Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
pzG0rkIchr.exe

Overview

General Information

Sample Name:pzG0rkIchr.exe (renamed file extension from exe to dll)
Analysis ID:752975
MD5:d6ef4778f7dc9c31a0a2a989ef42d2fd
SHA1:5dad8394ef37d5a006674589754f7a3187d303b1
SHA256:54de1f2c26a63a8f6b7f8d5de99f8ebd4093959ab07f027db1985d0652258736
Tags:exeLDR4
Infos:

Detection

Ursnif
Score:84
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Yara detected Ursnif
Multi AV Scanner detection for submitted file
System process connects to network (likely due to code injection or exploit)
Antivirus detection for URL or domain
Snort IDS alert for network traffic
Performs DNS queries to domains with low reputation
One or more processes crash
Contains functionality to check if a debugger is running (IsDebuggerPresent)
May sleep (evasive loops) to hinder dynamic analysis
Internet Provider seen in connection with other malware
Detected potential crypto function
Contains functionality to query CPU information (cpuid)
Sample execution stops while process was sleeping (likely an evasion)
Contains functionality to call native functions
Contains functionality to dynamically determine API calls
Contains functionality which may be used to detect a debugger (GetProcessHeap)
IP address seen in connection with other malware
Tries to load missing DLLs
Checks if the current process is being debugged
Registers a DLL
Launches processes in debugging mode, may be used to hinder debugging
Found large amount of non-executed APIs
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • loaddll64.exe (PID: 492 cmdline: loaddll64.exe "C:\Users\user\Desktop\pzG0rkIchr.dll" MD5: C676FC0263EDD17D4CE7D644B8F3FCD6)
    • conhost.exe (PID: 5284 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • cmd.exe (PID: 5156 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\pzG0rkIchr.dll",#1 MD5: 4E2ACF4F8A396486AB4268C94A6A245F)
      • rundll32.exe (PID: 1228 cmdline: rundll32.exe "C:\Users\user\Desktop\pzG0rkIchr.dll",#1 MD5: 73C519F050C20580F8A62C849D49215A)
    • regsvr32.exe (PID: 5172 cmdline: regsvr32.exe /s C:\Users\user\Desktop\pzG0rkIchr.dll MD5: D78B75FC68247E8A63ACBA846182740E)
    • rundll32.exe (PID: 400 cmdline: rundll32.exe C:\Users\user\Desktop\pzG0rkIchr.dll,DllRegisterServer MD5: 73C519F050C20580F8A62C849D49215A)
    • rundll32.exe (PID: 2100 cmdline: rundll32.exe C:\Users\user\Desktop\pzG0rkIchr.dll,ItsnPq5v MD5: 73C519F050C20580F8A62C849D49215A)
      • WerFault.exe (PID: 5904 cmdline: C:\Windows\system32\WerFault.exe -u -p 2100 -s 304 MD5: 2AFFE478D86272288BBEF5A00BBEF6A0)
      • WerFault.exe (PID: 5968 cmdline: C:\Windows\system32\WerFault.exe -u -p 2100 -s 304 MD5: 2AFFE478D86272288BBEF5A00BBEF6A0)
    • rundll32.exe (PID: 1308 cmdline: rundll32.exe C:\Users\user\Desktop\pzG0rkIchr.dll,QlqYo259k MD5: 73C519F050C20580F8A62C849D49215A)
      • WerFault.exe (PID: 5188 cmdline: C:\Windows\system32\WerFault.exe -u -p 1308 -s 304 MD5: 2AFFE478D86272288BBEF5A00BBEF6A0)
      • WerFault.exe (PID: 3260 cmdline: C:\Windows\system32\WerFault.exe -u -p 1308 -s 304 MD5: 2AFFE478D86272288BBEF5A00BBEF6A0)
  • cleanup
{"c2_domain": ["https://gigimas.xyz", "https://reaso.xyz"], "botnet": "202206061", "aes key": "eq2opFFpGzpd2p9t", "sleep time": "20", "request time": "30", "host keep time": "120", "host shift time": "120"}
SourceRuleDescriptionAuthorStrings
Process Memory Space: loaddll64.exe PID: 492JoeSecurity_Ursnifv4Yara detected UrsnifJoe Security
    Process Memory Space: regsvr32.exe PID: 5172JoeSecurity_Ursnifv4Yara detected UrsnifJoe Security
      Process Memory Space: rundll32.exe PID: 1228JoeSecurity_Ursnifv4Yara detected UrsnifJoe Security
        Process Memory Space: rundll32.exe PID: 400JoeSecurity_Ursnifv4Yara detected UrsnifJoe Security
          No Sigma rule has matched
          Timestamp:192.168.2.48.8.8.864906532039645 11/24/22-05:22:35.810533
          SID:2039645
          Source Port:64906
          Destination Port:53
          Protocol:UDP
          Classtype:A Network Trojan was detected
          Timestamp:192.168.2.48.8.8.861007532039645 11/24/22-05:20:02.978332
          SID:2039645
          Source Port:61007
          Destination Port:53
          Protocol:UDP
          Classtype:A Network Trojan was detected
          Timestamp:192.168.2.48.8.8.861124532039645 11/24/22-05:21:04.451832
          SID:2039645
          Source Port:61124
          Destination Port:53
          Protocol:UDP
          Classtype:A Network Trojan was detected
          Timestamp:192.168.2.48.8.8.859444532039645 11/24/22-05:21:34.871041
          SID:2039645
          Source Port:59444
          Destination Port:53
          Protocol:UDP
          Classtype:A Network Trojan was detected
          Timestamp:192.168.2.48.8.8.855570532039645 11/24/22-05:22:05.359167
          SID:2039645
          Source Port:55570
          Destination Port:53
          Protocol:UDP
          Classtype:A Network Trojan was detected
          Timestamp:192.168.2.48.8.8.860686532039645 11/24/22-05:20:33.386749
          SID:2039645
          Source Port:60686
          Destination Port:53
          Protocol:UDP
          Classtype:A Network Trojan was detected
          Timestamp:192.168.2.48.8.8.859446532039645 11/24/22-05:23:06.390786
          SID:2039645
          Source Port:59446
          Destination Port:53
          Protocol:UDP
          Classtype:A Network Trojan was detected

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: pzG0rkIchr.dllReversingLabs: Detection: 73%
          Source: https://reaso.xyzAvira URL Cloud: Label: malware
          Source: 3.3.regsvr32.exe.6cf200.1.raw.unpackMalware Configuration Extractor: Ursnif {"c2_domain": ["https://gigimas.xyz", "https://reaso.xyz"], "botnet": "202206061", "aes key": "eq2opFFpGzpd2p9t", "sleep time": "20", "request time": "30", "host keep time": "120", "host shift time": "120"}
          Source: pzG0rkIchr.dllStatic PE information: certificate valid
          Source: pzG0rkIchr.dllStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
          Source: Binary string: UxTheme.pdb source: WerFault.exe, 0000000B.00000003.395877568.000001716E477000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 0000000B.00000003.396307800.000001716E477000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 0000000C.00000003.396853459.000001DFB5E17000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 0000000C.00000003.396775988.000001DFB5E17000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: gdi32.pdb source: WerFault.exe, 0000000B.00000003.396163566.000001716E474000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 0000000B.00000003.395867216.000001716E471000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 0000000C.00000003.396822650.000001DFB5E14000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 0000000C.00000003.396760863.000001DFB5E11000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: kernelbase.pdb0 source: WerFault.exe, 0000000B.00000003.392399774.000001716D896000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 0000000C.00000003.390485617.000001DFB52D7000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 0000000C.00000003.392399063.000001DFB52D7000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: bcryptprimitives.pdb8 source: WerFault.exe, 0000000B.00000003.395867216.000001716E471000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 0000000C.00000003.396760863.000001DFB5E11000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: sechost.pdb source: WerFault.exe, 0000000B.00000003.395877568.000001716E477000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 0000000B.00000003.396307800.000001716E477000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 0000000C.00000003.396853459.000001DFB5E17000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 0000000C.00000003.396775988.000001DFB5E17000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: rpcrt4.pdb source: WerFault.exe, 0000000B.00000003.395867216.000001716E471000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 0000000C.00000003.396760863.000001DFB5E11000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: dwmapi.pdb: source: WerFault.exe, 0000000C.00000003.396853459.000001DFB5E17000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 0000000C.00000003.396775988.000001DFB5E17000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: se.pdb\ source: WerFault.exe, 0000000C.00000002.404139284.000001DFB33E2000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: ucrtbase.pdb source: WerFault.exe, 0000000B.00000003.395867216.000001716E471000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 0000000C.00000003.396760863.000001DFB5E11000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: kernelbase.pdb8 source: WerFault.exe, 0000000B.00000003.395867216.000001716E471000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 0000000C.00000003.396760863.000001DFB5E11000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: ucrtbase.pdb8 source: WerFault.exe, 0000000B.00000003.395867216.000001716E471000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 0000000C.00000003.396760863.000001DFB5E11000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: shcore.pdb8 source: WerFault.exe, 0000000B.00000003.395867216.000001716E471000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 0000000C.00000003.396760863.000001DFB5E11000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: msvcrt.pdb source: WerFault.exe, 0000000B.00000003.395867216.000001716E471000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 0000000C.00000003.396760863.000001DFB5E11000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: combase.pdb8 source: WerFault.exe, 0000000B.00000003.395867216.000001716E471000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 0000000C.00000003.396760863.000001DFB5E11000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: win32u.pdb8 source: WerFault.exe, 0000000B.00000003.396163566.000001716E474000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 0000000B.00000003.395867216.000001716E471000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 0000000C.00000003.396822650.000001DFB5E14000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 0000000C.00000003.396760863.000001DFB5E11000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: se.pdb( source: WerFault.exe, 0000000B.00000002.404499737.000001716B9D2000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: oleaut32.pdb6 source: WerFault.exe, 0000000C.00000003.396853459.000001DFB5E17000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 0000000C.00000003.396775988.000001DFB5E17000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: shcore.pdb source: WerFault.exe, 0000000B.00000003.395867216.000001716E471000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 0000000C.00000003.396760863.000001DFB5E11000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: UxTheme.pdb" source: WerFault.exe, 0000000C.00000003.396853459.000001DFB5E17000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 0000000C.00000003.396775988.000001DFB5E17000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: msctf.pdb source: WerFault.exe, 0000000B.00000003.395877568.000001716E477000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 0000000B.00000003.396307800.000001716E477000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 0000000C.00000003.396853459.000001DFB5E17000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 0000000C.00000003.396775988.000001DFB5E17000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: gdi32full.pdb8 source: WerFault.exe, 0000000B.00000003.396163566.000001716E474000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 0000000B.00000003.395867216.000001716E471000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 0000000C.00000003.396822650.000001DFB5E14000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 0000000C.00000003.396760863.000001DFB5E11000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: gdi32.pdb8 source: WerFault.exe, 0000000B.00000003.396163566.000001716E474000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 0000000B.00000003.395867216.000001716E471000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 0000000C.00000003.396822650.000001DFB5E14000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 0000000C.00000003.396760863.000001DFB5E11000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: user32.pdb source: WerFault.exe, 0000000B.00000003.395867216.000001716E471000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 0000000C.00000003.396760863.000001DFB5E11000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: msvcp_win.pdb source: WerFault.exe, 0000000B.00000003.396118866.000001716E470000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 0000000C.00000003.396815765.000001DFB5E10000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: rundll32.pdb8 source: WerFault.exe, 0000000B.00000003.395867216.000001716E471000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 0000000C.00000003.396760863.000001DFB5E11000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: .pdbU source: WerFault.exe, 0000000B.00000002.404499737.000001716B9D2000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: rpcrt4.pdb8 source: WerFault.exe, 0000000B.00000003.395867216.000001716E471000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 0000000C.00000003.396760863.000001DFB5E11000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: bcryptprimitives.pdb source: WerFault.exe, 0000000B.00000003.395867216.000001716E471000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 0000000C.00000003.396760863.000001DFB5E11000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: imagehlp.pdb8 source: WerFault.exe, 0000000B.00000003.395867216.000001716E471000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 0000000C.00000003.396760863.000001DFB5E11000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: ntdll.pdb source: WerFault.exe, 0000000B.00000003.390149544.000001716D88A000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 0000000B.00000003.393542297.000001716D88A000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 0000000B.00000003.395867216.000001716E471000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 0000000C.00000003.390425076.000001DFB52CA000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 0000000C.00000003.393721593.000001DFB52CA000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 0000000C.00000003.396760863.000001DFB5E11000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: combase.pdb source: WerFault.exe, 0000000B.00000003.395867216.000001716E471000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 0000000C.00000003.396760863.000001DFB5E11000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: kernel32.pdb source: WerFault.exe, 0000000B.00000003.390201513.000001716D890000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 0000000B.00000003.392963034.000001716D890000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 0000000B.00000003.395867216.000001716E471000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 0000000C.00000003.390462142.000001DFB52D1000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 0000000C.00000003.393053418.000001DFB52D1000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 0000000C.00000003.396760863.000001DFB5E11000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: rundll32.pdb source: WerFault.exe, 0000000B.00000003.390045053.000001716D884000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 0000000B.00000003.389884691.000001716D918000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 0000000B.00000003.395867216.000001716E471000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 0000000C.00000003.390315024.000001DFB52C4000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 0000000C.00000003.396760863.000001DFB5E11000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 0000000C.00000003.390223237.000001DFB5359000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: se.pdb source: WerFault.exe, 0000000B.00000002.404499737.000001716B9D2000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 0000000C.00000002.404139284.000001DFB33E2000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: msvcrt.pdb8 source: WerFault.exe, 0000000B.00000003.395867216.000001716E471000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 0000000C.00000003.396760863.000001DFB5E11000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: oleaut32.pdb source: WerFault.exe, 0000000B.00000003.395877568.000001716E477000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 0000000B.00000003.396307800.000001716E477000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 0000000C.00000003.396853459.000001DFB5E17000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 0000000C.00000003.396775988.000001DFB5E17000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: ntdll.pdb8 source: WerFault.exe, 0000000B.00000003.395867216.000001716E471000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 0000000C.00000003.396760863.000001DFB5E11000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: imagehlp.pdb source: WerFault.exe, 0000000B.00000003.395867216.000001716E471000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 0000000C.00000003.396760863.000001DFB5E11000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: win32u.pdb source: WerFault.exe, 0000000B.00000003.396163566.000001716E474000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 0000000B.00000003.395867216.000001716E471000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 0000000C.00000003.396822650.000001DFB5E14000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 0000000C.00000003.396760863.000001DFB5E11000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: gdi32full.pdb source: WerFault.exe, 0000000B.00000003.396163566.000001716E474000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 0000000B.00000003.395867216.000001716E471000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 0000000C.00000003.396822650.000001DFB5E14000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 0000000C.00000003.396760863.000001DFB5E11000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: kernel32.pdb8 source: WerFault.exe, 0000000B.00000003.395867216.000001716E471000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 0000000C.00000003.396760863.000001DFB5E11000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: user32.pdb8 source: WerFault.exe, 0000000B.00000003.395867216.000001716E471000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 0000000C.00000003.396760863.000001DFB5E11000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: dwmapi.pdb source: WerFault.exe, 0000000B.00000003.395877568.000001716E477000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 0000000B.00000003.396307800.000001716E477000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 0000000C.00000003.396853459.000001DFB5E17000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 0000000C.00000003.396775988.000001DFB5E17000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: ntdll.pdb0 source: WerFault.exe, 0000000B.00000003.390149544.000001716D88A000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 0000000B.00000003.393542297.000001716D88A000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 0000000C.00000003.390425076.000001DFB52CA000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 0000000C.00000003.393721593.000001DFB52CA000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: kernelbase.pdb source: WerFault.exe, 0000000B.00000003.392399774.000001716D896000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 0000000B.00000003.395867216.000001716E471000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 0000000C.00000003.390485617.000001DFB52D7000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 0000000C.00000003.392399063.000001DFB52D7000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 0000000C.00000003.396760863.000001DFB5E11000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: kernel32.pdb0 source: WerFault.exe, 0000000B.00000003.390201513.000001716D890000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 0000000B.00000003.392963034.000001716D890000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 0000000C.00000003.390462142.000001DFB52D1000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 0000000C.00000003.393053418.000001DFB52D1000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: imm32.pdb source: WerFault.exe, 0000000B.00000003.396118866.000001716E470000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 0000000C.00000003.396815765.000001DFB5E10000.00000004.00000020.00020000.00000000.sdmp
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FF88C07FB70 FindFirstFileExA,
          Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00007FF88C07FB70 FindFirstFileExA,
          Source: C:\Windows\System32\rundll32.exeCode function: 6_2_00007FF88C07FB70 FindFirstFileExA,

          Networking

          barindex
          Source: C:\Windows\System32\rundll32.exeNetwork Connect: 185.250.148.35 443
          Source: C:\Windows\System32\rundll32.exeDomain query: gigimas.xyz
          Source: TrafficSnort IDS: 2039645 ET TROJAN Observed DNS Query to Ursnif Domain (gigimas .xyz) 192.168.2.4:61007 -> 8.8.8.8:53
          Source: TrafficSnort IDS: 2039645 ET TROJAN Observed DNS Query to Ursnif Domain (gigimas .xyz) 192.168.2.4:60686 -> 8.8.8.8:53
          Source: TrafficSnort IDS: 2039645 ET TROJAN Observed DNS Query to Ursnif Domain (gigimas .xyz) 192.168.2.4:61124 -> 8.8.8.8:53
          Source: TrafficSnort IDS: 2039645 ET TROJAN Observed DNS Query to Ursnif Domain (gigimas .xyz) 192.168.2.4:59444 -> 8.8.8.8:53
          Source: TrafficSnort IDS: 2039645 ET TROJAN Observed DNS Query to Ursnif Domain (gigimas .xyz) 192.168.2.4:55570 -> 8.8.8.8:53
          Source: TrafficSnort IDS: 2039645 ET TROJAN Observed DNS Query to Ursnif Domain (gigimas .xyz) 192.168.2.4:64906 -> 8.8.8.8:53
          Source: TrafficSnort IDS: 2039645 ET TROJAN Observed DNS Query to Ursnif Domain (gigimas .xyz) 192.168.2.4:59446 -> 8.8.8.8:53
          Source: C:\Windows\System32\rundll32.exeDNS query: gigimas.xyz
          Source: C:\Windows\System32\rundll32.exeDNS query: gigimas.xyz
          Source: C:\Windows\System32\rundll32.exeDNS query: gigimas.xyz
          Source: C:\Windows\System32\rundll32.exeDNS query: gigimas.xyz
          Source: C:\Windows\System32\rundll32.exeDNS query: gigimas.xyz
          Source: C:\Windows\System32\rundll32.exeDNS query: gigimas.xyz
          Source: C:\Windows\System32\rundll32.exeDNS query: gigimas.xyz
          Source: Joe Sandbox ViewASN Name: FIRSTDC-ASRU FIRSTDC-ASRU
          Source: Joe Sandbox ViewIP Address: 185.250.148.35 185.250.148.35
          Source: unknownNetwork traffic detected: HTTP traffic on port 49708 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49733 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49710 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49727 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49720 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49713 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49717 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49733
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49732
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49731
          Source: unknownNetwork traffic detected: HTTP traffic on port 49707 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
          Source: unknownNetwork traffic detected: HTTP traffic on port 49732 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49711 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49724 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49728 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49721 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49729
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49728
          Source: unknownNetwork traffic detected: HTTP traffic on port 49714 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49727
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49726
          Source: unknownNetwork traffic detected: HTTP traffic on port 49718 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49725
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49724
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49723
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49722
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49721
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49720
          Source: unknownNetwork traffic detected: HTTP traffic on port 49706 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49731 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49712 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49725 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49729 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49719 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49722 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49719
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49718
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49717
          Source: unknownNetwork traffic detected: HTTP traffic on port 49715 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49716
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49715
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49714
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49713
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49712
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49711
          Source: unknownNetwork traffic detected: HTTP traffic on port 49709 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49710
          Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49726 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49723 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49709
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49708
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49707
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49706
          Source: unknownNetwork traffic detected: HTTP traffic on port 49716 -> 443
          Source: pzG0rkIchr.dllString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl04
          Source: WerFault.exe, 0000000B.00000002.405055392.000001716D880000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 0000000C.00000002.404603896.000001DFB52C0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
          Source: WerFault.exe, 0000000B.00000002.405055392.000001716D880000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 0000000C.00000002.404603896.000001DFB52C0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
          Source: pzG0rkIchr.dllString found in binary or memory: http://crl.sectigo.com/SectigoPublicCodeSigningCAR36.crl0y
          Source: pzG0rkIchr.dllString found in binary or memory: http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0
          Source: pzG0rkIchr.dllString found in binary or memory: http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t
          Source: pzG0rkIchr.dllString found in binary or memory: http://crt.sectigo.com/SectigoPublicCodeSigningCAR36.crt0#
          Source: pzG0rkIchr.dllString found in binary or memory: http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#
          Source: pzG0rkIchr.dllString found in binary or memory: http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#
          Source: pzG0rkIchr.dllString found in binary or memory: http://ocsp.comodoca.com0
          Source: pzG0rkIchr.dllString found in binary or memory: http://ocsp.sectigo.com0
          Source: loaddll64.exe, 00000000.00000003.402271914.0000027ED3940000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000003.00000003.388635168.0000000002100000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.826743463.0000021DDAD90000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.826725063.0000021DDAC4D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.388322445.000001F71CC60000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://gigimas.xyz
          Source: rundll32.exe, 00000004.00000002.825050387.0000021DD91F4000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.758857404.0000021DD9255000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.758869560.0000021DD925F000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.693664493.0000021DD925F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://gigimas.xyz/
          Source: rundll32.exe, 00000004.00000003.432267293.0000021DD9200000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://gigimas.xyz/92
          Source: rundll32.exe, 00000004.00000002.825050387.0000021DD91F4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://gigimas.xyz/ic
          Source: rundll32.exe, 00000004.00000003.563913643.0000021DD9221000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://gigimas.xyz/index.html
          Source: rundll32.exe, 00000004.00000003.759039619.0000021DD923C000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.759733313.0000021DD923C000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.694516726.0000021DD923C000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.629091178.0000021DD923C000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.693778417.0000021DD923C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://gigimas.xyz/index.html)I6
          Source: rundll32.exe, 00000004.00000003.563913643.0000021DD9221000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://gigimas.xyz/index.htmll
          Source: rundll32.exe, 00000004.00000003.497300012.0000021DD9221000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.497398978.0000021DD9226000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://gigimas.xyz/index.htmlr
          Source: rundll32.exe, 00000004.00000003.432113341.0000021DD9221000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://gigimas.xyz/index.htmluH
          Source: rundll32.exe, 00000004.00000002.825032098.0000021DD91ED000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.825050387.0000021DD91F4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://gigimas.xyz:443/index.html
          Source: rundll32.exe, 00000004.00000002.826725063.0000021DDAC4D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://gigimas.xyzhttps://reaso.xyz
          Source: loaddll64.exe, 00000000.00000003.402277727.0000027ED3942000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000003.00000003.388644042.0000000002102000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.826756799.0000021DDAD92000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.388329786.000001F71CC62000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://http://Mozilla/5.0
          Source: rundll32.exe, 00000004.00000002.826725063.0000021DDAC4D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.388322445.000001F71CC60000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://reaso.xyz
          Source: pzG0rkIchr.dllString found in binary or memory: https://sectigo.com/CPS0
          Source: unknownDNS traffic detected: queries for: gigimas.xyz

          Key, Mouse, Clipboard, Microphone and Screen Capturing

          barindex
          Source: Yara matchFile source: Process Memory Space: loaddll64.exe PID: 492, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: regsvr32.exe PID: 5172, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 1228, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 400, type: MEMORYSTR

          E-Banking Fraud

          barindex
          Source: Yara matchFile source: Process Memory Space: loaddll64.exe PID: 492, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: regsvr32.exe PID: 5172, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 1228, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 400, type: MEMORYSTR
          Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 2100 -s 304
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000027ED37137E0
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000027ED3715638
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000027ED371A918
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000027ED3716DF0
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000027ED3717FD4
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000027ED3713CD8
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000027ED37131C0
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000027ED37134A4
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000027ED3719D6C
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000027ED3714540
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000027ED371204C
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FF88C076D50
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FF88C075840
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FF88C071520
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FF88C088D50
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FF88C090D70
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FF88C07F964
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FF88C08B9B0
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FF88C0875E0
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FF88C081E14
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FF88C08F290
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FF88C0742A0
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FF88C0776E0
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FF88C071B10
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FF88C08B370
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FF88C079BA0
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FF88C0783C0
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FF88C086808
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FF88C076820
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FF88C074C80
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FF88C07DCAC
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FF88C0790B0
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FF88C075CC0
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FF88C08F8F0
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FF88C0898F0
          Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_003D37E0
          Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_003D5638
          Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_003DA918
          Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_003D9D6C
          Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_003D204C
          Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_003D4540
          Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_003D34A4
          Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_003D6DF0
          Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_003D3CD8
          Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_003D7FD4
          Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_003D31C0
          Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00007FF88C076D50
          Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00007FF88C075840
          Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00007FF88C071520
          Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00007FF88C088D50
          Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00007FF88C090D70
          Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00007FF88C07F964
          Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00007FF88C08B9B0
          Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00007FF88C0875E0
          Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00007FF88C081E14
          Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00007FF88C08F290
          Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00007FF88C0742A0
          Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00007FF88C0776E0
          Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00007FF88C071B10
          Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00007FF88C08B370
          Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00007FF88C079BA0
          Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00007FF88C0783C0
          Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00007FF88C086808
          Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00007FF88C076820
          Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00007FF88C074C80
          Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00007FF88C07DCAC
          Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00007FF88C0790B0
          Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00007FF88C075CC0
          Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00007FF88C08F8F0
          Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00007FF88C0898F0
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000021DD93337E0
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000021DD9333CD8
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000021DD93331C0
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000021DD9335638
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000021DD9339D6C
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000021DD93334A4
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000021DD9336DF0
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000021DD9337FD4
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000021DD933A918
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000021DD9334540
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000021DD933204C
          Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000001F71CC037E0
          Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000001F71CC03CD8
          Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000001F71CC06DF0
          Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000001F71CC034A4
          Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000001F71CC031C0
          Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000001F71CC07FD4
          Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000001F71CC09D6C
          Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000001F71CC0A918
          Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000001F71CC05638
          Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000001F71CC04540
          Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000001F71CC0204C
          Source: C:\Windows\System32\rundll32.exeCode function: 6_2_00007FF88C071520
          Source: C:\Windows\System32\rundll32.exeCode function: 6_2_00007FF88C088D50
          Source: C:\Windows\System32\rundll32.exeCode function: 6_2_00007FF88C076D50
          Source: C:\Windows\System32\rundll32.exeCode function: 6_2_00007FF88C090D70
          Source: C:\Windows\System32\rundll32.exeCode function: 6_2_00007FF88C07F964
          Source: C:\Windows\System32\rundll32.exeCode function: 6_2_00007FF88C08B9B0
          Source: C:\Windows\System32\rundll32.exeCode function: 6_2_00007FF88C0875E0
          Source: C:\Windows\System32\rundll32.exeCode function: 6_2_00007FF88C081E14
          Source: C:\Windows\System32\rundll32.exeCode function: 6_2_00007FF88C08F290
          Source: C:\Windows\System32\rundll32.exeCode function: 6_2_00007FF88C0742A0
          Source: C:\Windows\System32\rundll32.exeCode function: 6_2_00007FF88C0776E0
          Source: C:\Windows\System32\rundll32.exeCode function: 6_2_00007FF88C071B10
          Source: C:\Windows\System32\rundll32.exeCode function: 6_2_00007FF88C08B370
          Source: C:\Windows\System32\rundll32.exeCode function: 6_2_00007FF88C079BA0
          Source: C:\Windows\System32\rundll32.exeCode function: 6_2_00007FF88C0783C0
          Source: C:\Windows\System32\rundll32.exeCode function: 6_2_00007FF88C086808
          Source: C:\Windows\System32\rundll32.exeCode function: 6_2_00007FF88C076820
          Source: C:\Windows\System32\rundll32.exeCode function: 6_2_00007FF88C075840
          Source: C:\Windows\System32\rundll32.exeCode function: 6_2_00007FF88C074C80
          Source: C:\Windows\System32\rundll32.exeCode function: 6_2_00007FF88C07DCAC
          Source: C:\Windows\System32\rundll32.exeCode function: 6_2_00007FF88C0790B0
          Source: C:\Windows\System32\rundll32.exeCode function: 6_2_00007FF88C075CC0
          Source: C:\Windows\System32\rundll32.exeCode function: 6_2_00007FF88C08F8F0
          Source: C:\Windows\System32\rundll32.exeCode function: 6_2_00007FF88C0898F0
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000027ED371A0AC CreateFileW,NtQueryDirectoryFile,
          Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_003DA0AC CreateFileW,NtQueryDirectoryFile,
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000021DD933A0AC CreateFileW,NtQueryDirectoryFile,
          Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000001F71CC0A0AC CreateFileW,NtQueryDirectoryFile,
          Source: C:\Windows\System32\regsvr32.exeSection loaded: sfc.dll
          Source: pzG0rkIchr.dllReversingLabs: Detection: 73%
          Source: pzG0rkIchr.dllStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          Source: C:\Windows\System32\loaddll64.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
          Source: unknownProcess created: C:\Windows\System32\loaddll64.exe loaddll64.exe "C:\Users\user\Desktop\pzG0rkIchr.dll"
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\pzG0rkIchr.dll",#1
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\pzG0rkIchr.dll
          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\pzG0rkIchr.dll",#1
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\pzG0rkIchr.dll,DllRegisterServer
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\pzG0rkIchr.dll,ItsnPq5v
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\pzG0rkIchr.dll,QlqYo259k
          Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 2100 -s 304
          Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 1308 -s 304
          Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 2100 -s 304
          Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 1308 -s 304
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\pzG0rkIchr.dll",#1
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\pzG0rkIchr.dll
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\pzG0rkIchr.dll,DllRegisterServer
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\pzG0rkIchr.dll,ItsnPq5v
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\pzG0rkIchr.dll,QlqYo259k
          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\pzG0rkIchr.dll",#1
          Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 2100 -s 304
          Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 1308 -s 304
          Source: C:\Windows\System32\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\WER8047.tmpJump to behavior
          Source: classification engineClassification label: mal84.troj.evad.winDLL@22/8@7/1
          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\pzG0rkIchr.dll",#1
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5284:120:WilError_01
          Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess1308
          Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess2100
          Source: C:\Windows\System32\rundll32.exeMutant created: \Sessions\1\BaseNamedObjects\Global\ManagerMui
          Source: C:\Windows\System32\rundll32.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
          Source: C:\Windows\System32\rundll32.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
          Source: C:\Windows\System32\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
          Source: C:\Windows\System32\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
          Source: C:\Windows\System32\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
          Source: C:\Windows\System32\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
          Source: pzG0rkIchr.dllStatic PE information: Image base 0x180000000 > 0x60000000
          Source: pzG0rkIchr.dllStatic PE information: certificate valid
          Source: pzG0rkIchr.dllStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
          Source: pzG0rkIchr.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
          Source: Binary string: UxTheme.pdb source: WerFault.exe, 0000000B.00000003.395877568.000001716E477000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 0000000B.00000003.396307800.000001716E477000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 0000000C.00000003.396853459.000001DFB5E17000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 0000000C.00000003.396775988.000001DFB5E17000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: gdi32.pdb source: WerFault.exe, 0000000B.00000003.396163566.000001716E474000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 0000000B.00000003.395867216.000001716E471000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 0000000C.00000003.396822650.000001DFB5E14000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 0000000C.00000003.396760863.000001DFB5E11000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: kernelbase.pdb0 source: WerFault.exe, 0000000B.00000003.392399774.000001716D896000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 0000000C.00000003.390485617.000001DFB52D7000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 0000000C.00000003.392399063.000001DFB52D7000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: bcryptprimitives.pdb8 source: WerFault.exe, 0000000B.00000003.395867216.000001716E471000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 0000000C.00000003.396760863.000001DFB5E11000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: sechost.pdb source: WerFault.exe, 0000000B.00000003.395877568.000001716E477000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 0000000B.00000003.396307800.000001716E477000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 0000000C.00000003.396853459.000001DFB5E17000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 0000000C.00000003.396775988.000001DFB5E17000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: rpcrt4.pdb source: WerFault.exe, 0000000B.00000003.395867216.000001716E471000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 0000000C.00000003.396760863.000001DFB5E11000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: dwmapi.pdb: source: WerFault.exe, 0000000C.00000003.396853459.000001DFB5E17000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 0000000C.00000003.396775988.000001DFB5E17000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: se.pdb\ source: WerFault.exe, 0000000C.00000002.404139284.000001DFB33E2000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: ucrtbase.pdb source: WerFault.exe, 0000000B.00000003.395867216.000001716E471000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 0000000C.00000003.396760863.000001DFB5E11000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: kernelbase.pdb8 source: WerFault.exe, 0000000B.00000003.395867216.000001716E471000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 0000000C.00000003.396760863.000001DFB5E11000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: ucrtbase.pdb8 source: WerFault.exe, 0000000B.00000003.395867216.000001716E471000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 0000000C.00000003.396760863.000001DFB5E11000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: shcore.pdb8 source: WerFault.exe, 0000000B.00000003.395867216.000001716E471000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 0000000C.00000003.396760863.000001DFB5E11000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: msvcrt.pdb source: WerFault.exe, 0000000B.00000003.395867216.000001716E471000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 0000000C.00000003.396760863.000001DFB5E11000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: combase.pdb8 source: WerFault.exe, 0000000B.00000003.395867216.000001716E471000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 0000000C.00000003.396760863.000001DFB5E11000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: win32u.pdb8 source: WerFault.exe, 0000000B.00000003.396163566.000001716E474000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 0000000B.00000003.395867216.000001716E471000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 0000000C.00000003.396822650.000001DFB5E14000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 0000000C.00000003.396760863.000001DFB5E11000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: se.pdb( source: WerFault.exe, 0000000B.00000002.404499737.000001716B9D2000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: oleaut32.pdb6 source: WerFault.exe, 0000000C.00000003.396853459.000001DFB5E17000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 0000000C.00000003.396775988.000001DFB5E17000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: shcore.pdb source: WerFault.exe, 0000000B.00000003.395867216.000001716E471000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 0000000C.00000003.396760863.000001DFB5E11000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: UxTheme.pdb" source: WerFault.exe, 0000000C.00000003.396853459.000001DFB5E17000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 0000000C.00000003.396775988.000001DFB5E17000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: msctf.pdb source: WerFault.exe, 0000000B.00000003.395877568.000001716E477000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 0000000B.00000003.396307800.000001716E477000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 0000000C.00000003.396853459.000001DFB5E17000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 0000000C.00000003.396775988.000001DFB5E17000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: gdi32full.pdb8 source: WerFault.exe, 0000000B.00000003.396163566.000001716E474000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 0000000B.00000003.395867216.000001716E471000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 0000000C.00000003.396822650.000001DFB5E14000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 0000000C.00000003.396760863.000001DFB5E11000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: gdi32.pdb8 source: WerFault.exe, 0000000B.00000003.396163566.000001716E474000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 0000000B.00000003.395867216.000001716E471000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 0000000C.00000003.396822650.000001DFB5E14000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 0000000C.00000003.396760863.000001DFB5E11000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: user32.pdb source: WerFault.exe, 0000000B.00000003.395867216.000001716E471000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 0000000C.00000003.396760863.000001DFB5E11000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: msvcp_win.pdb source: WerFault.exe, 0000000B.00000003.396118866.000001716E470000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 0000000C.00000003.396815765.000001DFB5E10000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: rundll32.pdb8 source: WerFault.exe, 0000000B.00000003.395867216.000001716E471000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 0000000C.00000003.396760863.000001DFB5E11000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: .pdbU source: WerFault.exe, 0000000B.00000002.404499737.000001716B9D2000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: rpcrt4.pdb8 source: WerFault.exe, 0000000B.00000003.395867216.000001716E471000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 0000000C.00000003.396760863.000001DFB5E11000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: bcryptprimitives.pdb source: WerFault.exe, 0000000B.00000003.395867216.000001716E471000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 0000000C.00000003.396760863.000001DFB5E11000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: imagehlp.pdb8 source: WerFault.exe, 0000000B.00000003.395867216.000001716E471000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 0000000C.00000003.396760863.000001DFB5E11000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: ntdll.pdb source: WerFault.exe, 0000000B.00000003.390149544.000001716D88A000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 0000000B.00000003.393542297.000001716D88A000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 0000000B.00000003.395867216.000001716E471000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 0000000C.00000003.390425076.000001DFB52CA000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 0000000C.00000003.393721593.000001DFB52CA000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 0000000C.00000003.396760863.000001DFB5E11000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: combase.pdb source: WerFault.exe, 0000000B.00000003.395867216.000001716E471000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 0000000C.00000003.396760863.000001DFB5E11000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: kernel32.pdb source: WerFault.exe, 0000000B.00000003.390201513.000001716D890000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 0000000B.00000003.392963034.000001716D890000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 0000000B.00000003.395867216.000001716E471000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 0000000C.00000003.390462142.000001DFB52D1000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 0000000C.00000003.393053418.000001DFB52D1000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 0000000C.00000003.396760863.000001DFB5E11000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: rundll32.pdb source: WerFault.exe, 0000000B.00000003.390045053.000001716D884000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 0000000B.00000003.389884691.000001716D918000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 0000000B.00000003.395867216.000001716E471000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 0000000C.00000003.390315024.000001DFB52C4000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 0000000C.00000003.396760863.000001DFB5E11000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 0000000C.00000003.390223237.000001DFB5359000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: se.pdb source: WerFault.exe, 0000000B.00000002.404499737.000001716B9D2000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 0000000C.00000002.404139284.000001DFB33E2000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: msvcrt.pdb8 source: WerFault.exe, 0000000B.00000003.395867216.000001716E471000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 0000000C.00000003.396760863.000001DFB5E11000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: oleaut32.pdb source: WerFault.exe, 0000000B.00000003.395877568.000001716E477000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 0000000B.00000003.396307800.000001716E477000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 0000000C.00000003.396853459.000001DFB5E17000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 0000000C.00000003.396775988.000001DFB5E17000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: ntdll.pdb8 source: WerFault.exe, 0000000B.00000003.395867216.000001716E471000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 0000000C.00000003.396760863.000001DFB5E11000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: imagehlp.pdb source: WerFault.exe, 0000000B.00000003.395867216.000001716E471000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 0000000C.00000003.396760863.000001DFB5E11000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: win32u.pdb source: WerFault.exe, 0000000B.00000003.396163566.000001716E474000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 0000000B.00000003.395867216.000001716E471000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 0000000C.00000003.396822650.000001DFB5E14000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 0000000C.00000003.396760863.000001DFB5E11000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: gdi32full.pdb source: WerFault.exe, 0000000B.00000003.396163566.000001716E474000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 0000000B.00000003.395867216.000001716E471000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 0000000C.00000003.396822650.000001DFB5E14000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 0000000C.00000003.396760863.000001DFB5E11000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: kernel32.pdb8 source: WerFault.exe, 0000000B.00000003.395867216.000001716E471000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 0000000C.00000003.396760863.000001DFB5E11000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: user32.pdb8 source: WerFault.exe, 0000000B.00000003.395867216.000001716E471000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 0000000C.00000003.396760863.000001DFB5E11000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: dwmapi.pdb source: WerFault.exe, 0000000B.00000003.395877568.000001716E477000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 0000000B.00000003.396307800.000001716E477000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 0000000C.00000003.396853459.000001DFB5E17000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 0000000C.00000003.396775988.000001DFB5E17000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: ntdll.pdb0 source: WerFault.exe, 0000000B.00000003.390149544.000001716D88A000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 0000000B.00000003.393542297.000001716D88A000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 0000000C.00000003.390425076.000001DFB52CA000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 0000000C.00000003.393721593.000001DFB52CA000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: kernelbase.pdb source: WerFault.exe, 0000000B.00000003.392399774.000001716D896000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 0000000B.00000003.395867216.000001716E471000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 0000000C.00000003.390485617.000001DFB52D7000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 0000000C.00000003.392399063.000001DFB52D7000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 0000000C.00000003.396760863.000001DFB5E11000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: kernel32.pdb0 source: WerFault.exe, 0000000B.00000003.390201513.000001716D890000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 0000000B.00000003.392963034.000001716D890000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 0000000C.00000003.390462142.000001DFB52D1000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 0000000C.00000003.393053418.000001DFB52D1000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: imm32.pdb source: WerFault.exe, 0000000B.00000003.396118866.000001716E470000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 0000000C.00000003.396815765.000001DFB5E10000.00000004.00000020.00020000.00000000.sdmp
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FF88C08B9B0 LoadLibraryA,GetProcAddress,
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\pzG0rkIchr.dll

          Hooking and other Techniques for Hiding and Protection

          barindex
          Source: Yara matchFile source: Process Memory Space: loaddll64.exe PID: 492, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: regsvr32.exe PID: 5172, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 1228, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 400, type: MEMORYSTR
          Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
          Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
          Source: C:\Windows\System32\loaddll64.exe TID: 5272Thread sleep time: -120000s >= -30000s
          Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
          Source: C:\Windows\System32\rundll32.exeLast function: Thread delayed
          Source: C:\Windows\System32\rundll32.exeAPI coverage: 4.0 %
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FF88C07FB70 FindFirstFileExA,
          Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00007FF88C07FB70 FindFirstFileExA,
          Source: C:\Windows\System32\rundll32.exeCode function: 6_2_00007FF88C07FB70 FindFirstFileExA,
          Source: C:\Windows\System32\loaddll64.exeThread delayed: delay time: 120000
          Source: C:\Windows\System32\loaddll64.exeAPI call chain: ExitProcess graph end node
          Source: C:\Windows\System32\loaddll64.exeAPI call chain: ExitProcess graph end node
          Source: C:\Windows\System32\loaddll64.exeAPI call chain: ExitProcess graph end node
          Source: C:\Windows\System32\regsvr32.exeAPI call chain: ExitProcess graph end node
          Source: C:\Windows\System32\regsvr32.exeAPI call chain: ExitProcess graph end node
          Source: C:\Windows\System32\regsvr32.exeAPI call chain: ExitProcess graph end node
          Source: C:\Windows\System32\rundll32.exeAPI call chain: ExitProcess graph end node
          Source: C:\Windows\System32\rundll32.exeAPI call chain: ExitProcess graph end node
          Source: C:\Windows\System32\rundll32.exeAPI call chain: ExitProcess graph end node
          Source: rundll32.exe, 00000004.00000003.759039619.0000021DD923C000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.564079958.0000021DD923C000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.759733313.0000021DD923C000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.497353450.0000021DD923C000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.694516726.0000021DD923C000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.629091178.0000021DD923C000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.825208523.0000021DD923C000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.432152980.0000021DD923C000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.497418075.0000021DD923C000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.693778417.0000021DD923C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW\
          Source: WerFault.exe, 0000000C.00000002.404708361.000001DFB5324000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW0*K
          Source: WerFault.exe, 0000000B.00000002.405301805.000001716D916000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 0000000B.00000003.403687494.000001716D916000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW</
          Source: WerFault.exe, 0000000B.00000003.401733084.000001716D910000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 0000000B.00000003.401808320.000001716D914000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW</%SystemRoot%\system32\mswsock.dll<reqs>
          Source: rundll32.exe, 00000004.00000003.759039619.0000021DD923C000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.564079958.0000021DD923C000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.759733313.0000021DD923C000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.497353450.0000021DD923C000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.694516726.0000021DD923C000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.629091178.0000021DD923C000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.825208523.0000021DD923C000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.432152980.0000021DD923C000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.497418075.0000021DD923C000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.693778417.0000021DD923C000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 0000000B.00000002.404822488.000001716BA98000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
          Source: rundll32.exe, 00000004.00000002.824960141.0000021DD91C8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW`
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FF88C07E374 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FF88C08B9B0 LoadLibraryA,GetProcAddress,
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FF88C0711F0 ReadFile,GetProcessHeap,HeapFree,
          Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPort
          Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPort
          Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPort
          Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPort
          Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 2100 -s 304
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FF88C086DA4 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FF88C07E374 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FF88C07BC0C RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
          Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00007FF88C086DA4 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
          Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00007FF88C07E374 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
          Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00007FF88C07BC0C RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
          Source: C:\Windows\System32\rundll32.exeCode function: 6_2_00007FF88C086DA4 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
          Source: C:\Windows\System32\rundll32.exeCode function: 6_2_00007FF88C07E374 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
          Source: C:\Windows\System32\rundll32.exeCode function: 6_2_00007FF88C07BC0C RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,

          HIPS / PFW / Operating System Protection Evasion

          barindex
          Source: C:\Windows\System32\rundll32.exeNetwork Connect: 185.250.148.35 443
          Source: C:\Windows\System32\rundll32.exeDomain query: gigimas.xyz
          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\pzG0rkIchr.dll",#1
          Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 2100 -s 304
          Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 1308 -s 304
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FF88C0865F0 cpuid
          Source: C:\Windows\System32\rundll32.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FF88C08ED60 CreateNamedPipeA,
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FF88C07BB08 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,

          Stealing of Sensitive Information

          barindex
          Source: Yara matchFile source: Process Memory Space: loaddll64.exe PID: 492, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: regsvr32.exe PID: 5172, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 1228, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 400, type: MEMORYSTR

          Remote Access Functionality

          barindex
          Source: Yara matchFile source: Process Memory Space: loaddll64.exe PID: 492, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: regsvr32.exe PID: 5172, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 1228, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 400, type: MEMORYSTR
          Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
          Valid Accounts1
          Native API
          1
          DLL Side-Loading
          112
          Process Injection
          1
          Disable or Modify Tools
          OS Credential Dumping1
          System Time Discovery
          Remote Services1
          Archive Collected Data
          Exfiltration Over Other Network Medium12
          Encrypted Channel
          Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
          Default AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
          DLL Side-Loading
          21
          Virtualization/Sandbox Evasion
          LSASS Memory31
          Security Software Discovery
          Remote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth1
          Non-Application Layer Protocol
          Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
          Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)112
          Process Injection
          Security Account Manager21
          Virtualization/Sandbox Evasion
          SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration2
          Application Layer Protocol
          Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
          Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)1
          Regsvr32
          NTDS1
          Remote System Discovery
          Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
          Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
          Rundll32
          LSA Secrets1
          File and Directory Discovery
          SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
          Replication Through Removable MediaLaunchdRc.commonRc.common1
          DLL Side-Loading
          Cached Domain Credentials13
          System Information Discovery
          VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet
          behaviorgraph top1 signatures2 2 Behavior Graph ID: 752975 Sample: pzG0rkIchr.exe Startdate: 24/11/2022 Architecture: WINDOWS Score: 84 31 Snort IDS alert for network traffic 2->31 33 Antivirus detection for URL or domain 2->33 35 Multi AV Scanner detection for submitted file 2->35 37 Yara detected Ursnif 2->37 7 loaddll64.exe 1 2->7         started        process3 process4 9 cmd.exe 1 7->9         started        11 rundll32.exe 7->11         started        13 rundll32.exe 7->13         started        15 3 other processes 7->15 process5 17 rundll32.exe 9->17         started        21 WerFault.exe 17 9 11->21         started        23 WerFault.exe 11->23         started        25 WerFault.exe 3 9 13->25         started        27 WerFault.exe 13->27         started        dnsIp6 29 gigimas.xyz 185.250.148.35, 443, 49706, 49707 FIRSTDC-ASRU Russian Federation 17->29 39 System process connects to network (likely due to code injection or exploit) 17->39 41 Performs DNS queries to domains with low reputation 17->41 signatures7

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          SourceDetectionScannerLabelLink
          pzG0rkIchr.dll73%ReversingLabsWin64.Trojan.Tnega
          No Antivirus matches
          No Antivirus matches
          No Antivirus matches
          SourceDetectionScannerLabelLink
          http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t0%URL Reputationsafe
          https://sectigo.com/CPS00%URL Reputationsafe
          http://crl.sectigo.com/SectigoPublicCodeSigningCAR36.crl0y0%URL Reputationsafe
          http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl00%URL Reputationsafe
          http://ocsp.sectigo.com00%URL Reputationsafe
          https://gigimas.xyz/index.html)I60%Avira URL Cloudsafe
          https://gigimas.xyz0%Avira URL Cloudsafe
          http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#0%URL Reputationsafe
          http://crt.sectigo.com/SectigoPublicCodeSigningCAR36.crt0#0%URL Reputationsafe
          http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#0%URL Reputationsafe
          https://gigimas.xyz/ic0%Avira URL Cloudsafe
          https://gigimas.xyz/index.htmlr0%Avira URL Cloudsafe
          https://gigimas.xyz/920%Avira URL Cloudsafe
          https://http://Mozilla/5.00%Avira URL Cloudsafe
          https://gigimas.xyz/index.htmll0%Avira URL Cloudsafe
          https://gigimas.xyz/index.htmluH0%Avira URL Cloudsafe
          https://gigimas.xyzhttps://reaso.xyz0%Avira URL Cloudsafe
          https://gigimas.xyz:443/index.html0%Avira URL Cloudsafe
          https://gigimas.xyz/0%Avira URL Cloudsafe
          https://gigimas.xyz/index.html0%Avira URL Cloudsafe
          https://reaso.xyz100%Avira URL Cloudmalware
          NameIPActiveMaliciousAntivirus DetectionReputation
          gigimas.xyz
          185.250.148.35
          truetrue
            unknown
            NameSourceMaliciousAntivirus DetectionReputation
            https://gigimas.xyzloaddll64.exe, 00000000.00000003.402271914.0000027ED3940000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000003.00000003.388635168.0000000002100000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.826743463.0000021DDAD90000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.826725063.0000021DDAC4D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.388322445.000001F71CC60000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0tpzG0rkIchr.dllfalse
            • URL Reputation: safe
            unknown
            https://gigimas.xyz/index.html)I6rundll32.exe, 00000004.00000003.759039619.0000021DD923C000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.759733313.0000021DD923C000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.694516726.0000021DD923C000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.629091178.0000021DD923C000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.693778417.0000021DD923C000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://sectigo.com/CPS0pzG0rkIchr.dllfalse
            • URL Reputation: safe
            unknown
            http://crl.sectigo.com/SectigoPublicCodeSigningCAR36.crl0ypzG0rkIchr.dllfalse
            • URL Reputation: safe
            unknown
            http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0pzG0rkIchr.dllfalse
            • URL Reputation: safe
            unknown
            http://ocsp.sectigo.com0pzG0rkIchr.dllfalse
            • URL Reputation: safe
            unknown
            https://gigimas.xyz/92rundll32.exe, 00000004.00000003.432267293.0000021DD9200000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://gigimas.xyz/index.htmlrrundll32.exe, 00000004.00000003.497300012.0000021DD9221000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.497398978.0000021DD9226000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://gigimas.xyz/icrundll32.exe, 00000004.00000002.825050387.0000021DD91F4000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://gigimas.xyz/index.htmluHrundll32.exe, 00000004.00000003.432113341.0000021DD9221000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://http://Mozilla/5.0loaddll64.exe, 00000000.00000003.402277727.0000027ED3942000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000003.00000003.388644042.0000000002102000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.826756799.0000021DDAD92000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.388329786.000001F71CC62000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            low
            http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#pzG0rkIchr.dllfalse
            • URL Reputation: safe
            unknown
            https://gigimas.xyz/index.htmlrundll32.exe, 00000004.00000003.563913643.0000021DD9221000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://crt.sectigo.com/SectigoPublicCodeSigningCAR36.crt0#pzG0rkIchr.dllfalse
            • URL Reputation: safe
            unknown
            https://gigimas.xyzhttps://reaso.xyzrundll32.exe, 00000004.00000002.826725063.0000021DDAC4D000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#pzG0rkIchr.dllfalse
            • URL Reputation: safe
            unknown
            https://gigimas.xyz/index.htmllrundll32.exe, 00000004.00000003.563913643.0000021DD9221000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://gigimas.xyz/rundll32.exe, 00000004.00000002.825050387.0000021DD91F4000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.758857404.0000021DD9255000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.758869560.0000021DD925F000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.693664493.0000021DD925F000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://reaso.xyzrundll32.exe, 00000004.00000002.826725063.0000021DDAC4D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.388322445.000001F71CC60000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: malware
            unknown
            https://gigimas.xyz:443/index.htmlrundll32.exe, 00000004.00000002.825032098.0000021DD91ED000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.825050387.0000021DD91F4000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            • No. of IPs < 25%
            • 25% < No. of IPs < 50%
            • 50% < No. of IPs < 75%
            • 75% < No. of IPs
            IPDomainCountryFlagASNASN NameMalicious
            185.250.148.35
            gigimas.xyzRussian Federation
            48430FIRSTDC-ASRUtrue
            Joe Sandbox Version:36.0.0 Rainbow Opal
            Analysis ID:752975
            Start date and time:2022-11-24 05:18:08 +01:00
            Joe Sandbox Product:CloudBasic
            Overall analysis duration:0h 9m 27s
            Hypervisor based Inspection enabled:false
            Report type:light
            Sample file name:pzG0rkIchr.exe (renamed file extension from exe to dll)
            Cookbook file name:default.jbs
            Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
            Number of analysed new started processes analysed:20
            Number of new started drivers analysed:0
            Number of existing processes analysed:0
            Number of existing drivers analysed:0
            Number of injected processes analysed:0
            Technologies:
            • HCA enabled
            • EGA enabled
            • HDC enabled
            • AMSI enabled
            Analysis Mode:default
            Analysis stop reason:Timeout
            Detection:MAL
            Classification:mal84.troj.evad.winDLL@22/8@7/1
            EGA Information:
            • Successful, ratio: 100%
            HDC Information:
            • Successful, ratio: 68.3% (good quality ratio 59.4%)
            • Quality average: 56.9%
            • Quality standard deviation: 33.4%
            HCA Information:
            • Successful, ratio: 100%
            • Number of executed functions: 0
            • Number of non-executed functions: 0
            Cookbook Comments:
            • Override analysis time to 240s for rundll32
            • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, WerFault.exe, WMIADAP.exe, conhost.exe, backgroundTaskHost.exe, svchost.exe
            • TCP Packets have been reduced to 100
            • Excluded IPs from analysis (whitelisted): 52.182.143.212
            • Excluded domains from analysis (whitelisted): onedsblobprdcus15.centralus.cloudapp.azure.com, login.live.com, blobcollector.events.data.trafficmanager.net, watson.telemetry.microsoft.com
            • Not all processes where analyzed, report is missing behavior information
            • Report size exceeded maximum capacity and may have missing behavior information.
            • VT rate limit hit for: pzG0rkIchr.dll
            TimeTypeDescription
            05:19:48API Interceptor1x Sleep call for process: loaddll64.exe modified
            05:19:49API Interceptor2x Sleep call for process: WerFault.exe modified
            05:20:02API Interceptor6x Sleep call for process: rundll32.exe modified
            No context
            No context
            No context
            No context
            No context
            Process:C:\Windows\System32\WerFault.exe
            File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
            Category:dropped
            Size (bytes):65536
            Entropy (8bit):0.7600039551007107
            Encrypted:false
            SSDEEP:96:6TFZZFigJPnyqjs55P7HfipXIQcQHc6CcEm6cw3I/XaXz+HbHgSQgJPbpIDV9wO7:snigJKKH5Gs60j0I/u7swS274ltC
            MD5:BD5C8925F7120E1292DBD4961E9F2AB2
            SHA1:997623AC245EEC6535D175E199A180D43E9282FC
            SHA-256:0B242B11BC21F42FD27F1BDD633316DA3694606201E59C3C3CCC3593345C8B7A
            SHA-512:8075C625810E044C3224941D33DD97830E1EC5397E416AFC0DCCCB749580837F7629D7DDDCD531D39423195F82DCF2DF3060474F749789A977EF7DB655E65581
            Malicious:false
            Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.1.3.7.3.7.1.8.4.9.4.9.5.4.2.3.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.1.3.7.3.7.1.8.6.9.4.9.5.2.0.5.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.5.e.8.6.8.a.2.1.-.d.3.3.a.-.4.6.6.6.-.b.2.e.f.-.6.8.2.8.6.b.5.0.0.f.9.5.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.a.d.0.2.5.9.3.b.-.0.7.1.f.-.4.6.8.2.-.a.3.3.f.-.9.f.6.a.a.8.a.a.a.e.8.6.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.r.u.n.d.l.l.3.2...e.x.e._.p.z.G.0.r.k.I.c.h.r...d.l.l.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.R.U.N.D.L.L.3.2...E.X.E.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.8.3.4.-.0.0.0.1.-.0.0.1.f.-.3.5.4.2.-.0.2.e.4.b.b.f.f.d.8.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.2.f.3.4.c.c.f.d.d.8.1.4.1.a.e.e.e.2.e.8.9.f.f.b.0.7.0.c.e.2.3.9.c.7.d.0.0.7.
            Process:C:\Windows\System32\WerFault.exe
            File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
            Category:dropped
            Size (bytes):65536
            Entropy (8bit):0.7599992295897045
            Encrypted:false
            SSDEEP:96:icFXVFiXJPnybjs55P7Hf5pXIQcQdc6/RcEccw3+XaXz+HbHgSQgJPbpIDV9wOyk:71iXJKIHz9mAj0I/u7swS274ltC
            MD5:1E8445DB848C561B6CB8CBEF60359786
            SHA1:00E829DA03ACB0B24004E2C2E45E7D439352BF8D
            SHA-256:8F94F06BC63F693379833D7156EC4C3E65788BD94BC7470C12EF985AED723EBD
            SHA-512:72C3DE3F22801E3947FDC86690B8A63175DC9EFCF7503AF898485A380B6941C42E55F965658B3F799051283C10C4823F5C0C2DE8EFE293C9904D117487FDA1D2
            Malicious:false
            Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.1.3.7.3.7.1.8.5.0.8.6.8.0.1.2.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.1.3.7.3.7.1.8.7.2.8.9.9.3.1.2.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.9.b.1.b.0.7.4.e.-.3.1.b.5.-.4.4.2.6.-.9.9.a.5.-.9.9.5.d.d.3.d.8.4.c.8.4.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.e.2.5.1.b.f.8.e.-.f.c.a.f.-.4.9.c.0.-.9.1.b.f.-.f.7.b.f.3.9.f.f.a.0.f.3.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.r.u.n.d.l.l.3.2...e.x.e._.p.z.G.0.r.k.I.c.h.r...d.l.l.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.R.U.N.D.L.L.3.2...E.X.E.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.5.1.c.-.0.0.0.1.-.0.0.1.f.-.8.9.9.5.-.c.1.e.6.b.b.f.f.d.8.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.2.f.3.4.c.c.f.d.d.8.1.4.1.a.e.e.e.2.e.8.9.f.f.b.0.7.0.c.e.2.3.9.c.7.d.0.0.7.
            Process:C:\Windows\System32\WerFault.exe
            File Type:Mini DuMP crash report, 14 streams, Thu Nov 24 04:19:45 2022, 0x1205a4 type
            Category:dropped
            Size (bytes):56070
            Entropy (8bit):1.7075050210528775
            Encrypted:false
            SSDEEP:192:rlRq3OC5I6Pdfek5ka0LGuO3bcmXJBjz2RdYnUQDfERORDNKyB4RSOnR:pCDck5DbRD
            MD5:1A5AA058B4E8ACA002D6B153E7C3B88E
            SHA1:B722FD3B879CCAD5D57716D5D375355C05AC1AA4
            SHA-256:4C914A886A7765E4A814BD13405293A39423A4BB8A6EE712B7D48B0E3086A3F9
            SHA-512:010E25A468C02F293CEBCAF7FA64CF746F6716571837CAD3BC35877EC74F8808B352E2DBC3CE080FF502E1CE8ED8EF02F69F4953C48FFC0537CC6363A68EA782
            Malicious:false
            Preview:MDMP....... .........~c.........................................)..........T.......8...........T...............&...........T...........@....................................................................U...........B..............Lw................,nq...T.......4.....~c.............................0..................W... .E.u.r.o.p.e. .S.t.a.n.d.a.r.d. .T.i.m.e.......................................W... .E.u.r.o.p.e. .D.a.y.l.i.g.h.t. .T.i.m.e.......................................1.7.1.3.4...1...a.m.d.6.4.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.................................................................................................................................................................................................................................................................................................................................................................................................................................................
            Process:C:\Windows\System32\WerFault.exe
            File Type:Mini DuMP crash report, 14 streams, Thu Nov 24 04:19:46 2022, 0x1205a4 type
            Category:dropped
            Size (bytes):54966
            Entropy (8bit):1.7301605700636602
            Encrypted:false
            SSDEEP:192:kl9crsOC5We/Q7NLbBjD4z5s0mE6liAU3Oq:amC8e/Q7d1V0m
            MD5:A57C13F28721473003BE444D7239D372
            SHA1:10C6496461E1C6113B6FF62120CA7D83CC17216A
            SHA-256:EBF7FC039C185490580CF4BB3044B63044A13DD5305F7755AC858779DDFCD9FA
            SHA-512:814B8BD3E2333F3084A46553787236EE0C5C0B71EA62B6636836254D80939B593CC3AE58EABC8CD3DDAE9620CAC53AF5550504734A192F8BADBE8BA98EEA582A
            Malicious:false
            Preview:MDMP....... .........~c.........................................)..........T.......8...........T...........................T...........@....................................................................U...........B..............Lw.....................T.............~c.............................0..................W... .E.u.r.o.p.e. .S.t.a.n.d.a.r.d. .T.i.m.e.......................................W... .E.u.r.o.p.e. .D.a.y.l.i.g.h.t. .T.i.m.e.......................................1.7.1.3.4...1...a.m.d.6.4.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.................................................................................................................................................................................................................................................................................................................................................................................................................................................
            Process:C:\Windows\System32\WerFault.exe
            File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
            Category:dropped
            Size (bytes):8526
            Entropy (8bit):3.696693878810589
            Encrypted:false
            SSDEEP:192:Rrl7r3GLNiWpWiN6Y+TagmfQYSl2G+prD89b4oCafaIm:RrlsNiYWiN6YKagmfQYSlR4FafE
            MD5:891C13F961FC9780F58F08B88D03FE00
            SHA1:7AC38531C1F3F85ED591B419A1C0C9D560DE4B1B
            SHA-256:B04D603146FD1D2F17D6588066AA48A86D85B511E7D88380393C69F9BCC4575C
            SHA-512:3D766FCF4F2835FD6750E5BED7331A27EF548BB8C9D729E7B3D3AD8AA09677360AE67F5F2887B1D8057FEBFC622505A4A179A2F07B31E87FBDCEFD4B42C2B477
            Malicious:false
            Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.7.1.3.4.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.7.1.3.4...1...a.m.d.6.4.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.1.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.1.0.3.3.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.2.1.0.0.<./.P.i.d.>.......
            Process:C:\Windows\System32\WerFault.exe
            File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
            Category:dropped
            Size (bytes):8524
            Entropy (8bit):3.6955697518324317
            Encrypted:false
            SSDEEP:192:Rrl7r3GLNivSLis6Y+ZagmfQhSGG+pr889b4IOfxIm:RrlsNiqLis6YgagmfQhSM4Zfr
            MD5:64CB5AA88613858B4078E5BB14479AE6
            SHA1:138C49AF256A227F26D86557778AADF52F016EFB
            SHA-256:1001101306104ACE07059DB78333327804781A7FBC4E59CBC7DEB3AC14A27E8E
            SHA-512:32B368E68F5C667FE75F2B36BECB8680A2D39960E69878D527CAC83B1356126C7BFA04C9645E17A0ACCC7482F244DC7A5571186F0B5F7371D39FF7579A2F5F69
            Malicious:false
            Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.7.1.3.4.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.7.1.3.4...1...a.m.d.6.4.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.1.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.1.0.3.3.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.1.3.0.8.<./.P.i.d.>.......
            Process:C:\Windows\System32\WerFault.exe
            File Type:XML 1.0 document, ASCII text, with CRLF line terminators
            Category:dropped
            Size (bytes):4733
            Entropy (8bit):4.474599386008591
            Encrypted:false
            SSDEEP:48:cvIwSD8zsA+JgtBI9XlVWgc8sqYjRTq8fm8M4JCXCOFFVyq85m27UZESC5S+d:uITf3NGgrsqYlTfJ8xVv+d
            MD5:CDE8A3EB67D3F603A55F6BCA1C15EA67
            SHA1:9425363A7B60C24BB7466FEAA6C38D60B86C084D
            SHA-256:F2E7CAB0595409E2A61035A46D0DF145C3CCCDC99C2FE8FDB7BBF04B590ED7F9
            SHA-512:BC28D09B0C638843187EDB12E207B49C15A1F99917950FC5E748FEC26F62376E8AFDA47C3BBBEDB80F52FC38BF4C8FE02AA0232816274B4B291A576CD030FACC
            Malicious:false
            Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="17134" />.. <arg nm="vercsdbld" val="1" />.. <arg nm="verqfe" val="1" />.. <arg nm="csdbld" val="1" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="1033" />.. <arg nm="geoid" val="244" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="1793610" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.1.17134.0-11.0.47" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="4096" />..
            Process:C:\Windows\System32\WerFault.exe
            File Type:XML 1.0 document, ASCII text, with CRLF line terminators
            Category:dropped
            Size (bytes):4733
            Entropy (8bit):4.478085829501657
            Encrypted:false
            SSDEEP:48:cvIwSD8zsA+JgtBI9XlVWgc8sqYjF8fm8M4JCXCOCFUyq85m2skUZESC5Sjd:uITf3NGgrsqYeJuzTVvjd
            MD5:0BD2A0E70F01F1D342661314591029DC
            SHA1:CFA327EBD0E02AEAA2F23AB3EA938AA843FB71F5
            SHA-256:A8350E49452A0A6A302EF0A3BA63447E4F1C64FF6C2335E22D1B53DE654A27D5
            SHA-512:6CA8CB1FA55453B637117B22CC0C474110CFE03BCFD602657AEE4F778B4072F8623D5CF32193183DF148F8A5630996B0926C499700F663552898C875774CD12A
            Malicious:false
            Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="17134" />.. <arg nm="vercsdbld" val="1" />.. <arg nm="verqfe" val="1" />.. <arg nm="csdbld" val="1" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="1033" />.. <arg nm="geoid" val="244" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="1793610" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.1.17134.0-11.0.47" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="4096" />..
            File type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
            Entropy (8bit):6.637392883592079
            TrID:
            • Win64 Dynamic Link Library (generic) (102004/3) 86.43%
            • Win64 Executable (generic) (12005/4) 10.17%
            • Generic Win/DOS Executable (2004/3) 1.70%
            • DOS Executable Generic (2002/1) 1.70%
            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.01%
            File name:pzG0rkIchr.dll
            File size:290568
            MD5:d6ef4778f7dc9c31a0a2a989ef42d2fd
            SHA1:5dad8394ef37d5a006674589754f7a3187d303b1
            SHA256:54de1f2c26a63a8f6b7f8d5de99f8ebd4093959ab07f027db1985d0652258736
            SHA512:997b57424364ff661d80ca6efc5b7e91f2204d1ed7c4d784ee7d6134bc06952c993de038d6a25c71a7949b08ddd8cc5d167f8c753379f69ee1b6b49342fafa63
            SSDEEP:6144:wHyvumb1p7CC8VoxOJbceNOHI2Tse2RTggR/Znv+yit:Smbrgu2so2TVwcK/ZnG/t
            TLSH:ED54BF41F3D904A6D9138D3D8857562BEBF13C212214DA5F8B50C36A6F37BA1E739B22
            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......!5..eT..eT..eT....Z.`T....X..T....Y.hT..^...bT..^...qT..^...uT....`.fT..eT...T......gT......dT......dT..RicheT..........PE..d..
            Icon Hash:74f0e4ecccdce0e4
            Entrypoint:0x18000b6ec
            Entrypoint Section:.text
            Digitally signed:true
            Imagebase:0x180000000
            Subsystem:windows gui
            Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, DLL
            DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
            Time Stamp:0x62C42DD7 [Tue Jul 5 12:25:59 2022 UTC]
            TLS Callbacks:
            CLR (.Net) Version:
            OS Version Major:6
            OS Version Minor:0
            File Version Major:6
            File Version Minor:0
            Subsystem Version Major:6
            Subsystem Version Minor:0
            Import Hash:4270d9bbb54b179372d82277269282e6
            Signature Valid:true
            Signature Issuer:CN=Sectigo Public Code Signing CA R36, O=Sectigo Limited, C=GB
            Signature Validation Error:The operation completed successfully
            Error Number:0
            Not Before, Not After
            • 7/6/2021 2:00:00 AM 7/7/2022 1:59:59 AM
            Subject Chain
            • CN=NAILS UNLIMITED LIMITED, O=NAILS UNLIMITED LIMITED, L=DORCHESTER, S=Dorset, C=GB
            Version:3
            Thumbprint MD5:71834A68FD130C9D08796B4F19A6FC67
            Thumbprint SHA-1:CA69087AAAA087346202AD16228337130511C4C5
            Thumbprint SHA-256:F13E4801E13898E839183E3305E1DDA7F4C0EBF6EAF7553E18C1DDD4EDC94470
            Serial:2F96A89BFEC6E44DD224E8FD7E72D9BB
            Instruction
            dec eax
            mov dword ptr [esp+08h], ebx
            dec eax
            mov dword ptr [esp+10h], esi
            push edi
            dec eax
            sub esp, 20h
            dec ecx
            mov edi, eax
            mov ebx, edx
            dec eax
            mov esi, ecx
            cmp edx, 01h
            jne 00007FE818B824F7h
            call 00007FE818B828F0h
            dec esp
            mov eax, edi
            mov edx, ebx
            dec eax
            mov ecx, esi
            dec eax
            mov ebx, dword ptr [esp+30h]
            dec eax
            mov esi, dword ptr [esp+38h]
            dec eax
            add esp, 20h
            pop edi
            jmp 00007FE818B8236Ch
            int3
            int3
            int3
            dec eax
            sub esp, 28h
            call 00007FE818B82D88h
            test eax, eax
            je 00007FE818B82513h
            dec eax
            mov eax, dword ptr [00000030h]
            dec eax
            mov ecx, dword ptr [eax+08h]
            jmp 00007FE818B824F7h
            dec eax
            cmp ecx, eax
            je 00007FE818B82506h
            xor eax, eax
            dec eax
            cmpxchg dword ptr [00038A68h], ecx
            jne 00007FE818B824E0h
            xor al, al
            dec eax
            add esp, 28h
            ret
            mov al, 01h
            jmp 00007FE818B824E9h
            int3
            int3
            int3
            dec eax
            sub esp, 28h
            call 00007FE818B82D4Ch
            test eax, eax
            je 00007FE818B824F9h
            call 00007FE818B82B6Fh
            jmp 00007FE818B8250Bh
            call 00007FE818B82D34h
            mov ecx, eax
            call 00007FE818B844A1h
            test eax, eax
            je 00007FE818B824F6h
            xor al, al
            jmp 00007FE818B824F9h
            call 00007FE818B84828h
            mov al, 01h
            dec eax
            add esp, 28h
            ret
            dec eax
            sub esp, 28h
            xor ecx, ecx
            call 00007FE818B82636h
            test al, al
            setne al
            dec eax
            add esp, 28h
            ret
            int3
            int3
            Programming Language:
            • [C++] VS2015 UPD3.1 build 24215
            • [EXP] VS2015 UPD3.1 build 24215
            • [LNK] VS2015 UPD3.1 build 24215
            NameVirtual AddressVirtual Size Is in Section
            IMAGE_DIRECTORY_ENTRY_EXPORT0x371c00x94.rdata
            IMAGE_DIRECTORY_ENTRY_IMPORT0x372540x28.rdata
            IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x460000x15cc.pdata
            IMAGE_DIRECTORY_ENTRY_SECURITY0x446000x2908
            IMAGE_DIRECTORY_ENTRY_BASERELOC0x490000x618.reloc
            IMAGE_DIRECTORY_ENTRY_DEBUG0x34dd00x1c.rdata
            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x34df00x94.rdata
            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_IAT0x230000x2a8.rdata
            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
            NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
            .text0x10000x213900x21400False0.6091694078947368zlib compressed data6.321988758719223IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            .rdata0x230000x14b400x14c00False0.5551228350903614data5.589680054404924IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
            .data0x380000xd3780xc200False0.581286243556701data4.475772855701728IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
            .pdata0x460000x15cc0x1600False0.49556107954545453data5.3249872988992655IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
            .gfids0x480000x940x200False0.248046875data1.4095612964443904IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
            .reloc0x490000x6180x800False0.54150390625data4.760086879502757IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
            DLLImport
            KERNEL32.dllCreateFileA, LockFile, ReadFile, SetEndOfFile, UnlockFile, CloseHandle, PeekNamedPipe, HeapCreate, HeapAlloc, HeapFree, GetProcessHeap, HeapWalk, InitializeCriticalSection, EnterCriticalSection, LeaveCriticalSection, TryEnterCriticalSection, DeleteCriticalSection, WaitForSingleObject, ExitProcess, CreateThread, VirtualAlloc, GetProcAddress, CreateFileMappingA, LoadLibraryA, CreateNamedPipeA, CallNamedPipeA, QueryPerformanceCounter, GetCurrentProcessId, GetCurrentThreadId, GetSystemTimeAsFileTime, InitializeSListHead, RtlCaptureContext, RtlLookupFunctionEntry, RtlVirtualUnwind, IsDebuggerPresent, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetStartupInfoW, IsProcessorFeaturePresent, GetModuleHandleW, RtlUnwindEx, InterlockedFlushSList, GetLastError, SetLastError, InitializeCriticalSectionAndSpinCount, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, FreeLibrary, LoadLibraryExW, GetCurrentProcess, TerminateProcess, GetModuleHandleExW, GetModuleFileNameA, MultiByteToWideChar, WideCharToMultiByte, LCMapStringW, FindClose, FindFirstFileExA, FindNextFileA, IsValidCodePage, GetACP, GetOEMCP, GetCPInfo, GetCommandLineA, GetCommandLineW, GetEnvironmentStringsW, FreeEnvironmentStringsW, GetStdHandle, GetFileType, GetStringTypeW, CreateFileW, HeapSize, HeapReAlloc, SetStdHandle, FlushFileBuffers, WriteFile, GetConsoleCP, GetConsoleMode, ReadConsoleW, SetFilePointerEx, WriteConsoleW, RaiseException
            NameOrdinalAddress
            DllRegisterServer10x180002380
            ItsnPq5v20x180002390
            QlqYo259k30x180017c20
            XeFnYZ40940x1800175e0
            TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
            192.168.2.48.8.8.864906532039645 11/24/22-05:22:35.810533UDP2039645ET TROJAN Observed DNS Query to Ursnif Domain (gigimas .xyz)6490653192.168.2.48.8.8.8
            192.168.2.48.8.8.861007532039645 11/24/22-05:20:02.978332UDP2039645ET TROJAN Observed DNS Query to Ursnif Domain (gigimas .xyz)6100753192.168.2.48.8.8.8
            192.168.2.48.8.8.861124532039645 11/24/22-05:21:04.451832UDP2039645ET TROJAN Observed DNS Query to Ursnif Domain (gigimas .xyz)6112453192.168.2.48.8.8.8
            192.168.2.48.8.8.859444532039645 11/24/22-05:21:34.871041UDP2039645ET TROJAN Observed DNS Query to Ursnif Domain (gigimas .xyz)5944453192.168.2.48.8.8.8
            192.168.2.48.8.8.855570532039645 11/24/22-05:22:05.359167UDP2039645ET TROJAN Observed DNS Query to Ursnif Domain (gigimas .xyz)5557053192.168.2.48.8.8.8
            192.168.2.48.8.8.860686532039645 11/24/22-05:20:33.386749UDP2039645ET TROJAN Observed DNS Query to Ursnif Domain (gigimas .xyz)6068653192.168.2.48.8.8.8
            192.168.2.48.8.8.859446532039645 11/24/22-05:23:06.390786UDP2039645ET TROJAN Observed DNS Query to Ursnif Domain (gigimas .xyz)5944653192.168.2.48.8.8.8
            TimestampSource PortDest PortSource IPDest IP
            Nov 24, 2022 05:20:03.012599945 CET49706443192.168.2.4185.250.148.35
            Nov 24, 2022 05:20:03.012650967 CET44349706185.250.148.35192.168.2.4
            Nov 24, 2022 05:20:03.012737036 CET49706443192.168.2.4185.250.148.35
            Nov 24, 2022 05:20:03.016460896 CET49706443192.168.2.4185.250.148.35
            Nov 24, 2022 05:20:03.016508102 CET44349706185.250.148.35192.168.2.4
            Nov 24, 2022 05:20:03.072525024 CET44349706185.250.148.35192.168.2.4
            Nov 24, 2022 05:20:03.074080944 CET49707443192.168.2.4185.250.148.35
            Nov 24, 2022 05:20:03.074155092 CET44349707185.250.148.35192.168.2.4
            Nov 24, 2022 05:20:03.074337959 CET49707443192.168.2.4185.250.148.35
            Nov 24, 2022 05:20:03.075628996 CET49707443192.168.2.4185.250.148.35
            Nov 24, 2022 05:20:03.075655937 CET44349707185.250.148.35192.168.2.4
            Nov 24, 2022 05:20:03.131845951 CET44349707185.250.148.35192.168.2.4
            Nov 24, 2022 05:20:03.133225918 CET49708443192.168.2.4185.250.148.35
            Nov 24, 2022 05:20:03.133289099 CET44349708185.250.148.35192.168.2.4
            Nov 24, 2022 05:20:03.133398056 CET49708443192.168.2.4185.250.148.35
            Nov 24, 2022 05:20:03.134278059 CET49708443192.168.2.4185.250.148.35
            Nov 24, 2022 05:20:03.134324074 CET44349708185.250.148.35192.168.2.4
            Nov 24, 2022 05:20:03.191957951 CET44349708185.250.148.35192.168.2.4
            Nov 24, 2022 05:20:03.193757057 CET49709443192.168.2.4185.250.148.35
            Nov 24, 2022 05:20:03.193816900 CET44349709185.250.148.35192.168.2.4
            Nov 24, 2022 05:20:03.193898916 CET49709443192.168.2.4185.250.148.35
            Nov 24, 2022 05:20:03.194484949 CET49709443192.168.2.4185.250.148.35
            Nov 24, 2022 05:20:03.194506884 CET44349709185.250.148.35192.168.2.4
            Nov 24, 2022 05:20:03.250332117 CET44349709185.250.148.35192.168.2.4
            Nov 24, 2022 05:20:33.407180071 CET49710443192.168.2.4185.250.148.35
            Nov 24, 2022 05:20:33.407258034 CET44349710185.250.148.35192.168.2.4
            Nov 24, 2022 05:20:33.407423019 CET49710443192.168.2.4185.250.148.35
            Nov 24, 2022 05:20:33.408660889 CET49710443192.168.2.4185.250.148.35
            Nov 24, 2022 05:20:33.408710957 CET44349710185.250.148.35192.168.2.4
            Nov 24, 2022 05:20:33.463525057 CET44349710185.250.148.35192.168.2.4
            Nov 24, 2022 05:20:33.465197086 CET49711443192.168.2.4185.250.148.35
            Nov 24, 2022 05:20:33.465265036 CET44349711185.250.148.35192.168.2.4
            Nov 24, 2022 05:20:33.465380907 CET49711443192.168.2.4185.250.148.35
            Nov 24, 2022 05:20:33.466645002 CET49711443192.168.2.4185.250.148.35
            Nov 24, 2022 05:20:33.466680050 CET44349711185.250.148.35192.168.2.4
            Nov 24, 2022 05:20:33.522078991 CET44349711185.250.148.35192.168.2.4
            Nov 24, 2022 05:20:33.525345087 CET49712443192.168.2.4185.250.148.35
            Nov 24, 2022 05:20:33.525413036 CET44349712185.250.148.35192.168.2.4
            Nov 24, 2022 05:20:33.525672913 CET49712443192.168.2.4185.250.148.35
            Nov 24, 2022 05:20:33.526755095 CET49712443192.168.2.4185.250.148.35
            Nov 24, 2022 05:20:33.526801109 CET44349712185.250.148.35192.168.2.4
            Nov 24, 2022 05:20:33.582118988 CET44349712185.250.148.35192.168.2.4
            Nov 24, 2022 05:20:33.585807085 CET49713443192.168.2.4185.250.148.35
            Nov 24, 2022 05:20:33.585897923 CET44349713185.250.148.35192.168.2.4
            Nov 24, 2022 05:20:33.586055040 CET49713443192.168.2.4185.250.148.35
            Nov 24, 2022 05:20:33.586787939 CET49713443192.168.2.4185.250.148.35
            Nov 24, 2022 05:20:33.586810112 CET44349713185.250.148.35192.168.2.4
            Nov 24, 2022 05:20:33.641958952 CET44349713185.250.148.35192.168.2.4
            Nov 24, 2022 05:21:04.485233068 CET49714443192.168.2.4185.250.148.35
            Nov 24, 2022 05:21:04.485310078 CET44349714185.250.148.35192.168.2.4
            Nov 24, 2022 05:21:04.485480070 CET49714443192.168.2.4185.250.148.35
            Nov 24, 2022 05:21:04.486561060 CET49714443192.168.2.4185.250.148.35
            Nov 24, 2022 05:21:04.486601114 CET44349714185.250.148.35192.168.2.4
            Nov 24, 2022 05:21:04.541218996 CET44349714185.250.148.35192.168.2.4
            Nov 24, 2022 05:21:04.542530060 CET49715443192.168.2.4185.250.148.35
            Nov 24, 2022 05:21:04.542584896 CET44349715185.250.148.35192.168.2.4
            Nov 24, 2022 05:21:04.542787075 CET49715443192.168.2.4185.250.148.35
            Nov 24, 2022 05:21:04.543291092 CET49715443192.168.2.4185.250.148.35
            Nov 24, 2022 05:21:04.543320894 CET44349715185.250.148.35192.168.2.4
            Nov 24, 2022 05:21:04.598916054 CET44349715185.250.148.35192.168.2.4
            Nov 24, 2022 05:21:04.600245953 CET49716443192.168.2.4185.250.148.35
            Nov 24, 2022 05:21:04.600316048 CET44349716185.250.148.35192.168.2.4
            Nov 24, 2022 05:21:04.600423098 CET49716443192.168.2.4185.250.148.35
            Nov 24, 2022 05:21:04.600950003 CET49716443192.168.2.4185.250.148.35
            Nov 24, 2022 05:21:04.600979090 CET44349716185.250.148.35192.168.2.4
            Nov 24, 2022 05:21:04.668997049 CET44349716185.250.148.35192.168.2.4
            Nov 24, 2022 05:21:04.685195923 CET49717443192.168.2.4185.250.148.35
            Nov 24, 2022 05:21:04.685261965 CET44349717185.250.148.35192.168.2.4
            Nov 24, 2022 05:21:04.685632944 CET49717443192.168.2.4185.250.148.35
            Nov 24, 2022 05:21:04.686243057 CET49717443192.168.2.4185.250.148.35
            Nov 24, 2022 05:21:04.686269045 CET44349717185.250.148.35192.168.2.4
            Nov 24, 2022 05:21:04.742952108 CET44349717185.250.148.35192.168.2.4
            Nov 24, 2022 05:21:34.890145063 CET49718443192.168.2.4185.250.148.35
            Nov 24, 2022 05:21:34.890221119 CET44349718185.250.148.35192.168.2.4
            Nov 24, 2022 05:21:34.890311956 CET49718443192.168.2.4185.250.148.35
            Nov 24, 2022 05:21:34.891124010 CET49718443192.168.2.4185.250.148.35
            Nov 24, 2022 05:21:34.891169071 CET44349718185.250.148.35192.168.2.4
            Nov 24, 2022 05:21:34.949980021 CET44349718185.250.148.35192.168.2.4
            Nov 24, 2022 05:21:34.951565027 CET49719443192.168.2.4185.250.148.35
            Nov 24, 2022 05:21:34.951642990 CET44349719185.250.148.35192.168.2.4
            Nov 24, 2022 05:21:34.951733112 CET49719443192.168.2.4185.250.148.35
            Nov 24, 2022 05:21:34.952301979 CET49719443192.168.2.4185.250.148.35
            Nov 24, 2022 05:21:34.952337027 CET44349719185.250.148.35192.168.2.4
            Nov 24, 2022 05:21:35.007440090 CET44349719185.250.148.35192.168.2.4
            Nov 24, 2022 05:21:35.008912086 CET49720443192.168.2.4185.250.148.35
            Nov 24, 2022 05:21:35.008971930 CET44349720185.250.148.35192.168.2.4
            Nov 24, 2022 05:21:35.009077072 CET49720443192.168.2.4185.250.148.35
            Nov 24, 2022 05:21:35.009592056 CET49720443192.168.2.4185.250.148.35
            Nov 24, 2022 05:21:35.009608984 CET44349720185.250.148.35192.168.2.4
            Nov 24, 2022 05:21:35.066533089 CET44349720185.250.148.35192.168.2.4
            Nov 24, 2022 05:21:35.083612919 CET49721443192.168.2.4185.250.148.35
            Nov 24, 2022 05:21:35.083692074 CET44349721185.250.148.35192.168.2.4
            Nov 24, 2022 05:21:35.083832026 CET49721443192.168.2.4185.250.148.35
            Nov 24, 2022 05:21:35.084454060 CET49721443192.168.2.4185.250.148.35
            Nov 24, 2022 05:21:35.084505081 CET44349721185.250.148.35192.168.2.4
            Nov 24, 2022 05:21:35.141772032 CET44349721185.250.148.35192.168.2.4
            Nov 24, 2022 05:22:05.380898952 CET49722443192.168.2.4185.250.148.35
            Nov 24, 2022 05:22:05.380964041 CET44349722185.250.148.35192.168.2.4
            Nov 24, 2022 05:22:05.381064892 CET49722443192.168.2.4185.250.148.35
            Nov 24, 2022 05:22:05.382277966 CET49722443192.168.2.4185.250.148.35
            TimestampSource PortDest PortSource IPDest IP
            Nov 24, 2022 05:20:02.978332043 CET6100753192.168.2.48.8.8.8
            Nov 24, 2022 05:20:02.997380018 CET53610078.8.8.8192.168.2.4
            Nov 24, 2022 05:20:33.386749029 CET6068653192.168.2.48.8.8.8
            Nov 24, 2022 05:20:33.404028893 CET53606868.8.8.8192.168.2.4
            Nov 24, 2022 05:21:04.451832056 CET6112453192.168.2.48.8.8.8
            Nov 24, 2022 05:21:04.469230890 CET53611248.8.8.8192.168.2.4
            Nov 24, 2022 05:21:34.871041059 CET5944453192.168.2.48.8.8.8
            Nov 24, 2022 05:21:34.888430119 CET53594448.8.8.8192.168.2.4
            Nov 24, 2022 05:22:05.359167099 CET5557053192.168.2.48.8.8.8
            Nov 24, 2022 05:22:05.377713919 CET53555708.8.8.8192.168.2.4
            Nov 24, 2022 05:22:35.810533047 CET6490653192.168.2.48.8.8.8
            Nov 24, 2022 05:22:35.829649925 CET53649068.8.8.8192.168.2.4
            Nov 24, 2022 05:23:06.390785933 CET5944653192.168.2.48.8.8.8
            Nov 24, 2022 05:23:06.408032894 CET53594468.8.8.8192.168.2.4
            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
            Nov 24, 2022 05:20:02.978332043 CET192.168.2.48.8.8.80x362cStandard query (0)gigimas.xyzA (IP address)IN (0x0001)false
            Nov 24, 2022 05:20:33.386749029 CET192.168.2.48.8.8.80x306eStandard query (0)gigimas.xyzA (IP address)IN (0x0001)false
            Nov 24, 2022 05:21:04.451832056 CET192.168.2.48.8.8.80xfd4eStandard query (0)gigimas.xyzA (IP address)IN (0x0001)false
            Nov 24, 2022 05:21:34.871041059 CET192.168.2.48.8.8.80xbb49Standard query (0)gigimas.xyzA (IP address)IN (0x0001)false
            Nov 24, 2022 05:22:05.359167099 CET192.168.2.48.8.8.80xe9a0Standard query (0)gigimas.xyzA (IP address)IN (0x0001)false
            Nov 24, 2022 05:22:35.810533047 CET192.168.2.48.8.8.80x374bStandard query (0)gigimas.xyzA (IP address)IN (0x0001)false
            Nov 24, 2022 05:23:06.390785933 CET192.168.2.48.8.8.80x8724Standard query (0)gigimas.xyzA (IP address)IN (0x0001)false
            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
            Nov 24, 2022 05:20:02.997380018 CET8.8.8.8192.168.2.40x362cNo error (0)gigimas.xyz185.250.148.35A (IP address)IN (0x0001)false
            Nov 24, 2022 05:20:33.404028893 CET8.8.8.8192.168.2.40x306eNo error (0)gigimas.xyz185.250.148.35A (IP address)IN (0x0001)false
            Nov 24, 2022 05:21:04.469230890 CET8.8.8.8192.168.2.40xfd4eNo error (0)gigimas.xyz185.250.148.35A (IP address)IN (0x0001)false
            Nov 24, 2022 05:21:34.888430119 CET8.8.8.8192.168.2.40xbb49No error (0)gigimas.xyz185.250.148.35A (IP address)IN (0x0001)false
            Nov 24, 2022 05:22:05.377713919 CET8.8.8.8192.168.2.40xe9a0No error (0)gigimas.xyz185.250.148.35A (IP address)IN (0x0001)false
            Nov 24, 2022 05:22:35.829649925 CET8.8.8.8192.168.2.40x374bNo error (0)gigimas.xyz185.250.148.35A (IP address)IN (0x0001)false
            Nov 24, 2022 05:23:06.408032894 CET8.8.8.8192.168.2.40x8724No error (0)gigimas.xyz185.250.148.35A (IP address)IN (0x0001)false

            Click to jump to process

            Target ID:0
            Start time:05:19:01
            Start date:24/11/2022
            Path:C:\Windows\System32\loaddll64.exe
            Wow64 process (32bit):false
            Commandline:loaddll64.exe "C:\Users\user\Desktop\pzG0rkIchr.dll"
            Imagebase:0x7ff72b830000
            File size:139776 bytes
            MD5 hash:C676FC0263EDD17D4CE7D644B8F3FCD6
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:high

            Target ID:1
            Start time:05:19:02
            Start date:24/11/2022
            Path:C:\Windows\System32\conhost.exe
            Wow64 process (32bit):false
            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Imagebase:0x7ff7c72c0000
            File size:625664 bytes
            MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:high

            Target ID:2
            Start time:05:19:02
            Start date:24/11/2022
            Path:C:\Windows\System32\cmd.exe
            Wow64 process (32bit):false
            Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\pzG0rkIchr.dll",#1
            Imagebase:0x7ff632260000
            File size:273920 bytes
            MD5 hash:4E2ACF4F8A396486AB4268C94A6A245F
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:high

            Target ID:3
            Start time:05:19:02
            Start date:24/11/2022
            Path:C:\Windows\System32\regsvr32.exe
            Wow64 process (32bit):false
            Commandline:regsvr32.exe /s C:\Users\user\Desktop\pzG0rkIchr.dll
            Imagebase:0x7ff762150000
            File size:24064 bytes
            MD5 hash:D78B75FC68247E8A63ACBA846182740E
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:high

            Target ID:4
            Start time:05:19:02
            Start date:24/11/2022
            Path:C:\Windows\System32\rundll32.exe
            Wow64 process (32bit):false
            Commandline:rundll32.exe "C:\Users\user\Desktop\pzG0rkIchr.dll",#1
            Imagebase:0x7ff736ed0000
            File size:69632 bytes
            MD5 hash:73C519F050C20580F8A62C849D49215A
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:high

            Target ID:5
            Start time:05:19:02
            Start date:24/11/2022
            Path:C:\Windows\System32\rundll32.exe
            Wow64 process (32bit):false
            Commandline:rundll32.exe C:\Users\user\Desktop\pzG0rkIchr.dll,DllRegisterServer
            Imagebase:0x7ff736ed0000
            File size:69632 bytes
            MD5 hash:73C519F050C20580F8A62C849D49215A
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:high

            Target ID:6
            Start time:05:19:07
            Start date:24/11/2022
            Path:C:\Windows\System32\rundll32.exe
            Wow64 process (32bit):false
            Commandline:rundll32.exe C:\Users\user\Desktop\pzG0rkIchr.dll,ItsnPq5v
            Imagebase:0x7ff736ed0000
            File size:69632 bytes
            MD5 hash:73C519F050C20580F8A62C849D49215A
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:high

            Target ID:9
            Start time:05:19:12
            Start date:24/11/2022
            Path:C:\Windows\System32\rundll32.exe
            Wow64 process (32bit):false
            Commandline:rundll32.exe C:\Users\user\Desktop\pzG0rkIchr.dll,QlqYo259k
            Imagebase:0x7ff736ed0000
            File size:69632 bytes
            MD5 hash:73C519F050C20580F8A62C849D49215A
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language

            Target ID:11
            Start time:05:19:18
            Start date:24/11/2022
            Path:C:\Windows\System32\WerFault.exe
            Wow64 process (32bit):false
            Commandline:C:\Windows\system32\WerFault.exe -u -p 2100 -s 304
            Imagebase:0x7ff69db50000
            File size:494488 bytes
            MD5 hash:2AFFE478D86272288BBEF5A00BBEF6A0
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language

            Target ID:12
            Start time:05:19:23
            Start date:24/11/2022
            Path:C:\Windows\System32\WerFault.exe
            Wow64 process (32bit):false
            Commandline:C:\Windows\system32\WerFault.exe -u -p 1308 -s 304
            Imagebase:0x7ff69db50000
            File size:494488 bytes
            MD5 hash:2AFFE478D86272288BBEF5A00BBEF6A0
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language

            Target ID:13
            Start time:05:19:27
            Start date:24/11/2022
            Path:C:\Windows\System32\WerFault.exe
            Wow64 process (32bit):false
            Commandline:C:\Windows\system32\WerFault.exe -u -p 2100 -s 304
            Imagebase:0x7ff69db50000
            File size:494488 bytes
            MD5 hash:2AFFE478D86272288BBEF5A00BBEF6A0
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language

            Target ID:14
            Start time:05:19:42
            Start date:24/11/2022
            Path:C:\Windows\System32\WerFault.exe
            Wow64 process (32bit):false
            Commandline:C:\Windows\system32\WerFault.exe -u -p 1308 -s 304
            Imagebase:0x7ff69db50000
            File size:494488 bytes
            MD5 hash:2AFFE478D86272288BBEF5A00BBEF6A0
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language

            No disassembly