see the 4 entries
            SourceRuleDescriptionAuthorStrings
            4.2.rundll32.exe.29592a20000.1.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
              5.2.rundll32.exe.25313ba0000.1.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
                5.2.rundll32.exe.25313ba0000.1.raw.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
                  4.2.rundll32.exe.29592a20000.1.raw.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
                    3.2.regsvr32.exe.2d30000.1.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
                      Click to see the 3 entries
                      No Sigma rule has matched
                      Timestamp:192.168.11.2066.228.32.314982970802404330 03/17/23-17:55:08.721674
                      SID:2404330
                      Source Port:49829
                      Destination Port:7080
                      Protocol:TCP
                      Classtype:A Network Trojan was detected
                      Timestamp:192.168.11.20104.168.155.1434983880802404302 03/17/23-17:55:40.214505
                      SID:2404302
                      Source Port:49838
                      Destination Port:8080
                      Protocol:TCP
                      Classtype:A Network Trojan was detected
                      Timestamp:192.168.11.20167.172.199.1654983580802404308 03/17/23-17:55:30.717404
                      SID:2404308
                      Source Port:49835
                      Destination Port:8080
                      Protocol:TCP
                      Classtype:A Network Trojan was detected
                      Timestamp:192.168.11.20164.90.222.65498374432404308 03/17/23-17:55:36.091806
                      SID:2404308
                      Source Port:49837
                      Destination Port:443
                      Protocol:TCP
                      Classtype:A Network Trojan was detected
                      Timestamp:192.168.11.2091.121.146.474982780802404344 03/17/23-17:55:03.822964
                      SID:2404344
                      Source Port:49827
                      Destination Port:8080
                      Protocol:TCP
                      Classtype:A Network Trojan was detected
                      Timestamp:192.168.11.20182.162.143.56498314432404312 03/17/23-17:55:16.470008
                      SID:2404312
                      Source Port:49831
                      Destination Port:443
                      Protocol:TCP
                      Classtype:A Network Trojan was detected

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection

                      barindex
                      Source: aOHLlvfakv.dllReversingLabs: Detection: 28%
                      Source: aOHLlvfakv.dllVirustotal: Detection: 53%Perma Link
                      Source: https://103.43.75.120:443/nwgvynyayplzdkad/hjvnrupyw/tgrpudcxhduglli/orzxqya/a/Avira URL Cloud: Label: malware
                      Source: https://172.105.226.75:8080/$Avira URL Cloud: Label: malware
                      Source: https://66.228.32.31:7080/zAvira URL Cloud: Label: malware
                      Source: https://164.90.222.65/nwgvynyayplzdkad/hjvnrupyw/tgrpudcxhduglli/orzxqya/zxqya/Avira URL Cloud: Label: malware
                      Source: https://103.43.75.120/nwgvynyayplzdkad/hjvnrupyw/tgrpudcxhduglli/orzxqya/Avira URL Cloud: Label: malware
                      Source: https://159.65.88.10:8080/Avira URL Cloud: Label: malware
                      Source: https://82.223.21.224:8080/nwgvynyayplzdkad/hjvnrupyw/tgrpudcxhduglli/orzxqya/KAvira URL Cloud: Label: malware
                      Source: https://82.223.21.224:8080/Avira URL Cloud: Label: malware
                      Source: https://172.105.226.75:8080/Avira URL Cloud: Label: malware
                      Source: https://167.172.199.165:8080/nwgvynyayplzdkad/hjvnrupyw/tgrpudcxhduglli/orzxqya/jAvira URL Cloud: Label: malware
                      Source: https://187.63.160.88:80/nwgvynyayplzdkad/hjvnrupyw/tgrpudcxhduglli/orzxqya/STEM327Avira URL Cloud: Label: malware
                      Source: https://183.111.227.137:8080/nwgvynyayplzdkad/hjvnrupyw/tgrpudcxhduglli/orzxqya/327Avira URL Cloud: Label: malware
                      Source: https://187.63.160.88:80/Avira URL Cloud: Label: malware
                      Source: https://72.15.201.15:8080/Avira URL Cloud: Label: malware
                      Source: https://164.90.222.65/nwgvynyayplzdkad/hjvnrupyw/tgrpudcxhduglli/orzxqya/Avira URL Cloud: Label: malware
                      Source: https://91.121.146.47:8080/Avira URL Cloud: Label: malware
                      Source: https://167.172.199.165:8080/nwgvynyayplzdkad/hjvnrupyw/tgrpudcxhduglli/orzxqya/Avira URL Cloud: Label: malware
                      Source: https://103.43.75.120/0/Avira URL Cloud: Label: malware
                      Source: https://159.65.88.10:8080/nwgvynyayplzdkad/hjvnrupyw/tgrpudcxhduglli/orzxqya/uAvira URL Cloud: Label: malware
                      Source: https://103.43.75.120/080/dAvira URL Cloud: Label: malware
                      Source: https://173.212.193.249:8080/ertAvira URL Cloud: Label: malware
                      Source: https://103.43.75.120/Avira URL Cloud: Label: malware
                      Source: https://172.105.226.75:8080/nwgvynyayplzdkad/hjvnrupyw/tgrpudcxhduglli/orzxqya/SAvira URL Cloud: Label: malware
                      Source: https://173.212.193.249:8080/nwgvynyayplzdkad/hjvnrupyw/tgrpudcxhduglli/orzxqya/jAvira URL Cloud: Label: malware
                      Source: https://183.111.227.137:8080/Avira URL Cloud: Label: malware
                      Source: https://66.228.32.31:7080/Avira URL Cloud: Label: malware
                      Source: https://103.43.75.120/nwgvynyayplzdkad/hjvnrupyw/tgrpudcxhduglli/orzxqya/xqya/Avira URL Cloud: Label: malware
                      Source: https://91.121.146.47:8080/nwgvynyayplzdkad/hjvnrupyw/tgrpudcxhduglli/orzxqya/Avira URL Cloud: Label: malware
                      Source: https://167.172.199.165:8080/Avira URL Cloud: Label: malware
                      Source: https://173.212.193.249:8080/Avira URL Cloud: Label: malware
                      Source: https://66.228.32.31:7080/FAvira URL Cloud: Label: malware
                      Source: https://172.105.226.75:8080/nwgvynyayplzdkad/hjvnrupyw/tgrpudcxhduglli/orzxqya/dAvira URL Cloud: Label: malware
                      Source: https://173.212.193.249:8080/nwgvynyayplzdkad/hjvnrupyw/tgrpudcxhduglli/orzxqya/Avira URL Cloud: Label: malware
                      Source: https://172.105.226.75:8080/nwgvynyayplzdkad/hjvnrupyw/tgrpudcxhduglli/orzxqya/Avira URL Cloud: Label: malware
                      Source: https://172.105.226.75:8080/icy)Avira URL Cloud: Label: malware
                      Source: https://103.43.75.120/nwgvynyayplzdkad/hjvnrupyw/tgrpudcxhduglli/orzxqya/kAvira URL Cloud: Label: malware
                      Source: https://91.121.146.47:8080/nwgvynyayplzdkad/hjvnrupyw/tgrpudcxhduglli/orzxqya/IAvira URL Cloud: Label: malware
                      Source: 00000007.00000002.4270670203.00000000006EB000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: Emotet {"C2 list": ["91.121.146.47:8080", "66.228.32.31:7080", "182.162.143.56:443", "187.63.160.88:80", "167.172.199.165:8080", "164.90.222.65:443", "104.168.155.143:8080", "91.207.28.33:8080", "72.15.201.15:8080", "183.111.227.137:8080", "103.132.242.26:8080", "159.65.88.10:8080", "173.212.193.249:8080", "82.223.21.224:8080", "172.105.226.75:8080", "103.43.75.120:443", "167.172.253.162:8080", "1.234.2.232:8080", "159.89.202.34:443", "186.194.240.217:443", "185.4.135.165:8080", "139.59.126.41:443", "164.68.99.3:8080", "95.217.221.146:8080", "129.232.188.93:443", "45.176.232.124:443", "163.44.196.120:8080", "79.137.35.198:8080", "153.92.5.27:8080", "160.16.142.56:8080", "202.129.205.3:8080", "201.94.166.162:443", "119.59.103.152:8080", "153.126.146.25:7080", "188.44.20.25:443", "115.68.227.76:8080", "147.139.166.154:8080", "149.56.131.28:8080", "107.170.39.149:8080", "213.239.212.5:443", "197.242.150.244:8080", "206.189.28.199:8080", "5.135.159.50:443", "169.57.156.166:8080", "103.75.201.2:443", "110.232.117.186:8080", "94.23.45.86:4143", "45.235.8.30:8080", "101.50.0.91:8080"], "Public Key": ["RUNTMSAAAABAX3S2xNjcDD0fBno33Ln5t71eii+mofIPoXkNFOX1MeiwCh48iz97kB0mJjGGZXwardnDXKxI8GCHGNl0PFj5n2amlQAjAIA=", "RUNLMSAAAADzozW1Di4r9DVWzQpMKT588RDdy7BPILP6AiDOTLYMHkSWvrQO5slbmr1OvZ2Pz+AQWzRMggQmAtO6rPH7nyx22WZ4lQAVAJA="]}
                      Source: unknownHTTPS traffic detected: 164.90.222.65:443 -> 192.168.11.20:49837 version: TLS 1.2
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4x nop then push rbp
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4x nop then push rbp
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4x nop then push rbp
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4x nop then push rbp
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4x nop then push rbp
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4x nop then push rbp
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4x nop then push rbp
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4x nop then push rbp
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4x nop then push rbp
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4x nop then push rbp
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4x nop then push rbp
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4x nop then push rbp
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4x nop then push rbp
                      Source: C:\Windows\System32\regsvr32.exeCode function: 4x nop then push rbp
                      Source: C:\Windows\System32\rundll32.exeCode function: 4x nop then push rbp
                      Source: C:\Windows\System32\rundll32.exeCode function: 4x nop then push rbp
                      Source: C:\Windows\System32\rundll32.exeCode function: 4x nop then push rbp
                      Source: C:\Windows\System32\rundll32.exeCode function: 4x nop then push rbp
                      Source: C:\Windows\System32\rundll32.exeCode function: 4x nop then push rbp
                      Source: C:\Windows\System32\rundll32.exeCode function: 4x nop then push rbp
                      Source: C:\Windows\System32\rundll32.exeCode function: 4x nop then push rbp
                      Source: C:\Windows\System32\rundll32.exeCode function: 4x nop then push rbp
                      Source: C:\Windows\System32\rundll32.exeCode function: 4x nop then push rbp
                      Source: C:\Windows\System32\rundll32.exeCode function: 4x nop then push rbp
                      Source: C:\Windows\System32\rundll32.exeCode function: 4x nop then push rbp
                      Source: C:\Windows\System32\rundll32.exeCode function: 4x nop then push rbp
                      Source: C:\Windows\System32\rundll32.exeCode function: 4x nop then push rbp
                      Source: C:\Windows\System32\rundll32.exeCode function: 4x nop then push rbp

                      Networking

                      barindex
                      Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 159.65.88.10 8080
                      Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 172.105.226.75 8080
                      Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 164.90.222.65 443
                      Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 66.228.32.31 7080
                      Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 187.63.160.88 80
                      Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 173.212.193.249 8080
                      Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 82.223.21.224 8080
                      Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 183.111.227.137 8080
                      Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 103.132.242.26 8080
                      Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 104.168.155.143 8080
                      Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 91.121.146.47 8080
                      Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 91.207.28.33 8080
                      Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 182.162.143.56 443
                      Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 103.43.75.120 443
                      Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 167.172.199.165 8080
                      Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 72.15.201.15 8080
                      Source: TrafficSnort IDS: 2404308 ET CNC Feodo Tracker Reported CnC Server TCP group 5 192.168.11.20:49837 -> 164.90.222.65:443
                      Source: TrafficSnort IDS: 2404344 ET CNC Feodo Tracker Reported CnC Server TCP group 23 192.168.11.20:49827 -> 91.121.146.47:8080
                      Source: TrafficSnort IDS: 2404330 ET CNC Feodo Tracker Reported CnC Server TCP group 16 192.168.11.20:49829 -> 66.228.32.31:7080
                      Source: TrafficSnort IDS: 2404312 ET CNC Feodo Tracker Reported CnC Server TCP group 7 192.168.11.20:49831 -> 182.162.143.56:443
                      Source: TrafficSnort IDS: 2404308 ET CNC Feodo Tracker Reported CnC Server TCP group 5 192.168.11.20:49835 -> 167.172.199.165:8080
                      Source: TrafficSnort IDS: 2404302 ET CNC Feodo Tracker Reported CnC Server TCP group 2 192.168.11.20:49838 -> 104.168.155.143:8080
                      Source: Malware configuration extractorIPs: 91.121.146.47:8080
                      Source: Malware configuration extractorIPs: 66.228.32.31:7080
                      Source: Malware configuration extractorIPs: 182.162.143.56:443
                      Source: Malware configuration extractorIPs: 187.63.160.88:80
                      Source: Malware configuration extractorIPs: 167.172.199.165:8080
                      Source: Malware configuration extractorIPs: 164.90.222.65:443
                      Source: Malware configuration extractorIPs: 104.168.155.143:8080
                      Source: Malware configuration extractorIPs: 91.207.28.33:8080
                      Source: Malware configuration extractorIPs: 72.15.201.15:8080
                      Source: Malware configuration extractorIPs: 183.111.227.137:8080
                      Source: Malware configuration extractorIPs: 103.132.242.26:8080
                      Source: Malware configuration extractorIPs: 159.65.88.10:8080
                      Source: Malware configuration extractorIPs: 173.212.193.249:8080
                      Source: Malware configuration extractorIPs: 82.223.21.224:8080
                      Source: Malware configuration extractorIPs: 172.105.226.75:8080
                      Source: Malware configuration extractorIPs: 103.43.75.120:443
                      Source: Malware configuration extractorIPs: 167.172.253.162:8080
                      Source: Malware configuration extractorIPs: 1.234.2.232:8080
                      Source: Malware configuration extractorIPs: 159.89.202.34:443
                      Source: Malware configuration extractorIPs: 186.194.240.217:443
                      Source: Malware configuration extractorIPs: 185.4.135.165:8080
                      Source: Malware configuration extractorIPs: 139.59.126.41:443
                      Source: Malware configuration extractorIPs: 164.68.99.3:8080
                      Source: Malware configuration extractorIPs: 95.217.221.146:8080
                      Source: Malware configuration extractorIPs: 129.232.188.93:443
                      Source: Malware configuration extractorIPs: 45.176.232.124:443
                      Source: Malware configuration extractorIPs: 163.44.196.120:8080
                      Source: Malware configuration extractorIPs: 79.137.35.198:8080
                      Source: Malware configuration extractorIPs: 153.92.5.27:8080
                      Source: Malware configuration extractorIPs: 160.16.142.56:8080
                      Source: Malware configuration extractorIPs: 202.129.205.3:8080
                      Source: Malware configuration extractorIPs: 201.94.166.162:443
                      Source: Malware configuration extractorIPs: 119.59.103.152:8080
                      Source: Malware configuration extractorIPs: 153.126.146.25:7080
                      Source: Malware configuration extractorIPs: 188.44.20.25:443
                      Source: Malware configuration extractorIPs: 115.68.227.76:8080
                      Source: Malware configuration extractorIPs: 147.139.166.154:8080
                      Source: Malware configuration extractorIPs: 149.56.131.28:8080
                      Source: Malware configuration extractorIPs: 107.170.39.149:8080
                      Source: Malware configuration extractorIPs: 213.239.212.5:443
                      Source: Malware configuration extractorIPs: 197.242.150.244:8080
                      Source: Malware configuration extractorIPs: 206.189.28.199:8080
                      Source: Malware configuration extractorIPs: 5.135.159.50:443
                      Source: Malware configuration extractorIPs: 169.57.156.166:8080
                      Source: Malware configuration extractorIPs: 103.75.201.2:443
                      Source: Malware configuration extractorIPs: 110.232.117.186:8080
                      Source: Malware configuration extractorIPs: 94.23.45.86:4143
                      Source: Malware configuration extractorIPs: 45.235.8.30:8080
                      Source: Malware configuration extractorIPs: 101.50.0.91:8080
                      Source: Joe Sandbox ViewASN Name: RACKCORP-APRackCorpAU RACKCORP-APRackCorpAU
                      Source: Joe Sandbox ViewJA3 fingerprint: 72a589da586844d7f0818ce684948eea
                      Source: global trafficHTTP traffic detected: POST /nwgvynyayplzdkad/hjvnrupyw/tgrpudcxhduglli/orzxqya/ HTTP/1.1Connection: Keep-AliveContent-Length: 0Host: 164.90.222.65
                      Source: Joe Sandbox ViewIP Address: 110.232.117.186 110.232.117.186
                      Source: global trafficTCP traffic: 192.168.11.20:49827 -> 91.121.146.47:8080
                      Source: global trafficTCP traffic: 192.168.11.20:49829 -> 66.228.32.31:7080
                      Source: global trafficTCP traffic: 192.168.11.20:49835 -> 167.172.199.165:8080
                      Source: global trafficTCP traffic: 192.168.11.20:49838 -> 104.168.155.143:8080
                      Source: global trafficTCP traffic: 192.168.11.20:49839 -> 91.207.28.33:8080
                      Source: global trafficTCP traffic: 192.168.11.20:49841 -> 72.15.201.15:8080
                      Source: global trafficTCP traffic: 192.168.11.20:49842 -> 183.111.227.137:8080
                      Source: global trafficTCP traffic: 192.168.11.20:49844 -> 103.132.242.26:8080
                      Source: global trafficTCP traffic: 192.168.11.20:49845 -> 159.65.88.10:8080
                      Source: global trafficTCP traffic: 192.168.11.20:49847 -> 173.212.193.249:8080
                      Source: global trafficTCP traffic: 192.168.11.20:49848 -> 82.223.21.224:8080
                      Source: unknownNetwork traffic detected: IP country count 18
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49832
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49831
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49852
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49851
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49837 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49850
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49852 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49832 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49850 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49851 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49833 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49831 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49837
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49833
                      Source: unknownTCP traffic detected without corresponding DNS query: 91.121.146.47
                      Source: unknownTCP traffic detected without corresponding DNS query: 91.121.146.47
                      Source: unknownTCP traffic detected without corresponding DNS query: 91.121.146.47
                      Source: unknownTCP traffic detected without corresponding DNS query: 91.121.146.47
                      Source: unknownTCP traffic detected without corresponding DNS query: 91.121.146.47
                      Source: unknownTCP traffic detected without corresponding DNS query: 91.121.146.47
                      Source: unknownTCP traffic detected without corresponding DNS query: 91.121.146.47
                      Source: unknownTCP traffic detected without corresponding DNS query: 91.121.146.47
                      Source: unknownTCP traffic detected without corresponding DNS query: 91.121.146.47
                      Source: unknownTCP traffic detected without corresponding DNS query: 91.121.146.47
                      Source: unknownTCP traffic detected without corresponding DNS query: 91.121.146.47
                      Source: unknownTCP traffic detected without corresponding DNS query: 91.121.146.47
                      Source: unknownTCP traffic detected without corresponding DNS query: 66.228.32.31
                      Source: unknownTCP traffic detected without corresponding DNS query: 66.228.32.31
                      Source: unknownTCP traffic detected without corresponding DNS query: 66.228.32.31
                      Source: unknownTCP traffic detected without corresponding DNS query: 66.228.32.31
                      Source: unknownTCP traffic detected without corresponding DNS query: 66.228.32.31
                      Source: unknownTCP traffic detected without corresponding DNS query: 182.162.143.56
                      Source: unknownTCP traffic detected without corresponding DNS query: 182.162.143.56
                      Source: unknownTCP traffic detected without corresponding DNS query: 182.162.143.56
                      Source: unknownTCP traffic detected without corresponding DNS query: 182.162.143.56
                      Source: unknownTCP traffic detected without corresponding DNS query: 182.162.143.56
                      Source: unknownTCP traffic detected without corresponding DNS query: 182.162.143.56
                      Source: unknownTCP traffic detected without corresponding DNS query: 182.162.143.56
                      Source: unknownTCP traffic detected without corresponding DNS query: 182.162.143.56
                      Source: unknownTCP traffic detected without corresponding DNS query: 182.162.143.56
                      Source: unknownTCP traffic detected without corresponding DNS query: 182.162.143.56
                      Source: unknownTCP traffic detected without corresponding DNS query: 187.63.160.88
                      Source: unknownTCP traffic detected without corresponding DNS query: 187.63.160.88
                      Source: unknownTCP traffic detected without corresponding DNS query: 187.63.160.88
                      Source: unknownTCP traffic detected without corresponding DNS query: 187.63.160.88
                      Source: unknownTCP traffic detected without corresponding DNS query: 187.63.160.88
                      Source: unknownTCP traffic detected without corresponding DNS query: 167.172.199.165
                      Source: unknownTCP traffic detected without corresponding DNS query: 167.172.199.165
                      Source: unknownTCP traffic detected without corresponding DNS query: 167.172.199.165
                      Source: unknownTCP traffic detected without corresponding DNS query: 167.172.199.165
                      Source: unknownTCP traffic detected without corresponding DNS query: 167.172.199.165
                      Source: unknownTCP traffic detected without corresponding DNS query: 167.172.199.165
                      Source: unknownTCP traffic detected without corresponding DNS query: 167.172.199.165
                      Source: unknownTCP traffic detected without corresponding DNS query: 167.172.199.165
                      Source: unknownTCP traffic detected without corresponding DNS query: 167.172.199.165
                      Source: unknownTCP traffic detected without corresponding DNS query: 167.172.199.165
                      Source: unknownTCP traffic detected without corresponding DNS query: 164.90.222.65
                      Source: unknownTCP traffic detected without corresponding DNS query: 164.90.222.65
                      Source: unknownTCP traffic detected without corresponding DNS query: 164.90.222.65
                      Source: unknownTCP traffic detected without corresponding DNS query: 164.90.222.65
                      Source: unknownTCP traffic detected without corresponding DNS query: 164.90.222.65
                      Source: unknownTCP traffic detected without corresponding DNS query: 164.90.222.65
                      Source: unknownTCP traffic detected without corresponding DNS query: 164.90.222.65
                      Source: unknownTCP traffic detected without corresponding DNS query: 164.90.222.65
                      Source: regsvr32.exe, 00000007.00000003.2799999469.000000000077A000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000003.3101523836.000000000077A000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000003.3104301699.000000000077A000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000002.4270670203.000000000078A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
                      Source: regsvr32.exe, 00000007.00000003.2799999469.000000000077A000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000003.3101523836.000000000077A000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000003.3104301699.000000000077A000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000002.4270670203.000000000078A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
                      Source: regsvr32.exe, 00000007.00000003.2793757847.0000000002B00000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/Kj
                      Source: regsvr32.exe, 00000007.00000003.2798696588.000000000073B000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000003.3103601521.000000000074A000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000003.3102709480.000000000073B000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000002.4270670203.000000000073B000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000003.2800875535.000000000073B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en
                      Source: regsvr32.exe, 00000007.00000003.2799999469.000000000077A000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000003.3101523836.000000000077A000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000003.3104301699.000000000077A000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000002.4270670203.000000000078A000.00000004.00000020.00020000.00000000.sdmp, 77EC63BDA74BD0D0E0426DC8F80085060.7.drString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
                      Source: regsvr32.exe, 00000007.00000002.4273374444.0000000002B74000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://103.132.242.26:8080/
                      Source: regsvr32.exe, 00000007.00000002.4273837270.0000000002CC7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://103.43.75.120/
                      Source: regsvr32.exe, 00000007.00000002.4270670203.000000000078A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://103.43.75.120/0/
                      Source: regsvr32.exe, 00000007.00000002.4270670203.000000000078A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://103.43.75.120/080/d
                      Source: regsvr32.exe, 00000007.00000002.4270670203.000000000078A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://103.43.75.120/nwgvynyayplzdkad/hjvnrupyw/tgrpudcxhduglli/orzxqya/
                      Source: regsvr32.exe, 00000007.00000002.4270670203.000000000078A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://103.43.75.120/nwgvynyayplzdkad/hjvnrupyw/tgrpudcxhduglli/orzxqya/k
                      Source: regsvr32.exe, 00000007.00000002.4270670203.00000000007C6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://103.43.75.120/nwgvynyayplzdkad/hjvnrupyw/tgrpudcxhduglli/orzxqya/xqya/
                      Source: regsvr32.exe, 00000007.00000002.4273374444.0000000002B1D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://103.43.75.120:443/nwgvynyayplzdkad/hjvnrupyw/tgrpudcxhduglli/orzxqya/a/
                      Source: regsvr32.exe, 00000007.00000002.4270670203.000000000078A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://159.65.88.10:8080/
                      Source: regsvr32.exe, 00000007.00000002.4270670203.000000000078A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://159.65.88.10:8080/nwgvynyayplzdkad/hjvnrupyw/tgrpudcxhduglli/orzxqya/u
                      Source: regsvr32.exe, 00000007.00000002.4273374444.0000000002B1D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://164.90.222.65/nwgvynyayplzdkad/hjvnrupyw/tgrpudcxhduglli/orzxqya/
                      Source: regsvr32.exe, 00000007.00000002.4273374444.0000000002B1D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://164.90.222.65/nwgvynyayplzdkad/hjvnrupyw/tgrpudcxhduglli/orzxqya/zxqya/
                      Source: regsvr32.exe, 00000007.00000003.3101418374.0000000002B74000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://167.172.199.165:8080/
                      Source: regsvr32.exe, 00000007.00000003.3101523836.000000000077A000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000003.3104301699.000000000077A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://167.172.199.165:8080/nwgvynyayplzdkad/hjvnrupyw/tgrpudcxhduglli/orzxqya/
                      Source: regsvr32.exe, 00000007.00000003.3101523836.000000000077A000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000003.3104301699.000000000077A000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000002.4273374444.0000000002B00000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://167.172.199.165:8080/nwgvynyayplzdkad/hjvnrupyw/tgrpudcxhduglli/orzxqya/j
                      Source: regsvr32.exe, 00000007.00000002.4273374444.0000000002B74000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://172.105.226.75:8080/
                      Source: regsvr32.exe, 00000007.00000002.4273374444.0000000002B74000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://172.105.226.75:8080/$
                      Source: regsvr32.exe, 00000007.00000002.4273374444.0000000002B74000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://172.105.226.75:8080/icy)
                      Source: regsvr32.exe, 00000007.00000002.4270670203.000000000078A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://172.105.226.75:8080/nwgvynyayplzdkad/hjvnrupyw/tgrpudcxhduglli/orzxqya/
                      Source: regsvr32.exe, 00000007.00000002.4270670203.000000000078A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://172.105.226.75:8080/nwgvynyayplzdkad/hjvnrupyw/tgrpudcxhduglli/orzxqya/S
                      Source: regsvr32.exe, 00000007.00000002.4270670203.000000000078A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://172.105.226.75:8080/nwgvynyayplzdkad/hjvnrupyw/tgrpudcxhduglli/orzxqya/d
                      Source: regsvr32.exe, 00000007.00000002.4273374444.0000000002B74000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://173.212.193.249:8080/
                      Source: regsvr32.exe, 00000007.00000002.4273374444.0000000002B74000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://173.212.193.249:8080/ert
                      Source: regsvr32.exe, 00000007.00000002.4270670203.000000000078A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://173.212.193.249:8080/nwgvynyayplzdkad/hjvnrupyw/tgrpudcxhduglli/orzxqya/
                      Source: regsvr32.exe, 00000007.00000002.4270670203.000000000078A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://173.212.193.249:8080/nwgvynyayplzdkad/hjvnrupyw/tgrpudcxhduglli/orzxqya/j
                      Source: regsvr32.exe, 00000007.00000002.4273374444.0000000002B74000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://183.111.227.137:8080/
                      Source: regsvr32.exe, 00000007.00000002.4270670203.000000000078A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://183.111.227.137:8080/nwgvynyayplzdkad/hjvnrupyw/tgrpudcxhduglli/orzxqya/327
                      Source: regsvr32.exe, 00000007.00000003.3101523836.000000000077A000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000003.3104301699.000000000077A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://187.63.160.88:80/
                      Source: regsvr32.exe, 00000007.00000003.3101523836.000000000077A000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000003.3104301699.000000000077A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://187.63.160.88:80/nwgvynyayplzdkad/hjvnrupyw/tgrpudcxhduglli/orzxqya/STEM327
                      Source: regsvr32.exe, 00000007.00000003.3103601521.0000000000763000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000003.3102709480.00000000007C6000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000002.4270670203.00000000007C6000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000003.3102709480.0000000000763000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://66.228.32.31:7080/
                      Source: regsvr32.exe, 00000007.00000003.3102709480.00000000007C6000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000002.4270670203.00000000007C6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://66.228.32.31:7080/F
                      Source: regsvr32.exe, 00000007.00000003.3102709480.00000000007C6000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000002.4270670203.00000000007C6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://66.228.32.31:7080/z
                      Source: regsvr32.exe, 00000007.00000002.4270670203.000000000078A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://72.15.201.15:8080/
                      Source: regsvr32.exe, 00000007.00000002.4270670203.000000000078A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://82.223.21.224:8080/
                      Source: regsvr32.exe, 00000007.00000002.4270670203.000000000078A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://82.223.21.224:8080/nwgvynyayplzdkad/hjvnrupyw/tgrpudcxhduglli/orzxqya/K
                      Source: regsvr32.exe, 00000007.00000003.3103601521.0000000000763000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000003.2798696588.0000000000763000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000003.3102709480.0000000000763000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000002.4270670203.0000000000763000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://91.121.146.47:8080/
                      Source: regsvr32.exe, 00000007.00000003.3103601521.0000000000763000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000002.4270670203.00000000006EB000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000003.3102709480.0000000000763000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://91.121.146.47:8080/nwgvynyayplzdkad/hjvnrupyw/tgrpudcxhduglli/orzxqya/
                      Source: regsvr32.exe, 00000007.00000003.2798696588.0000000000763000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://91.121.146.47:8080/nwgvynyayplzdkad/hjvnrupyw/tgrpudcxhduglli/orzxqya/I
                      Source: unknownHTTP traffic detected: POST /nwgvynyayplzdkad/hjvnrupyw/tgrpudcxhduglli/orzxqya/ HTTP/1.1Connection: Keep-AliveContent-Length: 0Host: 164.90.222.65
                      Source: unknownHTTPS traffic detected: 164.90.222.65:443 -> 192.168.11.20:49837 version: TLS 1.2

                      E-Banking Fraud

                      barindex
                      Source: Yara matchFile source: 00000007.00000002.4270670203.00000000006EB000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 4.2.rundll32.exe.29592a20000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.rundll32.exe.25313ba0000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.rundll32.exe.25313ba0000.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.29592a20000.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.regsvr32.exe.2d30000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.regsvr32.exe.2d30000.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 7.2.regsvr32.exe.a10000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 7.2.regsvr32.exe.a10000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000004.00000002.2442517269.0000029592A20000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.2442904998.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.2440735305.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.2440693096.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.2442401873.0000000002D30000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000007.00000002.4274390875.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000007.00000002.4271871616.0000000000A10000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.2442528537.0000025313BA0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: C:\Windows\System32\rundll32.exeFile deleted: C:\Windows\System32\JAnzBeoSOFkqX\hUQcK.dll:Zone.IdentifierJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeFile created: C:\Windows\system32\SAolKOHOGzImreJl\Jump to behavior
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00401730
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0041D100
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0042E190
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_004161A0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0041F200
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00414AC0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0044D278
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_004172F0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0044D278
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0044D278
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0044D278
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00440BD0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0044D278
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0040A387
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00441BA0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00424C40
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0044D3B8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0044D3B8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00414420
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0044D3B8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0044D3B8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0044D3B8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0044D3B8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0044D3B8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_004165D0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_004186C7
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_004186C9
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_004186ED
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_004186FB
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_004186FD
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_004186FF
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0041869B
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0041869D
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0041869F
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_004186A1
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00439760
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00418701
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00418703
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00418705
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02D20000
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018001A000
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018000CC14
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018001709C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180007D6C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018000263C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180018FC8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180008BC8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800227EC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018000A7F0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180001000
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180009408
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180007C08
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018002181C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180011030
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018001EC30
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018000B83C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180007840
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018001C44C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180025450
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018001C058
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018001B460
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180016C70
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018000D474
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180002C78
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018000C078
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018000B07C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180015880
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018001CC84
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180004C84
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018000AC94
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800098AC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018001A8B0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018000DCB8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800294BC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180015CC4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018000F8C4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800108CC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800080CC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180013CD4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800014D4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800018DC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800120E0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180003CF4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800090F8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800048FC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180028500
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018001610C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180029910
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180017518
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180014D20
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180011924
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018001AD28
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018001B130
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180007530
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180006138
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018001BDA0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800095BC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800115C8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018001D5F0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180028A00
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180015A00
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180018E08
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018001020C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180003E0C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180004214
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018000461C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180018A2C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180010E2C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018001662C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018000BA2C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018001A244
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018000B258
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018000F65C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018000A660
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180010A70
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180003274
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180024E8C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180008A8C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180014A90
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018000BE90
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018000AAB8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180004EB8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018001A6BC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180003ABC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018001EAC0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018000D6CC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800196D4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800092F0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018001E310
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180013B14
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018000EF14
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180014F18
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018000D33C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018001E750
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180004758
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018000975C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018001D770
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018001CF70
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180008378
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018000F77C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180015384
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180001B94
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018000DBA0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180008FB0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180018BB8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018000FFB8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800197CC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180013FD0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180002FD4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800033D4
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00401730
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0041D100
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0042E190
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_004161A0
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0041F200
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00414AC0
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0044D278
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_004172F0
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0044D278
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0044D278
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0044D278
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00440BD0
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0044D278
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0040A387
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00441BA0
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00424C40
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0044D3B8
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0044D3B8
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00414420
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0044D3B8
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0044D3B8
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0044D3B8
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0044D3B8
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0044D3B8
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_004165D0
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_004186C7
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_004186C9
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_004186ED
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_004186FB
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_004186FD
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_004186FF
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0041869B
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0041869D
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0041869F
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_004186A1
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00439760
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00418701
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00418703
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00418705
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018001A000
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018001709C
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180008BC8
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018000CC14
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180007D6C
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018000263C
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180018FC8
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800227EC
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018000A7F0
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180001000
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018002181C
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180011030
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018000B83C
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180007840
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018001C058
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018000C078
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018000B07C
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180015880
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800098AC
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018001A8B0
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018000F8C4
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800108CC
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800080CC
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800018DC
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800120E0
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800090F8
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800048FC
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018001610C
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180029910
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180011924
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018001B130
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180006138
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180028A00
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180015A00
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018001020C
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180004214
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180018A2C
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018000BA2C
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018001A244
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018000B258
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180010A70
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180003274
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180008A8C
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180014A90
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018000AAB8
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180003ABC
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018001EAC0
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800092F0
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018001E310
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180013B14
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018000D33C
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180008378
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180015384
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180001B94
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018000DBA0
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180018BB8
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800033D4
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180009408
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180007C08
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018001EC30
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018001C44C
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180025450
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018001B460
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180016C70
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018000D474
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180002C78
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018001CC84
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180004C84
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018000AC94
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018000DCB8
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800294BC
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180015CC4
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180013CD4
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800014D4
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180003CF4
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180028500
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180017518
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180014D20
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018001AD28
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180007530
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018001BDA0
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800095BC
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800115C8
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018001D5F0
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180018E08
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180003E0C
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018000461C
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180010E2C
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018001662C
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018000F65C
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018000A660
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180024E8C
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018000BE90
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180004EB8
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018001A6BC
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018000D6CC
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800196D4
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018000EF14
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180014F18
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018001E750
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180004758
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018000975C
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018001D770
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018001CF70
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018000F77C
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180008FB0
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018000FFB8
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800197CC
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180013FD0
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180002FD4
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000029592A10000
                      Source: C:\Windows\System32\rundll32.exeCode function: String function: 00401F90 appears 87 times
                      Source: C:\Windows\System32\regsvr32.exeCode function: String function: 00401F90 appears 87 times
                      Source: C:\Windows\System32\regsvr32.exeSection loaded: sfc.dll
                      Source: C:\Windows\System32\regsvr32.exeSection loaded: edgegdi.dll
                      Source: C:\Windows\System32\regsvr32.exeSection loaded: sfc.dll
                      Source: C:\Windows\System32\regsvr32.exeSection loaded: edgegdi.dll
                      Source: C:\Windows\System32\regsvr32.exeSection loaded: sfc.dll
                      Source: C:\Windows\System32\regsvr32.exeSection loaded: edgegdi.dll
                      Source: C:\Windows\System32\regsvr32.exeSection loaded: sfc.dll
                      Source: C:\Windows\System32\regsvr32.exeSection loaded: edgegdi.dll
                      Source: aOHLlvfakv.dllReversingLabs: Detection: 28%
                      Source: aOHLlvfakv.dllVirustotal: Detection: 53%
                      Source: aOHLlvfakv.dllStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      Source: C:\Windows\System32\loaddll64.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                      Source: unknownProcess created: C:\Windows\System32\loaddll64.exe loaddll64.exe "C:\Users\user\Desktop\aOHLlvfakv.dll"
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\aOHLlvfakv.dll",#1
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\aOHLlvfakv.dll
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\aOHLlvfakv.dll",#1
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\aOHLlvfakv.dll,DllRegisterServer
                      Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\regsvr32.exe C:\Windows\system32\regsvr32.exe "C:\Windows\system32\JAnzBeoSOFkqX\hUQcK.dll"
                      Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\regsvr32.exe C:\Windows\system32\regsvr32.exe "C:\Windows\system32\FAAMB\YSmuMEqbrrG.dll"
                      Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\System32\regsvr32.exe C:\Windows\system32\regsvr32.exe "C:\Windows\system32\SAolKOHOGzImreJl\DHZYcsMibMOGCXWD.dll"
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\aOHLlvfakv.dll,__CPPdebugHook
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\aOHLlvfakv.dll",#1
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\aOHLlvfakv.dll
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\aOHLlvfakv.dll,DllRegisterServer
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\aOHLlvfakv.dll,__CPPdebugHook
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\aOHLlvfakv.dll",#1
                      Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\System32\regsvr32.exe C:\Windows\system32\regsvr32.exe "C:\Windows\system32\SAolKOHOGzImreJl\DHZYcsMibMOGCXWD.dll"
                      Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\regsvr32.exe C:\Windows\system32\regsvr32.exe "C:\Windows\system32\JAnzBeoSOFkqX\hUQcK.dll"
                      Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\regsvr32.exe C:\Windows\system32\regsvr32.exe "C:\Windows\system32\FAAMB\YSmuMEqbrrG.dll"
                      Source: C:\Windows\System32\regsvr32.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32
                      Source: classification engineClassification label: mal96.troj.evad.winDLL@18/2@0/49
                      Source: C:\Windows\System32\regsvr32.exeFile read: C:\Users\desktop.iniJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180008BC8 Process32NextW,Process32FirstW,CreateToolhelp32Snapshot,FindCloseChangeNotification,
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\aOHLlvfakv.dll",#1
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8560:120:WilError_03
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8560:304:WilStaging_02
                      Source: C:\Windows\System32\regsvr32.exeAutomated click: OK
                      Source: C:\Windows\System32\regsvr32.exeAutomated click: OK
                      Source: C:\Windows\System32\rundll32.exeAutomated click: OK
                      Source: Window RecorderWindow detected: More than 3 window changes detected
                      Source: aOHLlvfakv.dllStatic file information: File size 571122142 > 1048576
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180006C9F pushad ; ret
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800180D7 push ebp; retf
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180006CDE push esi; iretd
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018000A0FC push ebp; iretd
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180017D25 push 4D8BFFFFh; retf
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180017D3C push ebp; retf
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180017D4E push ebp; iretd
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180009D51 push ebp; retf
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180018157 push ebp; retf
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180017987 push ebp; iretd
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018000A1D2 push ebp; iretd
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018000A26E push ebp; ret
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180009E8B push eax; retf
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180017EAF push 458BCC5Ah; retf
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018001C731 push esi; iretd
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800180D7 push ebp; retf
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018000A0FC push ebp; iretd
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180018157 push ebp; retf
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180017987 push ebp; iretd
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018000A1D2 push ebp; iretd
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018000A26E push ebp; ret
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180006C9F pushad ; ret
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180006CDE push esi; iretd
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180017D25 push 4D8BFFFFh; retf
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180017D3C push ebp; retf
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180017D4E push ebp; iretd
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180009D51 push ebp; retf
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180009E8B push eax; retf
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180017EAF push 458BCC5Ah; retf
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018001C731 push esi; iretd
                      Source: aOHLlvfakv.dllStatic PE information: section name: .rodata
                      Source: aOHLlvfakv.dllStatic PE information: section name: .xdata
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00401C80 LoadLibraryW,GetProcAddress,ExitProcess,
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\aOHLlvfakv.dll
                      Source: C:\Windows\System32\rundll32.exePE file moved: C:\Windows\System32\JAnzBeoSOFkqX\hUQcK.dllJump to behavior

                      Hooking and other Techniques for Hiding and Protection

                      barindex
                      Source: C:\Windows\System32\regsvr32.exeFile opened: C:\Windows\system32\SAolKOHOGzImreJl\DHZYcsMibMOGCXWD.dll:Zone.Identifier read attributes | delete
                      Source: C:\Windows\System32\rundll32.exeFile opened: C:\Windows\system32\JAnzBeoSOFkqX\hUQcK.dll:Zone.Identifier read attributes | delete
                      Source: C:\Windows\System32\rundll32.exeFile opened: C:\Windows\system32\FAAMB\YSmuMEqbrrG.dll:Zone.Identifier read attributes | delete
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\regsvr32.exe TID: 2096Thread sleep time: -120000s >= -30000s
                      Source: C:\Windows\System32\regsvr32.exe TID: 2096Thread sleep time: -30000s >= -30000s
                      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                      Source: C:\Windows\System32\regsvr32.exeAPI coverage: 6.1 %
                      Source: C:\Windows\System32\rundll32.exeAPI coverage: 6.1 %
                      Source: C:\Windows\System32\regsvr32.exeProcess information queried: ProcessInformation
                      Source: C:\Windows\System32\regsvr32.exeAPI call chain: ExitProcess graph end node
                      Source: C:\Windows\System32\rundll32.exeAPI call chain: ExitProcess graph end node
                      Source: C:\Windows\System32\rundll32.exeFile Volume queried: C:\ FullSizeInformation
                      Source: C:\Windows\System32\rundll32.exeFile Volume queried: C:\ FullSizeInformation
                      Source: regsvr32.exe, 00000007.00000003.3103601521.0000000000763000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000003.2799999469.000000000077A000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000003.3101523836.000000000077A000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000003.3104301699.000000000077A000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000003.2798696588.0000000000763000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000003.3101523836.000000000072C000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000002.4270670203.000000000072C000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000003.3102709480.0000000000763000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000003.3104301699.000000000076C000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000002.4270670203.0000000000779000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000003.2798696588.000000000072C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00401C80 LoadLibraryW,GetProcAddress,ExitProcess,
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0044D278 EnterCriticalSection,EnterCriticalSection,GetCPInfo,GetCurrentProcessId,GetDateFormatA,GetFileAttributesA,GetLocalTime,GetLocaleInfoA,GetModuleHandleA,GetOEMCP,GetProcessHeap,
                      Source: C:\Windows\System32\loaddll64.exeProcess queried: DebugPort

                      HIPS / PFW / Operating System Protection Evasion

                      barindex
                      Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 159.65.88.10 8080
                      Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 172.105.226.75 8080
                      Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 164.90.222.65 443
                      Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 66.228.32.31 7080
                      Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 187.63.160.88 80
                      Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 173.212.193.249 8080
                      Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 82.223.21.224 8080
                      Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 183.111.227.137 8080
                      Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 103.132.242.26 8080
                      Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 104.168.155.143 8080
                      Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 91.121.146.47 8080
                      Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 91.207.28.33 8080
                      Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 182.162.143.56 443
                      Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 103.43.75.120 443
                      Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 167.172.199.165 8080
                      Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 72.15.201.15 8080
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\aOHLlvfakv.dll",#1
                      Source: C:\Windows\System32\regsvr32.exeQueries volume information: C:\ VolumeInformation
                      Source: C:\Windows\System32\regsvr32.exeCode function: EnterCriticalSection,GetLocaleInfoA,LeaveCriticalSection,EnterCriticalSection,IsValidLocale,SetThreadLocale,LeaveCriticalSection,LeaveCriticalSection,SetLastError,SetLastError,LeaveCriticalSection,LeaveCriticalSection,GetCPInfo,IsValidLocale,SetThreadLocale,SetLastError,SetLastError,
                      Source: C:\Windows\System32\regsvr32.exeCode function: EnterCriticalSection,EnterCriticalSection,GetCPInfo,GetCurrentProcessId,GetDateFormatA,GetFileAttributesA,GetLocalTime,GetLocaleInfoA,GetModuleHandleA,GetOEMCP,GetProcessHeap,
                      Source: C:\Windows\System32\regsvr32.exeCode function: EnterCriticalSection,EnterCriticalSection,GetCPInfo,GetCurrentProcessId,GetDateFormatA,GetFileAttributesA,GetLocalTime,GetLocaleInfoA,GetModuleHandleA,GetOEMCP,GetProcessHeap,
                      Source: C:\Windows\System32\regsvr32.exeCode function: EnterCriticalSection,EnterCriticalSection,GetCPInfo,GetCurrentProcessId,GetDateFormatA,GetFileAttributesA,GetLocalTime,GetLocaleInfoA,GetModuleHandleA,GetOEMCP,GetProcessHeap,
                      Source: C:\Windows\System32\regsvr32.exeCode function: EnterCriticalSection,EnterCriticalSection,GetCPInfo,GetCurrentProcessId,GetDateFormatA,GetFileAttributesA,GetLocalTime,GetLocaleInfoA,GetModuleHandleA,GetOEMCP,GetProcessHeap,
                      Source: C:\Windows\System32\regsvr32.exeCode function: GetLocaleInfoA,GetLocaleInfoA,SetLastError,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,SetLastError,GetLocaleInfoA,SetLastError,GetLocaleInfoA,SetLastError,GetLocaleInfoA,SetLastError,GetLocaleInfoA,SetLastError,GetLocaleInfoA,SetLastError,GetLocaleInfoA,SetLastError,
                      Source: C:\Windows\System32\regsvr32.exeCode function: EnterCriticalSection,EnterCriticalSection,GetCPInfo,GetCurrentProcessId,GetDateFormatA,GetFileAttributesA,GetLocalTime,GetLocaleInfoA,GetModuleHandleA,GetOEMCP,GetProcessHeap,
                      Source: C:\Windows\System32\regsvr32.exeCode function: GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,SetLastError,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,SetLastError,
                      Source: C:\Windows\System32\regsvr32.exeCode function: GetLocaleInfoA,
                      Source: C:\Windows\System32\regsvr32.exeCode function: GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,SetLastError,
                      Source: C:\Windows\System32\regsvr32.exeCode function: GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,SetLastError,GetLocaleInfoA,SetLastError,GetLocaleInfoA,SetLastError,GetLocaleInfoA,SetLastError,GetLocaleInfoA,SetLastError,GetLocaleInfoA,SetLastError,GetLocaleInfoA,SetLastError,GetLocaleInfoA,SetLastError,GetLocaleInfoA,SetLastError,GetLocaleInfoA,SetLastError,
                      Source: C:\Windows\System32\rundll32.exeCode function: EnterCriticalSection,GetLocaleInfoA,LeaveCriticalSection,EnterCriticalSection,IsValidLocale,SetThreadLocale,LeaveCriticalSection,LeaveCriticalSection,SetLastError,SetLastError,LeaveCriticalSection,LeaveCriticalSection,GetCPInfo,IsValidLocale,SetThreadLocale,SetLastError,SetLastError,
                      Source: C:\Windows\System32\rundll32.exeCode function: EnterCriticalSection,EnterCriticalSection,GetCPInfo,GetCurrentProcessId,GetDateFormatA,GetFileAttributesA,GetLocalTime,GetLocaleInfoA,GetModuleHandleA,GetOEMCP,GetProcessHeap,
                      Source: C:\Windows\System32\rundll32.exeCode function: EnterCriticalSection,EnterCriticalSection,GetCPInfo,GetCurrentProcessId,GetDateFormatA,GetFileAttributesA,GetLocalTime,GetLocaleInfoA,GetModuleHandleA,GetOEMCP,GetProcessHeap,
                      Source: C:\Windows\System32\rundll32.exeCode function: EnterCriticalSection,EnterCriticalSection,GetCPInfo,GetCurrentProcessId,GetDateFormatA,GetFileAttributesA,GetLocalTime,GetLocaleInfoA,GetModuleHandleA,GetOEMCP,GetProcessHeap,
                      Source: C:\Windows\System32\rundll32.exeCode function: EnterCriticalSection,EnterCriticalSection,GetCPInfo,GetCurrentProcessId,GetDateFormatA,GetFileAttributesA,GetLocalTime,GetLocaleInfoA,GetModuleHandleA,GetOEMCP,GetProcessHeap,
                      Source: C:\Windows\System32\rundll32.exeCode function: GetLocaleInfoA,GetLocaleInfoA,SetLastError,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,SetLastError,GetLocaleInfoA,SetLastError,GetLocaleInfoA,SetLastError,GetLocaleInfoA,SetLastError,GetLocaleInfoA,SetLastError,GetLocaleInfoA,SetLastError,GetLocaleInfoA,SetLastError,
                      Source: C:\Windows\System32\rundll32.exeCode function: EnterCriticalSection,EnterCriticalSection,GetCPInfo,GetCurrentProcessId,GetDateFormatA,GetFileAttributesA,GetLocalTime,GetLocaleInfoA,GetModuleHandleA,GetOEMCP,GetProcessHeap,
                      Source: C:\Windows\System32\rundll32.exeCode function: GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,SetLastError,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,SetLastError,
                      Source: C:\Windows\System32\rundll32.exeCode function: GetLocaleInfoA,
                      Source: C:\Windows\System32\rundll32.exeCode function: GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,SetLastError,
                      Source: C:\Windows\System32\rundll32.exeCode function: GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,SetLastError,GetLocaleInfoA,SetLastError,GetLocaleInfoA,SetLastError,GetLocaleInfoA,SetLastError,GetLocaleInfoA,SetLastError,GetLocaleInfoA,SetLastError,GetLocaleInfoA,SetLastError,GetLocaleInfoA,SetLastError,GetLocaleInfoA,SetLastError,GetLocaleInfoA,SetLastError,
                      Source: C:\Windows\System32\regsvr32.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0044D278 EnterCriticalSection,EnterCriticalSection,GetCPInfo,GetCurrentProcessId,GetDateFormatA,GetFileAttributesA,GetLocalTime,GetLocaleInfoA,GetModuleHandleA,GetOEMCP,GetProcessHeap,
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00446AA0 GetVersion,GetCurrentThreadId,EnumThreadWindows,MessageBoxA,WriteFile,WriteFile,

                      Stealing of Sensitive Information

                      barindex
                      Source: Yara matchFile source: 00000007.00000002.4270670203.00000000006EB000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 4.2.rundll32.exe.29592a20000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.rundll32.exe.25313ba0000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.rundll32.exe.25313ba0000.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.29592a20000.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.regsvr32.exe.2d30000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.regsvr32.exe.2d30000.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 7.2.regsvr32.exe.a10000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 7.2.regsvr32.exe.a10000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000004.00000002.2442517269.0000029592A20000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.2442904998.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.2440735305.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.2440693096.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.2442401873.0000000002D30000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000007.00000002.4274390875.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000007.00000002.4271871616.0000000000A10000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.2442528537.0000025313BA0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                      Valid Accounts1
                      Native API
                      1
                      DLL Side-Loading
                      111
                      Process Injection
                      2
                      Masquerading
                      OS Credential Dumping1
                      System Time Discovery
                      Remote Services1
                      Archive Collected Data
                      Exfiltration Over Other Network Medium11
                      Encrypted Channel
                      Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                      Default AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
                      DLL Side-Loading
                      2
                      Virtualization/Sandbox Evasion
                      LSASS Memory21
                      Security Software Discovery
                      Remote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth1
                      Non-Standard Port
                      Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                      Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)111
                      Process Injection
                      Security Account Manager2
                      Virtualization/Sandbox Evasion
                      SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration1
                      Non-Application Layer Protocol
                      Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                      Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)1
                      Deobfuscate/Decode Files or Information
                      NTDS2
                      Process Discovery
                      Distributed Component Object ModelInput CaptureScheduled Transfer12
                      Application Layer Protocol
                      SIM Card SwapCarrier Billing Fraud
                      Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
                      Hidden Files and Directories
                      LSA Secrets1
                      File and Directory Discovery
                      SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                      Replication Through Removable MediaLaunchdRc.commonRc.common3
                      Obfuscated Files or Information
                      Cached Domain Credentials25
                      System Information Discovery
                      VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                      External Remote ServicesScheduled TaskStartup ItemsStartup Items1
                      Regsvr32
                      DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                      Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job1
                      Rundll32
                      Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
                      Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)1
                      DLL Side-Loading
                      /etc/passwd and /etc/shadowSystem Network Connections DiscoverySoftware Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
                      Supply Chain CompromiseAppleScriptAt (Windows)At (Windows)1
                      File Deletion
                      Network SniffingProcess DiscoveryTaint Shared ContentLocal Data StagingExfiltration Over Unencrypted/Obfuscated Non-C2 ProtocolFile Transfer ProtocolsData Encrypted for Impact
                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet
                      behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 828936 Sample: aOHLlvfakv.dll Startdate: 17/03/2023 Architecture: WINDOWS Score: 96 31 129.232.188.93 xneeloZA South Africa 2->31 33 45.235.8.30 WIKINETTELECOMUNICACOESBR Brazil 2->33 35 31 other IPs or domains 2->35 43 Snort IDS alert for network traffic 2->43 45 Antivirus detection for URL or domain 2->45 47 Multi AV Scanner detection for submitted file 2->47 49 2 other signatures 2->49 9 loaddll64.exe 1 2->9         started        signatures3 process4 process5 11 cmd.exe 1 9->11         started        13 rundll32.exe 2 9->13         started        16 regsvr32.exe 2 9->16         started        18 2 other processes 9->18 signatures6 20 rundll32.exe 2 11->20         started        55 Hides that the sample has been downloaded from the Internet (zone.identifier) 13->55 23 regsvr32.exe 13->23         started        25 regsvr32.exe 16->25         started        process7 signatures8 51 Hides that the sample has been downloaded from the Internet (zone.identifier) 20->51 27 regsvr32.exe 20->27         started        process9 dnsIp10 37 91.207.28.33, 8080 PROHOSTKG Kyrgyzstan 27->37 39 91.121.146.47, 49827, 8080 OVHFR France 27->39 41 14 other IPs or domains 27->41 53 System process connects to network (likely due to code injection or exploit) 27->53 signatures11

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                      windows-stand
                      SourceDetectionScannerLabelLink
                      aOHLlvfakv.dll28%ReversingLabsWin64.Trojan.Emotetcrypt
                      aOHLlvfakv.dll54%VirustotalBrowse
                      No Antivirus matches
                      No Antivirus matches
                      No Antivirus matches
                      SourceDetectionScannerLabelLink
                      https://103.43.75.120:443/nwgvynyayplzdkad/hjvnrupyw/tgrpudcxhduglli/orzxqya/a/100%Avira URL Cloudmalware
                      https://172.105.226.75:8080/$100%Avira URL Cloudmalware
                      https://66.228.32.31:7080/z100%Avira URL Cloudmalware
                      https://164.90.222.65/nwgvynyayplzdkad/hjvnrupyw/tgrpudcxhduglli/orzxqya/zxqya/100%Avira URL Cloudmalware
                      https://103.43.75.120/nwgvynyayplzdkad/hjvnrupyw/tgrpudcxhduglli/orzxqya/100%Avira URL Cloudmalware
                      https://159.65.88.10:8080/100%Avira URL Cloudmalware
                      https://82.223.21.224:8080/nwgvynyayplzdkad/hjvnrupyw/tgrpudcxhduglli/orzxqya/K100%Avira URL Cloudmalware
                      https://82.223.21.224:8080/100%Avira URL Cloudmalware
                      https://172.105.226.75:8080/100%Avira URL Cloudmalware
                      https://167.172.199.165:8080/nwgvynyayplzdkad/hjvnrupyw/tgrpudcxhduglli/orzxqya/j100%Avira URL Cloudmalware
                      https://187.63.160.88:80/nwgvynyayplzdkad/hjvnrupyw/tgrpudcxhduglli/orzxqya/STEM327100%Avira URL Cloudmalware
                      https://183.111.227.137:8080/nwgvynyayplzdkad/hjvnrupyw/tgrpudcxhduglli/orzxqya/327100%Avira URL Cloudmalware
                      https://187.63.160.88:80/100%Avira URL Cloudmalware
                      https://72.15.201.15:8080/100%Avira URL Cloudmalware
                      https://164.90.222.65/nwgvynyayplzdkad/hjvnrupyw/tgrpudcxhduglli/orzxqya/100%Avira URL Cloudmalware
                      https://91.121.146.47:8080/100%Avira URL Cloudmalware
                      https://167.172.199.165:8080/nwgvynyayplzdkad/hjvnrupyw/tgrpudcxhduglli/orzxqya/100%Avira URL Cloudmalware
                      https://103.132.242.26:8080/0%Avira URL Cloudsafe
                      https://103.43.75.120/0/100%Avira URL Cloudmalware
                      https://159.65.88.10:8080/nwgvynyayplzdkad/hjvnrupyw/tgrpudcxhduglli/orzxqya/u100%Avira URL Cloudmalware
                      https://103.43.75.120/080/d100%Avira URL Cloudmalware
                      https://173.212.193.249:8080/ert100%Avira URL Cloudmalware
                      https://103.43.75.120/100%Avira URL Cloudmalware
                      https://172.105.226.75:8080/nwgvynyayplzdkad/hjvnrupyw/tgrpudcxhduglli/orzxqya/S100%Avira URL Cloudmalware
                      https://173.212.193.249:8080/nwgvynyayplzdkad/hjvnrupyw/tgrpudcxhduglli/orzxqya/j100%Avira URL Cloudmalware
                      https://183.111.227.137:8080/100%Avira URL Cloudmalware
                      https://66.228.32.31:7080/100%Avira URL Cloudmalware
                      https://103.43.75.120/nwgvynyayplzdkad/hjvnrupyw/tgrpudcxhduglli/orzxqya/xqya/100%Avira URL Cloudmalware
                      https://91.121.146.47:8080/nwgvynyayplzdkad/hjvnrupyw/tgrpudcxhduglli/orzxqya/100%Avira URL Cloudmalware
                      https://167.172.199.165:8080/100%Avira URL Cloudmalware
                      https://173.212.193.249:8080/100%Avira URL Cloudmalware
                      https://66.228.32.31:7080/F100%Avira URL Cloudmalware
                      https://172.105.226.75:8080/nwgvynyayplzdkad/hjvnrupyw/tgrpudcxhduglli/orzxqya/d100%Avira URL Cloudmalware
                      https://173.212.193.249:8080/nwgvynyayplzdkad/hjvnrupyw/tgrpudcxhduglli/orzxqya/100%Avira URL Cloudmalware
                      https://172.105.226.75:8080/nwgvynyayplzdkad/hjvnrupyw/tgrpudcxhduglli/orzxqya/100%Avira URL Cloudmalware
                      https://172.105.226.75:8080/icy)100%Avira URL Cloudmalware
                      https://103.43.75.120/nwgvynyayplzdkad/hjvnrupyw/tgrpudcxhduglli/orzxqya/k100%Avira URL Cloudmalware
                      https://91.121.146.47:8080/nwgvynyayplzdkad/hjvnrupyw/tgrpudcxhduglli/orzxqya/I100%Avira URL Cloudmalware
                      No contacted domains info
                      NameMaliciousAntivirus DetectionReputation
                      https://164.90.222.65/nwgvynyayplzdkad/hjvnrupyw/tgrpudcxhduglli/orzxqya/true
                      • Avira URL Cloud: malware
                      unknown
                      NameSourceMaliciousAntivirus DetectionReputation
                      https://164.90.222.65/nwgvynyayplzdkad/hjvnrupyw/tgrpudcxhduglli/orzxqya/zxqya/regsvr32.exe, 00000007.00000002.4273374444.0000000002B1D000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: malware
                      unknown
                      https://172.105.226.75:8080/$regsvr32.exe, 00000007.00000002.4273374444.0000000002B74000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: malware
                      unknown
                      https://66.228.32.31:7080/zregsvr32.exe, 00000007.00000003.3102709480.00000000007C6000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000002.4270670203.00000000007C6000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: malware
                      unknown
                      https://103.43.75.120:443/nwgvynyayplzdkad/hjvnrupyw/tgrpudcxhduglli/orzxqya/a/regsvr32.exe, 00000007.00000002.4273374444.0000000002B1D000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: malware
                      unknown
                      https://103.43.75.120/nwgvynyayplzdkad/hjvnrupyw/tgrpudcxhduglli/orzxqya/regsvr32.exe, 00000007.00000002.4270670203.000000000078A000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: malware
                      unknown
                      https://159.65.88.10:8080/regsvr32.exe, 00000007.00000002.4270670203.000000000078A000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: malware
                      unknown
                      https://82.223.21.224:8080/nwgvynyayplzdkad/hjvnrupyw/tgrpudcxhduglli/orzxqya/Kregsvr32.exe, 00000007.00000002.4270670203.000000000078A000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: malware
                      unknown
                      https://82.223.21.224:8080/regsvr32.exe, 00000007.00000002.4270670203.000000000078A000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: malware
                      unknown
                      https://172.105.226.75:8080/regsvr32.exe, 00000007.00000002.4273374444.0000000002B74000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: malware
                      unknown
                      https://167.172.199.165:8080/nwgvynyayplzdkad/hjvnrupyw/tgrpudcxhduglli/orzxqya/jregsvr32.exe, 00000007.00000003.3101523836.000000000077A000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000003.3104301699.000000000077A000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000002.4273374444.0000000002B00000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: malware
                      unknown
                      https://187.63.160.88:80/nwgvynyayplzdkad/hjvnrupyw/tgrpudcxhduglli/orzxqya/STEM327regsvr32.exe, 00000007.00000003.3101523836.000000000077A000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000003.3104301699.000000000077A000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: malware
                      unknown
                      https://183.111.227.137:8080/nwgvynyayplzdkad/hjvnrupyw/tgrpudcxhduglli/orzxqya/327regsvr32.exe, 00000007.00000002.4270670203.000000000078A000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: malware
                      unknown
                      https://187.63.160.88:80/regsvr32.exe, 00000007.00000003.3101523836.000000000077A000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000003.3104301699.000000000077A000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: malware
                      unknown
                      https://72.15.201.15:8080/regsvr32.exe, 00000007.00000002.4270670203.000000000078A000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: malware
                      unknown
                      https://91.121.146.47:8080/regsvr32.exe, 00000007.00000003.3103601521.0000000000763000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000003.2798696588.0000000000763000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000003.3102709480.0000000000763000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000002.4270670203.0000000000763000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: malware
                      unknown
                      https://167.172.199.165:8080/nwgvynyayplzdkad/hjvnrupyw/tgrpudcxhduglli/orzxqya/regsvr32.exe, 00000007.00000003.3101523836.000000000077A000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000003.3104301699.000000000077A000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: malware
                      unknown
                      https://103.132.242.26:8080/regsvr32.exe, 00000007.00000002.4273374444.0000000002B74000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://103.43.75.120/0/regsvr32.exe, 00000007.00000002.4270670203.000000000078A000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: malware
                      unknown
                      https://159.65.88.10:8080/nwgvynyayplzdkad/hjvnrupyw/tgrpudcxhduglli/orzxqya/uregsvr32.exe, 00000007.00000002.4270670203.000000000078A000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: malware
                      unknown
                      https://103.43.75.120/080/dregsvr32.exe, 00000007.00000002.4270670203.000000000078A000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: malware
                      unknown
                      https://173.212.193.249:8080/ertregsvr32.exe, 00000007.00000002.4273374444.0000000002B74000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: malware
                      unknown
                      https://103.43.75.120/regsvr32.exe, 00000007.00000002.4273837270.0000000002CC7000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: malware
                      unknown
                      https://172.105.226.75:8080/nwgvynyayplzdkad/hjvnrupyw/tgrpudcxhduglli/orzxqya/Sregsvr32.exe, 00000007.00000002.4270670203.000000000078A000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: malware
                      unknown
                      https://173.212.193.249:8080/nwgvynyayplzdkad/hjvnrupyw/tgrpudcxhduglli/orzxqya/jregsvr32.exe, 00000007.00000002.4270670203.000000000078A000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: malware
                      unknown
                      https://183.111.227.137:8080/regsvr32.exe, 00000007.00000002.4273374444.0000000002B74000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: malware
                      unknown
                      https://66.228.32.31:7080/regsvr32.exe, 00000007.00000003.3103601521.0000000000763000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000003.3102709480.00000000007C6000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000002.4270670203.00000000007C6000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000003.3102709480.0000000000763000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: malware
                      unknown
                      https://103.43.75.120/nwgvynyayplzdkad/hjvnrupyw/tgrpudcxhduglli/orzxqya/xqya/regsvr32.exe, 00000007.00000002.4270670203.00000000007C6000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: malware
                      unknown
                      https://91.121.146.47:8080/nwgvynyayplzdkad/hjvnrupyw/tgrpudcxhduglli/orzxqya/regsvr32.exe, 00000007.00000003.3103601521.0000000000763000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000002.4270670203.00000000006EB000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000003.3102709480.0000000000763000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: malware
                      unknown
                      https://167.172.199.165:8080/regsvr32.exe, 00000007.00000003.3101418374.0000000002B74000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: malware
                      unknown
                      https://173.212.193.249:8080/regsvr32.exe, 00000007.00000002.4273374444.0000000002B74000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: malware
                      unknown
                      https://66.228.32.31:7080/Fregsvr32.exe, 00000007.00000003.3102709480.00000000007C6000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000002.4270670203.00000000007C6000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: malware
                      unknown
                      https://172.105.226.75:8080/nwgvynyayplzdkad/hjvnrupyw/tgrpudcxhduglli/orzxqya/dregsvr32.exe, 00000007.00000002.4270670203.000000000078A000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: malware
                      unknown
                      https://173.212.193.249:8080/nwgvynyayplzdkad/hjvnrupyw/tgrpudcxhduglli/orzxqya/regsvr32.exe, 00000007.00000002.4270670203.000000000078A000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: malware
                      unknown
                      https://172.105.226.75:8080/nwgvynyayplzdkad/hjvnrupyw/tgrpudcxhduglli/orzxqya/regsvr32.exe, 00000007.00000002.4270670203.000000000078A000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: malware
                      unknown
                      https://172.105.226.75:8080/icy)regsvr32.exe, 00000007.00000002.4273374444.0000000002B74000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: malware
                      unknown
                      https://103.43.75.120/nwgvynyayplzdkad/hjvnrupyw/tgrpudcxhduglli/orzxqya/kregsvr32.exe, 00000007.00000002.4270670203.000000000078A000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: malware
                      unknown
                      https://91.121.146.47:8080/nwgvynyayplzdkad/hjvnrupyw/tgrpudcxhduglli/orzxqya/Iregsvr32.exe, 00000007.00000003.2798696588.0000000000763000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: malware
                      unknown
                      • No. of IPs < 25%
                      • 25% < No. of IPs < 50%
                      • 50% < No. of IPs < 75%
                      • 75% < No. of IPs
                      IPDomainCountryFlagASNASN NameMalicious
                      110.232.117.186
                      unknownAustralia
                      56038RACKCORP-APRackCorpAUtrue
                      103.132.242.26
                      unknownIndia
                      45117INPL-IN-APIshansNetworkINtrue
                      104.168.155.143
                      unknownUnited States
                      54290HOSTWINDSUStrue
                      79.137.35.198
                      unknownFrance
                      16276OVHFRtrue
                      115.68.227.76
                      unknownKorea Republic of
                      38700SMILESERV-AS-KRSMILESERVKRtrue
                      163.44.196.120
                      unknownSingapore
                      135161GMO-Z-COM-THGMO-ZcomNetDesignHoldingsCoLtdSGtrue
                      206.189.28.199
                      unknownUnited States
                      14061DIGITALOCEAN-ASNUStrue
                      107.170.39.149
                      unknownUnited States
                      14061DIGITALOCEAN-ASNUStrue
                      66.228.32.31
                      unknownUnited States
                      63949LINODE-APLinodeLLCUStrue
                      185.4.135.165
                      unknownGreece
                      199246TOPHOSTGRtrue
                      197.242.150.244
                      unknownSouth Africa
                      37611AfrihostZAtrue
                      183.111.227.137
                      unknownKorea Republic of
                      4766KIXS-AS-KRKoreaTelecomKRtrue
                      45.176.232.124
                      unknownColombia
                      267869CABLEYTELECOMUNICACIONESDECOLOMBIASASCABLETELCOCtrue
                      169.57.156.166
                      unknownUnited States
                      36351SOFTLAYERUStrue
                      164.68.99.3
                      unknownGermany
                      51167CONTABODEtrue
                      139.59.126.41
                      unknownSingapore
                      14061DIGITALOCEAN-ASNUStrue
                      167.172.253.162
                      unknownUnited States
                      14061DIGITALOCEAN-ASNUStrue
                      167.172.199.165
                      unknownUnited States
                      14061DIGITALOCEAN-ASNUStrue
                      202.129.205.3
                      unknownThailand
                      45328NIPA-AS-THNIPATECHNOLOGYCOLTDTHtrue
                      147.139.166.154
                      unknownUnited States
                      45102CNNIC-ALIBABA-US-NET-APAlibabaUSTechnologyCoLtdCtrue
                      153.92.5.27
                      unknownGermany
                      47583AS-HOSTINGERLTtrue
                      159.65.88.10
                      unknownUnited States
                      14061DIGITALOCEAN-ASNUStrue
                      172.105.226.75
                      unknownUnited States
                      63949LINODE-APLinodeLLCUStrue
                      101.50.0.91
                      unknownIndonesia
                      55688BEON-AS-IDPTBeonIntermediaIDtrue
                      164.90.222.65
                      unknownUnited States
                      14061DIGITALOCEAN-ASNUStrue
                      213.239.212.5
                      unknownGermany
                      24940HETZNER-ASDEtrue
                      5.135.159.50
                      unknownFrance
                      16276OVHFRtrue
                      186.194.240.217
                      unknownBrazil
                      262733NetceteraTelecomunicacoesLtdaBRtrue
                      119.59.103.152
                      unknownThailand
                      56067METRABYTE-TH453LadplacoutJorakhaebuaTHtrue
                      159.89.202.34
                      unknownUnited States
                      14061DIGITALOCEAN-ASNUStrue
                      91.121.146.47
                      unknownFrance
                      16276OVHFRtrue
                      160.16.142.56
                      unknownJapan9370SAKURA-BSAKURAInternetIncJPtrue
                      201.94.166.162
                      unknownBrazil
                      28573CLAROSABRtrue
                      91.207.28.33
                      unknownKyrgyzstan
                      39819PROHOSTKGtrue
                      103.75.201.2
                      unknownThailand
                      133496CDNPLUSCOLTD-AS-APCDNPLUSCOLTDTHtrue
                      103.43.75.120
                      unknownJapan20473AS-CHOOPAUStrue
                      188.44.20.25
                      unknownMacedonia
                      57374GIV-ASMKtrue
                      45.235.8.30
                      unknownBrazil
                      267405WIKINETTELECOMUNICACOESBRtrue
                      153.126.146.25
                      unknownJapan7684SAKURA-ASAKURAInternetIncJPtrue
                      72.15.201.15
                      unknownUnited States
                      13649ASN-VINSUStrue
                      187.63.160.88
                      unknownBrazil
                      28169BITCOMPROVEDORDESERVICOSDEINTERNETLTDABRtrue
                      173.212.193.249
                      unknownGermany
                      51167CONTABODEtrue
                      82.223.21.224
                      unknownSpain
                      8560ONEANDONE-ASBrauerstrasse48DEtrue
                      95.217.221.146
                      unknownGermany
                      24940HETZNER-ASDEtrue
                      149.56.131.28
                      unknownCanada
                      16276OVHFRtrue
                      182.162.143.56
                      unknownKorea Republic of
                      3786LGDACOMLGDACOMCorporationKRtrue
                      1.234.2.232
                      unknownKorea Republic of
                      9318SKB-ASSKBroadbandCoLtdKRtrue
                      129.232.188.93
                      unknownSouth Africa
                      37153xneeloZAtrue
                      94.23.45.86
                      unknownFrance
                      16276OVHFRtrue
                      Joe Sandbox Version:37.0.0 Beryl
                      Analysis ID:828936
                      Start date and time:2023-03-17 17:52:24 +01:00
                      Joe Sandbox Product:CloudBasic
                      Overall analysis duration:0h 10m 53s
                      Hypervisor based Inspection enabled:false
                      Report type:light
                      Cookbook file name:default.jbs
                      Analysis system description:Windows 10 64 bit 20H2 Native physical Machine for testing VM-aware malware (Office 2019, IE 11, Chrome 93, Firefox 91, Adobe Reader DC 21, Java 8 Update 301
                      Number of analysed new started processes analysed:15
                      Number of new started drivers analysed:0
                      Number of existing processes analysed:0
                      Number of existing drivers analysed:0
                      Number of injected processes analysed:0
                      Technologies:
                      • HCA enabled
                      • EGA enabled
                      • HDC enabled
                      • AMSI enabled
                      Analysis Mode:default
                      Analysis stop reason:Timeout
                      Sample file name:aOHLlvfakv.dll
                      Detection:MAL
                      Classification:mal96.troj.evad.winDLL@18/2@0/49
                      EGA Information:
                      • Successful, ratio: 100%
                      HDC Information:
                      • Successful, ratio: 31.8% (good quality ratio 29.6%)
                      • Quality average: 77.1%
                      • Quality standard deviation: 27.3%
                      HCA Information:
                      • Successful, ratio: 69%
                      • Number of executed functions: 0
                      • Number of non-executed functions: 0
                      Cookbook Comments:
                      • Found application associated with file extension: .dll
                      • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
                      • Exclude process from analysis (whitelisted): dllhost.exe, RuntimeBroker.exe, WMIADAP.exe, backgroundTaskHost.exe
                      • TCP Packets have been reduced to 100
                      • Excluded IPs from analysis (whitelisted): 2.16.241.12, 2.16.241.4, 209.197.3.8
                      • Excluded domains from analysis (whitelisted): wdcpalt.microsoft.com, login.live.com, ctldl.windowsupdate.com, cds.d2s7q6s2.hwcdn.net, wdcp.microsoft.com, a767.dspw65.akamai.net, wu-bg-shim.trafficmanager.net, download.windowsupdate.com.edgesuite.net
                      • Not all processes where analyzed, report is missing behavior information
                      • Report creation exceeded maximum time and may have missing disassembly code information.
                      • Report size getting too big, too many NtOpenKeyEx calls found.
                      • Report size getting too big, too many NtProtectVirtualMemory calls found.
                      • Report size getting too big, too many NtQueryValueKey calls found.
                      No simulations
                      No context
                      No context
                      No context
                      No context
                      No context
                      Process:C:\Windows\System32\regsvr32.exe
                      File Type:Microsoft Cabinet archive data, Windows 2000/XP setup, 62582 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks, 0x1 compression
                      Category:dropped
                      Size (bytes):62582
                      Entropy (8bit):7.996063107774368
                      Encrypted:true
                      SSDEEP:1536:Jk3XPi43VgGp0gB2itudTSRAn/TWTdWftu:CHa43V5p022iZ4CgA
                      MD5:E71C8443AE0BC2E282C73FAEAD0A6DD3
                      SHA1:0C110C1B01E68EDFACAEAE64781A37B1995FA94B
                      SHA-256:95B0A5ACC5BF70D3ABDFD091D0C9F9063AA4FDE65BD34DBF16786082E1992E72
                      SHA-512:B38458C7FA2825AFB72794F374827403D5946B1132E136A0CE075DFD351277CF7D957C88DC8A1E4ADC3BCAE1FA8010DAE3831E268E910D517691DE24326391A6
                      Malicious:false
                      Preview:MSCF....v.......,...................I.................BVrl .authroot.stl....oJ5..CK..8U....a..3.1.P. J.".t..2F2e.dHH......$E.KB.2D..-SJE....^..'..y.}..,{m.....\...]4.G.......h....148...e.gr.....48:.L...g.....Xef.x:..t...J...6-....kW6Z>....&......ye.U.Q&z:.vZ..._....a...]..T.E.....B.h.,...[....V.O.3..EW.x.?.Q..$.@.W..=.B.f..8a.Y.JK..g./%p..C.4CD.s..Jd.u..@.g=...a.. .h%..'.xjy7.E..\.....A..':.4TdW?Ko3$.Hg.z.d~....../q..C.....`...A[ W(.........9...GZ.;....l&?........F...p?... .p.....{S.L4..v.+...7.T?.....p..`..&..9.......f...0+.L.....1.2b)..vX5L'.~....2vz.,E.Ni.{#...o..w.?.#.3..h.v<.S%.].tD@!Le.w.q.7.8....QW.FT.....hE.........Y............./.%Q...k...*.Y.n..v.A..../...>B..5\..-Ko.......O<.b.K.{.O.b...._.7...4.;%9N..K.X>......kg-9..r.c.g.G|.*[.-...HT...",?.q...ad....7RE.......!f..#../....?.-.^.K.c^...+{.g......]<..$.=.O....ii7.wJ+S..Z..d.....>..J*...T..Q7..`.r,<$....\d:K`..T.n....N.....C..j.;.1SX..j....1...R....+....Yg....]....3..9..S..D..`.
                      Process:C:\Windows\System32\regsvr32.exe
                      File Type:data
                      Category:modified
                      Size (bytes):328
                      Entropy (8bit):3.1213400513386125
                      Encrypted:false
                      SSDEEP:6:kKdjry/7UN+SkQlPlEGYRMY9z+4KlDA3RUecZUt:tCvkPlE99SNxAhUext
                      MD5:C9D0D1DB22CC93F91EA057685D74E8FA
                      SHA1:35513EECACA0F029FCDFCEC79FA528B80B6F9C64
                      SHA-256:66E217986722B5CC1E3EA7051722144A610F33534D1AD7F9923AF0C149C8DF04
                      SHA-512:086A420A12949D721D1F798D4DE4CF4BE29652A282B4658FB256F6CC53D0686D15BBE2BA303F4A17266D713816DB8AB4BB14A7BCE1E3CB1D60F3F5564211B094
                      Malicious:false
                      Preview:p...... .........7...X..(....................................................... ..........).K......&...........v...h.t.t.p.:././.c.t.l.d.l...w.i.n.d.o.w.s.u.p.d.a.t.e...c.o.m./.m.s.d.o.w.n.l.o.a.d./.u.p.d.a.t.e./.v.3./.s.t.a.t.i.c./.t.r.u.s.t.e.d.r./.e.n./.a.u.t.h.r.o.o.t.s.t.l...c.a.b...".0.d.2.f.9.2.9.a.7.4.b.d.9.1.:.0."...
                      File type:PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
                      Entropy (8bit):0.018845395989010114
                      TrID:
                      • Win64 Dynamic Link Library (generic) (102004/3) 58.55%
                      • InstallShield setup (43055/19) 24.71%
                      • Windows Screen Saver (13104/52) 7.52%
                      • Win64 Executable (generic) (12005/4) 6.89%
                      • Generic Win/DOS Executable (2004/3) 1.15%
                      File name:aOHLlvfakv.dll
                      File size:571122142
                      MD5:362f48619364efe57ecd00f83d1bca62
                      SHA1:ae142315393512fe3f3e03dc07aed88428b6e29b
                      SHA256:a873911592c3ce95d36e009f40bb376f587ad0ba6971a150a2ac10c87a2465f5
                      SHA512:1ed6695b6bfdce048697963812deafcde28f7c4397af824fc6ffeda03c5ad282b52728620bb2b81a2caa782a8e91f1e888687aaf1727323d2c8365edf8c9a33a
                      SSDEEP:
                      TLSH:
                      File Content Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7.......................................................................................................................................
                      Icon Hash:74f0e4ecccdce0e4
                      Entrypoint:0x401300
                      Entrypoint Section:.text
                      Digitally signed:false
                      Imagebase:0x400000
                      Subsystem:windows cui
                      Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, LARGE_ADDRESS_AWARE, DEBUG_STRIPPED, DLL
                      DLL Characteristics:
                      Time Stamp:0x64078C02 [Tue Mar 7 19:09:54 2023 UTC]
                      TLS Callbacks:
                      CLR (.Net) Version:
                      OS Version Major:5
                      OS Version Minor:2
                      File Version Major:5
                      File Version Minor:2
                      Subsystem Version Major:5
                      Subsystem Version Minor:2
                      Import Hash:c73bbc818ceb2fafea2b25df17dec187
                      Instruction
                      dec eax
                      sub esp, 28h
                      dec eax
                      mov eax, ecx
                      mov dword ptr [00050D8Bh], edx
                      dec esp
                      mov dword ptr [00050D88h], eax
                      dec eax
                      mov dword ptr [00050D75h], eax
                      dec eax
                      cmp edx, 01h
                      jne 00007FA2F0934601h
                      call 00007FA2F096A13Fh
                      call 00007FA2F0965CFAh
                      call 00007FA2F096A145h
                      dec eax
                      lea eax, dword ptr [00050CC9h]
                      dec eax
                      lea ecx, dword ptr [00047372h]
                      dec eax
                      mov dword ptr [eax+30h], ecx
                      dec eax
                      lea ecx, dword ptr [FFFFFCB7h]
                      dec eax
                      mov dword ptr [eax], ecx
                      dec eax
                      lea ecx, dword ptr [FFFFFF59h]
                      dec eax
                      mov dword ptr [eax+08h], ecx
                      dec eax
                      lea ecx, dword ptr [FFFFFF4Eh]
                      dec eax
                      mov dword ptr [eax+10h], ecx
                      dec eax
                      lea ecx, dword ptr [FFFFFF8Bh]
                      dec eax
                      mov dword ptr [eax+18h], ecx
                      dec eax
                      lea ecx, dword ptr [0004617Ch]
                      dec eax
                      mov dword ptr [eax+68h], ecx
                      dec eax
                      lea ecx, dword ptr [00046571h]
                      dec eax
                      mov dword ptr [eax+70h], ecx
                      dec eax
                      lea ecx, dword ptr [00046596h]
                      dec eax
                      mov dword ptr [eax+78h], ecx
                      dec eax
                      lea ecx, dword ptr [00046B3Bh]
                      dec eax
                      mov dword ptr [eax+00000080h], ecx
                      dec eax
                      lea ecx, dword ptr [0005D2EDh]
                      dec eax
                      mov dword ptr [eax+50h], ecx
                      mov dword ptr [eax+20h], 00000001h
                      dec eax
                      mov ecx, eax
                      dec eax
                      mov edx, dword ptr [00050CD8h]
                      inc esp
                      mov eax, dword ptr [00050CD9h]
                      dec esp
                      mov ecx, dword ptr [00050CD6h]
                      call 00007FA2F09346AAh
                      NameVirtual AddressVirtual Size Is in Section
                      IMAGE_DIRECTORY_ENTRY_EXPORT0x810000x69.edata
                      IMAGE_DIRECTORY_ENTRY_IMPORT0x800000xb38.idata
                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x820000x2be00.rsrc
                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x760000x3a38.pdata
                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                      IMAGE_DIRECTORY_ENTRY_BASERELOC0xae0000x11b4.reloc
                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                      NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                      .text0x10000x4c4c80x4c600False0.4390311732815057data6.348222298404593IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      .rodata0x4e0000x36000x3600False0.3231336805555556data5.09617814286108IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                      .data0x520000x22de00xe400False0.17931058114035087data2.348309483365582IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                      .tls0x750000x5d00x600False0.013020833333333334data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                      .pdata0x760000x3a380x3c00False0.4626953125data5.526910649754969IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .xdata0x7a0000x5fd00x6000False0.14701334635416666shared library4.906149317469979IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .idata0x800000xb380xc00False0.2919921875data3.959226833867136IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .edata0x810000x690x200False0.181640625data1.2134297058839834IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .rsrc0x820000x2be000x2be00False0.8775151353276354data7.859341694371929IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .reloc0xae0000x11b40x1200False0.6178385416666666data5.813939662419332IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ
                      NameRVASizeTypeLanguageCountry
                      VNRKGF0x821840xa2cdataEnglishUnited States
                      VNRKGF0x82bb00x2b000dataEnglishUnited States
                      RT_RCDATA0xadbb00x10data
                      RT_RCDATA0xadbc00x2dataEnglishUnited States
                      RT_VERSION0xadbc40x1f4dataEnglishUnited States
                      DLLImport
                      KERNEL32AddVectoredExceptionHandler, CloseHandle, CreateDirectoryA, CreateFileA, CreateFileW, DeleteCriticalSection, DeleteFileA, EnterCriticalSection, ExitProcess, FreeEnvironmentStringsA, GetACP, GetCPInfo, GetCurrentProcessId, GetCurrentThreadId, GetDateFormatA, GetEnvironmentStrings, GetFileAttributesA, GetFileAttributesW, GetFileSize, GetFileType, GetLastError, GetLocalTime, GetLocaleInfoA, GetModuleFileNameA, GetModuleHandleA, GetOEMCP, GetProcAddress, GetProcessHeap, GetStartupInfoA, GetStdHandle, GetStringTypeA, GetStringTypeW, GetSystemDefaultLangID, GetSystemInfo, GetTickCount, GetTimeZoneInformation, GetUserDefaultLCID, GetVersion, GetVersionExA, HeapAlloc, HeapFree, InitializeCriticalSection, InitializeCriticalSectionAndSpinCount, IsDBCSLeadByteEx, IsDebuggerPresent, IsValidLocale, LCMapStringA, LeaveCriticalSection, LoadLibraryA, LoadLibraryW, LocalFileTimeToFileTime, MultiByteToWideChar, RaiseException, ReadFile, RemoveDirectoryA, RemoveVectoredExceptionHandler, RtlCaptureContext, SetConsoleCtrlHandler, SetEndOfFile, SetFilePointer, SetFileTime, SetHandleCount, SetLastError, SetThreadLocale, Sleep, SleepEx, SystemTimeToFileTime, TlsAlloc, TlsFree, TlsGetValue, TlsSetValue, VirtualAlloc, VirtualFree, VirtualQuery, WideCharToMultiByte, WriteFile, RtlRestoreContext, RtlUnwindEx
                      USER32EnumThreadWindows, MessageBoxA, wsprintfA
                      NameOrdinalAddress
                      DllRegisterServer10x401da0
                      __CPPdebugHook20x474aa0
                      Language of compilation systemCountry where language is spokenMap
                      EnglishUnited States
                      TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                      192.168.11.2066.228.32.314982970802404330 03/17/23-17:55:08.721674TCP2404330ET CNC Feodo Tracker Reported CnC Server TCP group 16498297080192.168.11.2066.228.32.31
                      192.168.11.20104.168.155.1434983880802404302 03/17/23-17:55:40.214505TCP2404302ET CNC Feodo Tracker Reported CnC Server TCP group 2498388080192.168.11.20104.168.155.143
                      192.168.11.20167.172.199.1654983580802404308 03/17/23-17:55:30.717404TCP2404308ET CNC Feodo Tracker Reported CnC Server TCP group 5498358080192.168.11.20167.172.199.165
                      192.168.11.20164.90.222.65498374432404308 03/17/23-17:55:36.091806TCP2404308ET CNC Feodo Tracker Reported CnC Server TCP group 549837443192.168.11.20164.90.222.65
                      192.168.11.2091.121.146.474982780802404344 03/17/23-17:55:03.822964TCP2404344ET CNC Feodo Tracker Reported CnC Server TCP group 23498278080192.168.11.2091.121.146.47
                      192.168.11.20182.162.143.56498314432404312 03/17/23-17:55:16.470008TCP2404312ET CNC Feodo Tracker Reported CnC Server TCP group 749831443192.168.11.20182.162.143.56
                      TimestampSource PortDest PortSource IPDest IP
                      Mar 17, 2023 17:55:03.822963953 CET498278080192.168.11.2091.121.146.47
                      Mar 17, 2023 17:55:03.842253923 CET80804982791.121.146.47192.168.11.20
                      Mar 17, 2023 17:55:03.842469931 CET498278080192.168.11.2091.121.146.47
                      Mar 17, 2023 17:55:03.844355106 CET498278080192.168.11.2091.121.146.47
                      Mar 17, 2023 17:55:03.863508940 CET80804982791.121.146.47192.168.11.20
                      Mar 17, 2023 17:55:03.884574890 CET80804982791.121.146.47192.168.11.20
                      Mar 17, 2023 17:55:03.884633064 CET80804982791.121.146.47192.168.11.20
                      Mar 17, 2023 17:55:03.884812117 CET498278080192.168.11.2091.121.146.47
                      Mar 17, 2023 17:55:03.887244940 CET498278080192.168.11.2091.121.146.47
                      Mar 17, 2023 17:55:03.907407045 CET80804982791.121.146.47192.168.11.20
                      Mar 17, 2023 17:55:03.954986095 CET498278080192.168.11.2091.121.146.47
                      Mar 17, 2023 17:55:04.660682917 CET498278080192.168.11.2091.121.146.47
                      Mar 17, 2023 17:55:04.660682917 CET498278080192.168.11.2091.121.146.47
                      Mar 17, 2023 17:55:04.680037022 CET80804982791.121.146.47192.168.11.20
                      Mar 17, 2023 17:55:04.751033068 CET80804982791.121.146.47192.168.11.20
                      Mar 17, 2023 17:55:04.798549891 CET498278080192.168.11.2091.121.146.47
                      Mar 17, 2023 17:55:07.748513937 CET80804982791.121.146.47192.168.11.20
                      Mar 17, 2023 17:55:07.748599052 CET80804982791.121.146.47192.168.11.20
                      Mar 17, 2023 17:55:07.748816967 CET498278080192.168.11.2091.121.146.47
                      Mar 17, 2023 17:55:07.748817921 CET498278080192.168.11.2091.121.146.47
                      Mar 17, 2023 17:55:07.748817921 CET498278080192.168.11.2091.121.146.47
                      Mar 17, 2023 17:55:07.768208981 CET80804982791.121.146.47192.168.11.20
                      Mar 17, 2023 17:55:07.768244028 CET80804982791.121.146.47192.168.11.20
                      Mar 17, 2023 17:55:07.768269062 CET80804982791.121.146.47192.168.11.20
                      Mar 17, 2023 17:55:08.721673965 CET498297080192.168.11.2066.228.32.31
                      Mar 17, 2023 17:55:08.813566923 CET70804982966.228.32.31192.168.11.20
                      Mar 17, 2023 17:55:09.313343048 CET498297080192.168.11.2066.228.32.31
                      Mar 17, 2023 17:55:09.405122995 CET70804982966.228.32.31192.168.11.20
                      Mar 17, 2023 17:55:09.906966925 CET498297080192.168.11.2066.228.32.31
                      Mar 17, 2023 17:55:09.998740911 CET70804982966.228.32.31192.168.11.20
                      Mar 17, 2023 17:55:10.500451088 CET498297080192.168.11.2066.228.32.31
                      Mar 17, 2023 17:55:10.591742039 CET70804982966.228.32.31192.168.11.20
                      Mar 17, 2023 17:55:11.094125986 CET498297080192.168.11.2066.228.32.31
                      Mar 17, 2023 17:55:11.185641050 CET70804982966.228.32.31192.168.11.20
                      Mar 17, 2023 17:55:16.470007896 CET49831443192.168.11.20182.162.143.56
                      Mar 17, 2023 17:55:16.470108032 CET44349831182.162.143.56192.168.11.20
                      Mar 17, 2023 17:55:16.470316887 CET49831443192.168.11.20182.162.143.56
                      Mar 17, 2023 17:55:16.470504045 CET49831443192.168.11.20182.162.143.56
                      Mar 17, 2023 17:55:16.470545053 CET44349831182.162.143.56192.168.11.20
                      Mar 17, 2023 17:55:16.705921888 CET44349831182.162.143.56192.168.11.20
                      Mar 17, 2023 17:55:16.706535101 CET49832443192.168.11.20182.162.143.56
                      Mar 17, 2023 17:55:16.706639051 CET44349832182.162.143.56192.168.11.20
                      Mar 17, 2023 17:55:16.706866980 CET49832443192.168.11.20182.162.143.56
                      Mar 17, 2023 17:55:16.707146883 CET49832443192.168.11.20182.162.143.56
                      Mar 17, 2023 17:55:16.707223892 CET44349832182.162.143.56192.168.11.20
                      Mar 17, 2023 17:55:16.945801020 CET44349832182.162.143.56192.168.11.20
                      Mar 17, 2023 17:55:16.946307898 CET49833443192.168.11.20182.162.143.56
                      Mar 17, 2023 17:55:16.946396112 CET44349833182.162.143.56192.168.11.20
                      Mar 17, 2023 17:55:16.946610928 CET49833443192.168.11.20182.162.143.56
                      Mar 17, 2023 17:55:16.946799040 CET49833443192.168.11.20182.162.143.56
                      Mar 17, 2023 17:55:16.947004080 CET44349833182.162.143.56192.168.11.20
                      Mar 17, 2023 17:55:16.947177887 CET49833443192.168.11.20182.162.143.56
                      Mar 17, 2023 17:55:22.222096920 CET4983480192.168.11.20187.63.160.88
                      Mar 17, 2023 17:55:22.442723036 CET8049834187.63.160.88192.168.11.20
                      Mar 17, 2023 17:55:22.950834990 CET4983480192.168.11.20187.63.160.88
                      Mar 17, 2023 17:55:23.171304941 CET8049834187.63.160.88192.168.11.20
                      Mar 17, 2023 17:55:23.685240030 CET4983480192.168.11.20187.63.160.88
                      Mar 17, 2023 17:55:23.905503988 CET8049834187.63.160.88192.168.11.20
                      Mar 17, 2023 17:55:24.419260979 CET4983480192.168.11.20187.63.160.88
                      Mar 17, 2023 17:55:24.639291048 CET8049834187.63.160.88192.168.11.20
                      Mar 17, 2023 17:55:25.153383970 CET4983480192.168.11.20187.63.160.88
                      Mar 17, 2023 17:55:25.373801947 CET8049834187.63.160.88192.168.11.20
                      Mar 17, 2023 17:55:30.717403889 CET498358080192.168.11.20167.172.199.165
                      Mar 17, 2023 17:55:30.877808094 CET808049835167.172.199.165192.168.11.20
                      Mar 17, 2023 17:55:30.878029108 CET498358080192.168.11.20167.172.199.165
                      Mar 17, 2023 17:55:30.878396034 CET498358080192.168.11.20167.172.199.165
                      Mar 17, 2023 17:55:31.038242102 CET808049835167.172.199.165192.168.11.20
                      Mar 17, 2023 17:55:31.048325062 CET808049835167.172.199.165192.168.11.20
                      Mar 17, 2023 17:55:31.048401117 CET808049835167.172.199.165192.168.11.20
                      Mar 17, 2023 17:55:31.048665047 CET498358080192.168.11.20167.172.199.165
                      Mar 17, 2023 17:55:31.051322937 CET498358080192.168.11.20167.172.199.165
                      Mar 17, 2023 17:55:31.212112904 CET808049835167.172.199.165192.168.11.20
                      Mar 17, 2023 17:55:31.213166952 CET498358080192.168.11.20167.172.199.165
                      Mar 17, 2023 17:55:31.415318966 CET808049835167.172.199.165192.168.11.20
                      Mar 17, 2023 17:55:32.039026022 CET808049835167.172.199.165192.168.11.20
                      Mar 17, 2023 17:55:32.089509964 CET498358080192.168.11.20167.172.199.165
                      Mar 17, 2023 17:55:35.039800882 CET808049835167.172.199.165192.168.11.20
                      Mar 17, 2023 17:55:35.039868116 CET808049835167.172.199.165192.168.11.20
                      Mar 17, 2023 17:55:35.040082932 CET498358080192.168.11.20167.172.199.165
                      Mar 17, 2023 17:55:35.040082932 CET498358080192.168.11.20167.172.199.165
                      Mar 17, 2023 17:55:35.040082932 CET498358080192.168.11.20167.172.199.165
                      Mar 17, 2023 17:55:35.199883938 CET808049835167.172.199.165192.168.11.20
                      Mar 17, 2023 17:55:35.199937105 CET808049835167.172.199.165192.168.11.20
                      Mar 17, 2023 17:55:35.966129065 CET49837443192.168.11.20164.90.222.65
                      Mar 17, 2023 17:55:35.966291904 CET44349837164.90.222.65192.168.11.20
                      Mar 17, 2023 17:55:35.966497898 CET49837443192.168.11.20164.90.222.65
                      Mar 17, 2023 17:55:35.966687918 CET49837443192.168.11.20164.90.222.65
                      Mar 17, 2023 17:55:35.966737032 CET44349837164.90.222.65192.168.11.20
                      Mar 17, 2023 17:55:36.087966919 CET44349837164.90.222.65192.168.11.20
                      Mar 17, 2023 17:55:36.088268042 CET49837443192.168.11.20164.90.222.65
                      Mar 17, 2023 17:55:36.089459896 CET49837443192.168.11.20164.90.222.65
                      Mar 17, 2023 17:55:36.089535952 CET44349837164.90.222.65192.168.11.20
                      Mar 17, 2023 17:55:36.090668917 CET44349837164.90.222.65192.168.11.20
                      Mar 17, 2023 17:55:36.091527939 CET49837443192.168.11.20164.90.222.65
                      Mar 17, 2023 17:55:36.132508039 CET44349837164.90.222.65192.168.11.20
                      Mar 17, 2023 17:55:36.291066885 CET44349837164.90.222.65192.168.11.20
                      Mar 17, 2023 17:55:36.291352987 CET44349837164.90.222.65192.168.11.20
                      Mar 17, 2023 17:55:36.291520119 CET49837443192.168.11.20164.90.222.65
                      Mar 17, 2023 17:55:36.292974949 CET49837443192.168.11.20164.90.222.65
                      Mar 17, 2023 17:55:36.292974949 CET49837443192.168.11.20164.90.222.65
                      TimestampSource IPDest IPChecksumCodeType
                      Mar 17, 2023 17:56:37.473143101 CET103.132.242.26192.168.11.202278(Unknown)Destination Unreachable
                      Mar 17, 2023 17:56:38.486097097 CET103.132.242.26192.168.11.202278(Unknown)Destination Unreachable
                      Mar 17, 2023 17:56:40.502083063 CET103.132.242.26192.168.11.202278(Unknown)Destination Unreachable
                      Mar 17, 2023 17:56:44.516495943 CET103.132.242.26192.168.11.202278(Unknown)Destination Unreachable
                      • 164.90.222.65

                      Click to jump to process

                      Target ID:0
                      Start time:17:54:25
                      Start date:17/03/2023
                      Path:C:\Windows\System32\loaddll64.exe
                      Wow64 process (32bit):false
                      Commandline:loaddll64.exe "C:\Users\user\Desktop\aOHLlvfakv.dll"
                      Imagebase:0x7ff64c450000
                      File size:139776 bytes
                      MD5 hash:C676FC0263EDD17D4CE7D644B8F3FCD6
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high

                      Target ID:1
                      Start time:17:54:25
                      Start date:17/03/2023
                      Path:C:\Windows\System32\conhost.exe
                      Wow64 process (32bit):false
                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Imagebase:0x7ff6ca940000
                      File size:875008 bytes
                      MD5 hash:81CA40085FC75BABD2C91D18AA9FFA68
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high

                      Target ID:2
                      Start time:17:54:26
                      Start date:17/03/2023
                      Path:C:\Windows\System32\cmd.exe
                      Wow64 process (32bit):false
                      Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\aOHLlvfakv.dll",#1
                      Imagebase:0x7ff7a07d0000
                      File size:289792 bytes
                      MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:moderate

                      Target ID:3
                      Start time:17:54:26
                      Start date:17/03/2023
                      Path:C:\Windows\System32\regsvr32.exe
                      Wow64 process (32bit):false
                      Commandline:regsvr32.exe /s C:\Users\user\Desktop\aOHLlvfakv.dll
                      Imagebase:0x7ff642830000
                      File size:25088 bytes
                      MD5 hash:B0C2FA35D14A9FAD919E99D9D75E1B9E
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Yara matches:
                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000003.00000002.2442904998.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000003.00000002.2442401873.0000000002D30000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                      Reputation:moderate

                      Target ID:4
                      Start time:17:54:26
                      Start date:17/03/2023
                      Path:C:\Windows\System32\rundll32.exe
                      Wow64 process (32bit):false
                      Commandline:rundll32.exe "C:\Users\user\Desktop\aOHLlvfakv.dll",#1
                      Imagebase:0x7ff660480000
                      File size:71680 bytes
                      MD5 hash:EF3179D498793BF4234F708D3BE28633
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Yara matches:
                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000004.00000002.2442517269.0000029592A20000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000004.00000002.2440693096.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
                      Reputation:moderate

                      Target ID:5
                      Start time:17:54:26
                      Start date:17/03/2023
                      Path:C:\Windows\System32\rundll32.exe
                      Wow64 process (32bit):false
                      Commandline:rundll32.exe C:\Users\user\Desktop\aOHLlvfakv.dll,DllRegisterServer
                      Imagebase:0x7ff660480000
                      File size:71680 bytes
                      MD5 hash:EF3179D498793BF4234F708D3BE28633
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Yara matches:
                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000005.00000002.2440735305.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000005.00000002.2442528537.0000025313BA0000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                      Reputation:moderate

                      Target ID:7
                      Start time:17:54:27
                      Start date:17/03/2023
                      Path:C:\Windows\System32\regsvr32.exe
                      Wow64 process (32bit):false
                      Commandline:C:\Windows\system32\regsvr32.exe "C:\Windows\system32\JAnzBeoSOFkqX\hUQcK.dll"
                      Imagebase:0x7ff642830000
                      File size:25088 bytes
                      MD5 hash:B0C2FA35D14A9FAD919E99D9D75E1B9E
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Yara matches:
                      • Rule: JoeSecurity_Emotet_3, Description: Yara detected Emotet, Source: 00000007.00000002.4270670203.00000000006EB000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000007.00000002.4274390875.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000007.00000002.4271871616.0000000000A10000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security

                      Target ID:8
                      Start time:17:54:27
                      Start date:17/03/2023
                      Path:C:\Windows\System32\regsvr32.exe
                      Wow64 process (32bit):false
                      Commandline:C:\Windows\system32\regsvr32.exe "C:\Windows\system32\FAAMB\YSmuMEqbrrG.dll"
                      Imagebase:0x7ff642830000
                      File size:25088 bytes
                      MD5 hash:B0C2FA35D14A9FAD919E99D9D75E1B9E
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language

                      Target ID:9
                      Start time:17:54:27
                      Start date:17/03/2023
                      Path:C:\Windows\System32\regsvr32.exe
                      Wow64 process (32bit):false
                      Commandline:C:\Windows\system32\regsvr32.exe "C:\Windows\system32\SAolKOHOGzImreJl\DHZYcsMibMOGCXWD.dll"
                      Imagebase:0x7ff642830000
                      File size:25088 bytes
                      MD5 hash:B0C2FA35D14A9FAD919E99D9D75E1B9E
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language

                      Target ID:10
                      Start time:17:54:29
                      Start date:17/03/2023
                      Path:C:\Windows\System32\rundll32.exe
                      Wow64 process (32bit):false
                      Commandline:rundll32.exe C:\Users\user\Desktop\aOHLlvfakv.dll,__CPPdebugHook
                      Imagebase:0x7ff660480000
                      File size:71680 bytes
                      MD5 hash:EF3179D498793BF4234F708D3BE28633
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language

                      No disassembly