Windows Analysis Report
PYCkUgesWB.com_15e2f984de986ecb59e38a1c3a4a2300

Overview

General Information

Sample Name: PYCkUgesWB.com_15e2f984de986ecb59e38a1c3a4a2300 (renamed file extension from com_15e2f984de986ecb59e38a1c3a4a2300 to dll)
Analysis ID: 666431
MD5: 15e2f984de986ecb59e38a1c3a4a2300
SHA1: 795383a71c9030a2c52624795a1e539bfedbf84c
SHA256: 1e9a7692e74e98ac5d21a4d3bfb3696d69d8306e4e42d53bcb4604b3dff420bb
Tags: droppedexe
Infos:

Detection

Emotet
Score: 88
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

Multi AV Scanner detection for submitted file
Yara detected Emotet
System process connects to network (likely due to code injection or exploit)
Antivirus detection for URL or domain
Snort IDS alert for network traffic
C2 URLs / IPs found in malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Queries the volume information (name, serial number etc) of a device
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query locales information (e.g. system language)
Deletes files inside the Windows folder
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Creates files inside the system directory
Internet Provider seen in connection with other malware
Detected potential crypto function
Found evasive API chain (may stop execution after checking a module file name)
Contains functionality to dynamically determine API calls
Contains functionality which may be used to detect a debugger (GetProcessHeap)
IP address seen in connection with other malware
Found inlined nop instructions (likely shell or obfuscated code)
PE file contains an invalid checksum
PE file contains strange resources
Tries to load missing DLLs
Drops PE files to the windows directory (C:\Windows)
Detected TCP or UDP traffic on non-standard ports
Connects to several IPs in different countries
Registers a DLL
Queries disk information (often used to detect virtual machines)
Creates a process in suspended mode (likely to inject code)

Classification

AV Detection

barindex
Source: PYCkUgesWB.dll Virustotal: Detection: 66% Perma Link
Source: PYCkUgesWB.dll Metadefender: Detection: 42% Perma Link
Source: PYCkUgesWB.dll ReversingLabs: Detection: 80%
Source: https://174.138.33.49:7080/a Avira URL Cloud: Label: malware
Source: https://174.138.33.49:7080/s64 Avira URL Cloud: Label: malware
Source: https://174.138.33.49:7080/Num Avira URL Cloud: Label: malware
Source: https://174.138.33.49:7080/u Avira URL Cloud: Label: malware
Source: 0000000B.00000002.885655028.0000000000898000.00000004.00000020.00020000.00000000.sdmp Malware Configuration Extractor: Emotet {"C2 list": ["87.106.97.83:7080", "118.98.72.86:443", "93.104.209.107:8080", "157.230.99.206:8080", "104.244.79.94:443", "88.217.172.165:8080", "103.41.204.169:8080", "85.214.67.203:8080", "196.44.98.190:8080", "198.199.70.22:8080", "62.171.178.147:8080", "210.57.209.142:8080", "178.238.225.252:8080", "139.59.80.108:8080", "103.224.241.74:8080", "103.71.99.57:8080", "157.245.111.0:8080", "128.199.242.164:8080", "103.56.149.105:8080", "128.199.217.206:443", "85.25.120.45:8080", "190.145.8.4:443", "165.232.185.110:8080", "178.62.112.199:8080", "103.85.95.4:8080", "188.225.32.231:4143", "103.126.216.86:443", "37.44.244.177:8080", "64.227.55.231:8080", "190.107.19.179:443", "83.229.80.93:8080", "103.254.12.236:7080", "104.248.225.227:8080", "36.67.23.59:443", "43.129.209.178:443", "165.22.254.236:8080", "175.126.176.79:8080", "202.134.4.210:7080", "202.29.239.162:443", "46.101.98.60:8080", "54.37.228.122:443", "5.253.30.17:7080"], "Public Key": ["RUNTMSAAAAD0LxqDNhonUYwk8sqo7IWuUllRdUiUBnACc6romsQoe1YJD7wIe4AheqYofpZFucPDXCZ0z9i+ooUffqeoLZU0yb8XUwABAI4=", "RUNLMSAAAADYNZPXY4tQxd/N4Wn5sTYAm5tUOxY2ol1ELrI4MNhHNi640vSLasjYTHpFRBoG+o84vtr7AJachCzOHjaAJFCW6785UwAHAJM="]}
Source: C:\Windows\System32\regsvr32.exe Code function: 11_2_000000018001C9F0 FindFirstFileW,FindNextFileW, 11_2_000000018001C9F0
Source: C:\Windows\System32\loaddll64.exe Code function: 4x nop then movzx eax, byte ptr [rcx+rdx] 0_2_10005790

Networking

barindex
Source: C:\Windows\System32\regsvr32.exe Network Connect: 174.138.33.49 7080 Jump to behavior
Source: Traffic Snort IDS: 2404316 ET CNC Feodo Tracker Reported CnC Server TCP group 9 192.168.2.7:49786 -> 174.138.33.49:7080
Source: Malware configuration extractor IPs: 87.106.97.83:7080
Source: Malware configuration extractor IPs: 118.98.72.86:443
Source: Malware configuration extractor IPs: 93.104.209.107:8080
Source: Malware configuration extractor IPs: 157.230.99.206:8080
Source: Malware configuration extractor IPs: 104.244.79.94:443
Source: Malware configuration extractor IPs: 88.217.172.165:8080
Source: Malware configuration extractor IPs: 103.41.204.169:8080
Source: Malware configuration extractor IPs: 85.214.67.203:8080
Source: Malware configuration extractor IPs: 196.44.98.190:8080
Source: Malware configuration extractor IPs: 198.199.70.22:8080
Source: Malware configuration extractor IPs: 62.171.178.147:8080
Source: Malware configuration extractor IPs: 210.57.209.142:8080
Source: Malware configuration extractor IPs: 178.238.225.252:8080
Source: Malware configuration extractor IPs: 139.59.80.108:8080
Source: Malware configuration extractor IPs: 103.224.241.74:8080
Source: Malware configuration extractor IPs: 103.71.99.57:8080
Source: Malware configuration extractor IPs: 157.245.111.0:8080
Source: Malware configuration extractor IPs: 128.199.242.164:8080
Source: Malware configuration extractor IPs: 103.56.149.105:8080
Source: Malware configuration extractor IPs: 128.199.217.206:443
Source: Malware configuration extractor IPs: 85.25.120.45:8080
Source: Malware configuration extractor IPs: 190.145.8.4:443
Source: Malware configuration extractor IPs: 165.232.185.110:8080
Source: Malware configuration extractor IPs: 178.62.112.199:8080
Source: Malware configuration extractor IPs: 103.85.95.4:8080
Source: Malware configuration extractor IPs: 188.225.32.231:4143
Source: Malware configuration extractor IPs: 103.126.216.86:443
Source: Malware configuration extractor IPs: 37.44.244.177:8080
Source: Malware configuration extractor IPs: 64.227.55.231:8080
Source: Malware configuration extractor IPs: 190.107.19.179:443
Source: Malware configuration extractor IPs: 83.229.80.93:8080
Source: Malware configuration extractor IPs: 103.254.12.236:7080
Source: Malware configuration extractor IPs: 104.248.225.227:8080
Source: Malware configuration extractor IPs: 36.67.23.59:443
Source: Malware configuration extractor IPs: 43.129.209.178:443
Source: Malware configuration extractor IPs: 165.22.254.236:8080
Source: Malware configuration extractor IPs: 175.126.176.79:8080
Source: Malware configuration extractor IPs: 202.134.4.210:7080
Source: Malware configuration extractor IPs: 202.29.239.162:443
Source: Malware configuration extractor IPs: 46.101.98.60:8080
Source: Malware configuration extractor IPs: 54.37.228.122:443
Source: Malware configuration extractor IPs: 5.253.30.17:7080
Source: Joe Sandbox View ASN Name: DIGITALOCEAN-ASNUS DIGITALOCEAN-ASNUS
Source: Joe Sandbox View IP Address: 157.230.99.206 157.230.99.206
Source: global traffic TCP traffic: 192.168.2.7:49786 -> 174.138.33.49:7080
Source: unknown Network traffic detected: IP country count 19
Source: unknown TCP traffic detected without corresponding DNS query: 174.138.33.49
Source: unknown TCP traffic detected without corresponding DNS query: 174.138.33.49
Source: unknown TCP traffic detected without corresponding DNS query: 174.138.33.49
Source: unknown TCP traffic detected without corresponding DNS query: 174.138.33.49
Source: unknown TCP traffic detected without corresponding DNS query: 174.138.33.49
Source: unknown TCP traffic detected without corresponding DNS query: 174.138.33.49
Source: unknown TCP traffic detected without corresponding DNS query: 174.138.33.49
Source: unknown TCP traffic detected without corresponding DNS query: 174.138.33.49
Source: unknown TCP traffic detected without corresponding DNS query: 174.138.33.49
Source: unknown TCP traffic detected without corresponding DNS query: 174.138.33.49
Source: unknown TCP traffic detected without corresponding DNS query: 174.138.33.49
Source: svchost.exe, 0000001B.00000003.752136141.000001705656F000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: Try it free for 30 days, no strings attached\r\n\r\nLike us on Facebook: http://www.facebook.com/spotify \r\nFollow us on Twitter: http://twitter.com/spotify","ProductTitle":"Spotify - Music and Podcasts","SearchTitles":[{"SearchTitleString":"Spotify","SearchTitleType":"SearchHint"},{"SearchTitleString":"Music","SearchTitleType":"SearchHint"},{"SearchTitleString":"music apps","SearchTitleType":"SearchHint"},{"SearchTitleString":"free music","SearchTitleType":"SearchHint"},{"SearchTitleString":"podcasts","SearchTitleType":"SearchHint"},{"SearchTitleString":"streaming","SearchTitleType":"SearchHint"},{"SearchTitleString":"soundcloud","SearchTitleType":"SearchHint"}],"Language":"en-us","Markets":["US","DZ","AR","AU","AT","BH","BD","BE","BR","BG","CA","CL","CN","CO","CR","HR","CY","CZ","DK","EG","EE","FI","FR","DE","GR","GT","HK","HU","IS","IN","ID","IQ","IE","IL","IT","JP","JO","KZ","KE","KW","LV","LB","LI","LT","LU","MY","MT","MR","MX","MA","NL","NZ","NG","NO","OM","PK","PE","PH","PL","PT","QA","RO","RU","SA","RS","SG","SK","SI","ZA","KR","ES","SE","CH","TW","TH","TT","TN","TR","UA","AE","GB","VN","YE","LY","LK","UY","VE","AF","AX","AL","AS","AO","AI","AQ","AG","AM","AW","BO","BQ","BA","BW","BV","IO","BN","BF","BI","KH","CM","CV","KY","CF","TD","TL","DJ","DM","DO","EC","SV","GQ","ER","ET","FK","FO","FJ","GF","PF","TF","GA","GM","GE","GH","GI","GL","GD","GP","GU","GG","GN","GW","GY","HT","HM","HN","AZ","BS","BB","BY","BZ","BJ","BM","BT","KM","CG","CD","CK","CX","CC","CI","CW","JM","SJ","JE","KI","KG","LA","LS","LR","MO","MK","MG","MW","IM","MH","MQ","MU","YT","FM","MD","MN","MS","MZ","MM","NA","NR","NP","MV","ML","NC","NI","NE","NU","NF","PW","PS","PA","PG","PY","RE","RW","BL","MF","WS","ST","SN","MP","PN","SX","SB","SO","SC","SL","GS","SH","KN","LC","PM","VC","TJ","TZ","TG","TK","TO","TM","TC","TV","UM","UG", equals www.facebook.com (Facebook)
Source: svchost.exe, 0000001B.00000003.752136141.000001705656F000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: Try it free for 30 days, no strings attached\r\n\r\nLike us on Facebook: http://www.facebook.com/spotify \r\nFollow us on Twitter: http://twitter.com/spotify","ProductTitle":"Spotify - Music and Podcasts","SearchTitles":[{"SearchTitleString":"Spotify","SearchTitleType":"SearchHint"},{"SearchTitleString":"Music","SearchTitleType":"SearchHint"},{"SearchTitleString":"music apps","SearchTitleType":"SearchHint"},{"SearchTitleString":"free music","SearchTitleType":"SearchHint"},{"SearchTitleString":"podcasts","SearchTitleType":"SearchHint"},{"SearchTitleString":"streaming","SearchTitleType":"SearchHint"},{"SearchTitleString":"soundcloud","SearchTitleType":"SearchHint"}],"Language":"en-us","Markets":["US","DZ","AR","AU","AT","BH","BD","BE","BR","BG","CA","CL","CN","CO","CR","HR","CY","CZ","DK","EG","EE","FI","FR","DE","GR","GT","HK","HU","IS","IN","ID","IQ","IE","IL","IT","JP","JO","KZ","KE","KW","LV","LB","LI","LT","LU","MY","MT","MR","MX","MA","NL","NZ","NG","NO","OM","PK","PE","PH","PL","PT","QA","RO","RU","SA","RS","SG","SK","SI","ZA","KR","ES","SE","CH","TW","TH","TT","TN","TR","UA","AE","GB","VN","YE","LY","LK","UY","VE","AF","AX","AL","AS","AO","AI","AQ","AG","AM","AW","BO","BQ","BA","BW","BV","IO","BN","BF","BI","KH","CM","CV","KY","CF","TD","TL","DJ","DM","DO","EC","SV","GQ","ER","ET","FK","FO","FJ","GF","PF","TF","GA","GM","GE","GH","GI","GL","GD","GP","GU","GG","GN","GW","GY","HT","HM","HN","AZ","BS","BB","BY","BZ","BJ","BM","BT","KM","CG","CD","CK","CX","CC","CI","CW","JM","SJ","JE","KI","KG","LA","LS","LR","MO","MK","MG","MW","IM","MH","MQ","MU","YT","FM","MD","MN","MS","MZ","MM","NA","NR","NP","MV","ML","NC","NI","NE","NU","NF","PW","PS","PA","PG","PY","RE","RW","BL","MF","WS","ST","SN","MP","PN","SX","SB","SO","SC","SL","GS","SH","KN","LC","PM","VC","TJ","TZ","TG","TK","TO","TM","TC","TV","UM","UG", equals www.twitter.com (Twitter)
Source: svchost.exe, 0000001B.00000003.752174346.0000017056580000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001B.00000003.752136141.000001705656F000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: Try it free for 30 days, no strings attached\r\n\r\nLike us on Facebook: http://www.facebook.com/spotify \r\nFollow us on Twitter: http://twitter.com/spotify","ProductTitle":"Spotify - Music and Podcasts","SearchTitles":[{"SearchTitleString":"Spotify","SearchTitleType":"SearchHint"},{"SearchTitleString":"Music","SearchTitleType":"SearchHint"},{"SearchTitleString":"music apps","SearchTitleType":"SearchHint"},{"SearchTitleString":"free music","SearchTitleType":"SearchHint"},{"SearchTitleString":"podcasts","SearchTitleType":"SearchHint"},{"SearchTitleString":"streaming","SearchTitleType":"SearchHint"},{"SearchTitleString":"soundcloud","SearchTitleType":"SearchHint"}],"Language":"en-us","Markets":["US","DZ","AR","AU","AT","BH","BD","BE","BR","BG","CA","CL","CN","CO","CR","HR","CY","CZ","DK","EG","EE","FI","FR","DE","GR","GT","HK","HU","IS","IN","ID","IQ","IE","IL","IT","JP","JO","KZ","KE","KW","LV","LB","LI","LT","LU","MY","MT","MR","MX","MA","NL","NZ","NG","NO","OM","PK","PE","PH","PL","PT","QA","RO","RU","SA","RS","SG","SK","SI","ZA","KR","ES","SE","CH","TW","TH","TT","TN","TR","UA","AE","GB","VN","YE","LY","LK","UY","VE","AF","AX","AL","AS","AO","AI","AQ","AG","AM","AW","BO","BQ","BA","BW","BV","IO","BN","BF","BI","KH","CM","CV","KY","CF","TD","TL","DJ","DM","DO","EC","SV","GQ","ER","ET","FK","FO","FJ","GF","PF","TF","GA","GM","GE","GH","GI","GL","GD","GP","GU","GG","GN","GW","GY","HT","HM","HN","AZ","BS","BB","BY","BZ","BJ","BM","BT","KM","CG","CD","CK","CX","CC","CI","CW","JM","SJ","JE","KI","KG","LA","LS","LR","MO","MK","MG","MW","IM","MH","MQ","MU","YT","FM","MD","MN","MS","MZ","MM","NA","NR","NP","MV","ML","NC","NI","NE","NU","NF","PW","PS","PA","PG","PY","RE","RW","BL","MF","WS","ST","SN","MP","PN","SX","SB","SO","SC","SL","GS","SH","KN","LC","PM","VC","TJ","TZ","TG","TK","TO","TM","TC","TV","UM","UG","VI","VG","WF","EH","ZM","ZW","UZ","VU","SR","SZ","AD","MC","SM","ME","VA","NEUTRAL"]}],"MarketProperties":[{"RelatedProducts":[],"Markets":["US"]}],"ProductASchema":"Product;3","ProductBSchema":"ProductUnifiedApp;3","ProductId":"9NCBCSZSJRSB","Properties":{"PackageFamilyName":"SpotifyAB.SpotifyMusic_zpdnekdrzrea0","PackageIdentityName":"SpotifyAB.SpotifyMusic","PublisherCertificateName":"CN=453637B3-4E12-4CDF-B0D3-2A3C863BF6EF","XboxCrossGenSetId":null,"XboxConsoleGenOptimized":null,"XboxConsoleGenCompatible":null},"AlternateIds":[{"IdType":"LegacyWindowsStoreProductId","Value":"ceac5d3f-8a4f-40e1-9a67-76d9108c7cb5"},{"IdType":"LegacyWindowsPhoneProductId","Value":"caac1b9d-621b-4f96-b143-e10e1397740a"},{"IdType":"XboxTitleId","Value":"1681279293"}],"IngestionSource":"DCE","IsMicrosoftProduct":false,"PreferredSkuId":"0010","ProductType":"Application","ValidationData":{"PassedValidation":false,"RevisionId":"2022-07-11T16:37:37.4991749Z||.||58dfb4d5-be7e-424e-8739-cac99224843f||1152921505695035586||Null||fullrelease","ValidationResultUri":""},"MerchandizingTags":[],"PartD":"","ProductFamily":"Apps","ProductKind":"Application","DisplaySkuAvailab
Source: svchost.exe, 0000001B.00000003.752174346.0000017056580000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001B.00000003.752136141.000001705656F000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: Try it free for 30 days, no strings attached\r\n\r\nLike us on Facebook: http://www.facebook.com/spotify \r\nFollow us on Twitter: http://twitter.com/spotify","ProductTitle":"Spotify - Music and Podcasts","SearchTitles":[{"SearchTitleString":"Spotify","SearchTitleType":"SearchHint"},{"SearchTitleString":"Music","SearchTitleType":"SearchHint"},{"SearchTitleString":"music apps","SearchTitleType":"SearchHint"},{"SearchTitleString":"free music","SearchTitleType":"SearchHint"},{"SearchTitleString":"podcasts","SearchTitleType":"SearchHint"},{"SearchTitleString":"streaming","SearchTitleType":"SearchHint"},{"SearchTitleString":"soundcloud","SearchTitleType":"SearchHint"}],"Language":"en-us","Markets":["US","DZ","AR","AU","AT","BH","BD","BE","BR","BG","CA","CL","CN","CO","CR","HR","CY","CZ","DK","EG","EE","FI","FR","DE","GR","GT","HK","HU","IS","IN","ID","IQ","IE","IL","IT","JP","JO","KZ","KE","KW","LV","LB","LI","LT","LU","MY","MT","MR","MX","MA","NL","NZ","NG","NO","OM","PK","PE","PH","PL","PT","QA","RO","RU","SA","RS","SG","SK","SI","ZA","KR","ES","SE","CH","TW","TH","TT","TN","TR","UA","AE","GB","VN","YE","LY","LK","UY","VE","AF","AX","AL","AS","AO","AI","AQ","AG","AM","AW","BO","BQ","BA","BW","BV","IO","BN","BF","BI","KH","CM","CV","KY","CF","TD","TL","DJ","DM","DO","EC","SV","GQ","ER","ET","FK","FO","FJ","GF","PF","TF","GA","GM","GE","GH","GI","GL","GD","GP","GU","GG","GN","GW","GY","HT","HM","HN","AZ","BS","BB","BY","BZ","BJ","BM","BT","KM","CG","CD","CK","CX","CC","CI","CW","JM","SJ","JE","KI","KG","LA","LS","LR","MO","MK","MG","MW","IM","MH","MQ","MU","YT","FM","MD","MN","MS","MZ","MM","NA","NR","NP","MV","ML","NC","NI","NE","NU","NF","PW","PS","PA","PG","PY","RE","RW","BL","MF","WS","ST","SN","MP","PN","SX","SB","SO","SC","SL","GS","SH","KN","LC","PM","VC","TJ","TZ","TG","TK","TO","TM","TC","TV","UM","UG","VI","VG","WF","EH","ZM","ZW","UZ","VU","SR","SZ","AD","MC","SM","ME","VA","NEUTRAL"]}],"MarketProperties":[{"RelatedProducts":[],"Markets":["US"]}],"ProductASchema":"Product;3","ProductBSchema":"ProductUnifiedApp;3","ProductId":"9NCBCSZSJRSB","Properties":{"PackageFamilyName":"SpotifyAB.SpotifyMusic_zpdnekdrzrea0","PackageIdentityName":"SpotifyAB.SpotifyMusic","PublisherCertificateName":"CN=453637B3-4E12-4CDF-B0D3-2A3C863BF6EF","XboxCrossGenSetId":null,"XboxConsoleGenOptimized":null,"XboxConsoleGenCompatible":null},"AlternateIds":[{"IdType":"LegacyWindowsStoreProductId","Value":"ceac5d3f-8a4f-40e1-9a67-76d9108c7cb5"},{"IdType":"LegacyWindowsPhoneProductId","Value":"caac1b9d-621b-4f96-b143-e10e1397740a"},{"IdType":"XboxTitleId","Value":"1681279293"}],"IngestionSource":"DCE","IsMicrosoftProduct":false,"PreferredSkuId":"0010","ProductType":"Application","ValidationData":{"PassedValidation":false,"RevisionId":"2022-07-11T16:37:37.4991749Z||.||58dfb4d5-be7e-424e-8739-cac99224843f||1152921505695035586||Null||fullrelease","ValidationResultUri":""},"MerchandizingTags":[],"PartD":"","ProductFamily":"Apps","ProductKind":"Application","DisplaySkuAvailab
Source: regsvr32.exe, 0000000B.00000003.802858560.000000000092E000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000B.00000002.886096275.000000000092E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000012.00000002.887267999.000001897A662000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001B.00000003.777530501.000001705650B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001B.00000002.804759431.000001705650C000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://crl.globalsign.net/root-r2.crl0
Source: svchost.exe, 0000001B.00000002.804530802.0000017055AEA000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://crl.ver)
Source: regsvr32.exe, 0000000B.00000002.885967879.00000000008F6000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000B.00000003.803132902.00000000008F6000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en
Source: regsvr32.exe, 0000000B.00000003.802910460.000000000095B000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000B.00000002.885863277.00000000008CD000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000B.00000003.803078720.00000000008CD000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000B.00000002.886221388.000000000095B000.00000004.00000020.00020000.00000000.sdmp, 77EC63BDA74BD0D0E0426DC8F80085060.11.dr String found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
Source: regsvr32.exe, 0000000B.00000003.574519632.000000000097A000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://ctldl.windowsupdate.com:80/msdownload/update/v3/static/trustedr/en/authrootstl.cab?3a38e22c22
Source: svchost.exe, 0000001B.00000003.776121457.00000170565B0000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://help.disneyplus.com.
Source: svchost.exe, 00000012.00000002.886351225.0000018974CAB000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/0
Source: svchost.exe, 00000012.00000002.886351225.0000018974CAB000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addres
Source: regsvr32.exe, 0000000B.00000003.803078720.00000000008CD000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://174.138.33.49/
Source: regsvr32.exe, 0000000B.00000002.885863277.00000000008CD000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000B.00000003.803078720.00000000008CD000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://174.138.33.49:7080/
Source: regsvr32.exe, 0000000B.00000002.885863277.00000000008CD000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000B.00000003.803078720.00000000008CD000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://174.138.33.49:7080/Num
Source: regsvr32.exe, 0000000B.00000002.885863277.00000000008CD000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000B.00000003.803078720.00000000008CD000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://174.138.33.49:7080/a
Source: regsvr32.exe, 0000000B.00000002.885863277.00000000008CD000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000B.00000003.803078720.00000000008CD000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://174.138.33.49:7080/s64
Source: regsvr32.exe, 0000000B.00000002.885863277.00000000008CD000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000B.00000003.803078720.00000000008CD000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://174.138.33.49:7080/u
Source: svchost.exe, 0000001B.00000003.776121457.00000170565B0000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://disneyplus.com/legal.
Source: svchost.exe, 0000001B.00000003.772609747.0000017056585000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001B.00000003.772596708.0000017056582000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001B.00000003.771116472.00000170565B0000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001B.00000003.771585831.000001705657C000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001B.00000003.771543494.000001705657B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001B.00000003.771348384.000001705659E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001B.00000003.771440016.000001705657B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001B.00000003.771293341.0000017056A1A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001B.00000003.771489113.000001705657B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001B.00000003.771257487.0000017056A1A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001B.00000003.771315826.0000017056A02000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001B.00000003.771513285.000001705657C000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001B.00000003.771024338.000001705659E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001B.00000003.771224165.00000170565BA000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001B.00000003.771633828.0000017056580000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://support.hotspotshield.com/
Source: svchost.exe, 0000001B.00000003.776121457.00000170565B0000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://www.disneyplus.com/legal/privacy-policy
Source: svchost.exe, 0000001B.00000003.776121457.00000170565B0000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://www.disneyplus.com/legal/your-california-privacy-rights
Source: svchost.exe, 0000001B.00000003.772609747.0000017056585000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001B.00000003.772596708.0000017056582000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001B.00000003.771116472.00000170565B0000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001B.00000003.771585831.000001705657C000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001B.00000003.771543494.000001705657B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001B.00000003.771348384.000001705659E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001B.00000003.771440016.000001705657B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001B.00000003.771293341.0000017056A1A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001B.00000003.771489113.000001705657B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001B.00000003.771257487.0000017056A1A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001B.00000003.771315826.0000017056A02000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001B.00000003.771513285.000001705657C000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001B.00000003.771024338.000001705659E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001B.00000003.771224165.00000170565BA000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001B.00000003.771633828.0000017056580000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://www.hotspotshield.com/terms/
Source: svchost.exe, 0000001B.00000003.772609747.0000017056585000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001B.00000003.772596708.0000017056582000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001B.00000003.771116472.00000170565B0000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001B.00000003.771585831.000001705657C000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001B.00000003.771543494.000001705657B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001B.00000003.771348384.000001705659E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001B.00000003.771440016.000001705657B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001B.00000003.771293341.0000017056A1A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001B.00000003.771489113.000001705657B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001B.00000003.771257487.0000017056A1A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001B.00000003.771315826.0000017056A02000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001B.00000003.771513285.000001705657C000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001B.00000003.771024338.000001705659E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001B.00000003.771224165.00000170565BA000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001B.00000003.771633828.0000017056580000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://www.pango.co/privacy
Source: svchost.exe, 0000001B.00000003.781191744.000001705659E000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://www.tiktok.com/legal/report/feedback

E-Banking Fraud

barindex
Source: Yara match File source: 3.2.rundll32.exe.20500010000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 4.2.rundll32.exe.1b23e930000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 0.2.loaddll64.exe.1e200010000.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 6.2.rundll32.exe.21dbea20000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 11.2.regsvr32.exe.2310000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 0.2.loaddll64.exe.1e200010000.1.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 11.2.regsvr32.exe.2310000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 6.2.rundll32.exe.21dbea20000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 2.2.regsvr32.exe.1580000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 2.2.regsvr32.exe.1580000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 5.2.rundll32.exe.1ec47bf0000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 5.2.rundll32.exe.1ec47bf0000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 4.2.rundll32.exe.1b23e930000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 3.2.rundll32.exe.20500010000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 00000000.00000002.492629360.000001E200010000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000002.00000002.479464350.0000000001580000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000002.492455276.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000005.00000002.477702534.000001EC47BF0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000B.00000002.887240071.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000005.00000002.477040143.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000004.00000002.466000340.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000B.00000002.886485279.0000000002310000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000004.00000002.466138189.000001B23E930000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000006.00000002.485258322.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000002.466579273.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000002.00000002.479882020.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000006.00000002.487464916.0000021DBEA20000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000002.466935474.0000020500010000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
Source: C:\Windows\System32\regsvr32.exe File deleted: C:\Windows\System32\XSYhmb\vuKI.dll:Zone.Identifier Jump to behavior
Source: C:\Windows\System32\loaddll64.exe File created: C:\Windows\system32\AfzDfnhsGeYDyd\ Jump to behavior
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_10009F20 0_2_10009F20
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_10001E60 0_2_10001E60
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_000000018001A804 0_2_000000018001A804
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_0000000180017414 0_2_0000000180017414
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_000000018000CCC8 0_2_000000018000CCC8
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_000000018001BD64 0_2_000000018001BD64
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_0000000180027E28 0_2_0000000180027E28
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_000000018002B6BC 0_2_000000018002B6BC
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_000000018001EB08 0_2_000000018001EB08
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_0000000180005B18 0_2_0000000180005B18
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_0000000180018B3C 0_2_0000000180018B3C
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_0000000180011B88 0_2_0000000180011B88
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_000000018000AFE4 0_2_000000018000AFE4
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_000000018000B3E4 0_2_000000018000B3E4
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_00000001800213FC 0_2_00000001800213FC
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_000000018001A408 0_2_000000018001A408
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_000000018000BC08 0_2_000000018000BC08
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_0000000180001014 0_2_0000000180001014
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_0000000180016418 0_2_0000000180016418
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_0000000180024020 0_2_0000000180024020
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_0000000180002820 0_2_0000000180002820
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_000000018001B028 0_2_000000018001B028
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_0000000180017C30 0_2_0000000180017C30
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_0000000180022C48 0_2_0000000180022C48
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_0000000180004848 0_2_0000000180004848
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_000000018002344C 0_2_000000018002344C
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_000000018001484C 0_2_000000018001484C
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_0000000180015C50 0_2_0000000180015C50
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_000000018000F850 0_2_000000018000F850
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_000000018000C458 0_2_000000018000C458
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_0000000180004C64 0_2_0000000180004C64
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_0000000180020C68 0_2_0000000180020C68
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_0000000180010C68 0_2_0000000180010C68
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_000000018001406C 0_2_000000018001406C
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_000000018001FC70 0_2_000000018001FC70
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_0000000180004078 0_2_0000000180004078
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_0000000180005484 0_2_0000000180005484
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_000000018002A088 0_2_000000018002A088
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_0000000180023894 0_2_0000000180023894
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_00000001800114A0 0_2_00000001800114A0
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_000000018001E4A8 0_2_000000018001E4A8
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_0000000180007CAC 0_2_0000000180007CAC
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_00000001800030BC 0_2_00000001800030BC
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_000000018001C8C0 0_2_000000018001C8C0
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_00000001800178C4 0_2_00000001800178C4
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_000000018001D4D0 0_2_000000018001D4D0
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_00000001800090D4 0_2_00000001800090D4
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_00000001800284DC 0_2_00000001800284DC
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_0000000180008CE0 0_2_0000000180008CE0
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_00000001800124E4 0_2_00000001800124E4
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_0000000180003CE8 0_2_0000000180003CE8
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_000000018002B0EC 0_2_000000018002B0EC
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_000000018001ACEC 0_2_000000018001ACEC
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_000000018000B0F8 0_2_000000018000B0F8
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_0000000180016110 0_2_0000000180016110
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_0000000180024918 0_2_0000000180024918
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_0000000180013D1C 0_2_0000000180013D1C
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_000000018002BD20 0_2_000000018002BD20
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_0000000180026520 0_2_0000000180026520
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_000000018000BD24 0_2_000000018000BD24
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_0000000180021D2C 0_2_0000000180021D2C
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_000000018000D92C 0_2_000000018000D92C
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_000000018001A130 0_2_000000018001A130
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_000000018002093C 0_2_000000018002093C
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_0000000180017144 0_2_0000000180017144
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_0000000180004948 0_2_0000000180004948
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_000000018001B558 0_2_000000018001B558
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_000000018002155C 0_2_000000018002155C
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_0000000180019D5C 0_2_0000000180019D5C
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_000000018002796C 0_2_000000018002796C
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_000000018002B570 0_2_000000018002B570
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_0000000180016978 0_2_0000000180016978
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_0000000180010578 0_2_0000000180010578
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_000000018000F580 0_2_000000018000F580
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_000000018000ED84 0_2_000000018000ED84
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_0000000180028990 0_2_0000000180028990
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_0000000180014594 0_2_0000000180014594
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_0000000180016594 0_2_0000000180016594
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_0000000180005198 0_2_0000000180005198
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_0000000180029DA8 0_2_0000000180029DA8
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_00000001800041A8 0_2_00000001800041A8
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_000000018000B1A8 0_2_000000018000B1A8
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_000000018001C5AC 0_2_000000018001C5AC
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_0000000180017DB0 0_2_0000000180017DB0
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_0000000180020DBC 0_2_0000000180020DBC
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_00000001800129BC 0_2_00000001800129BC
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_0000000180002DC0 0_2_0000000180002DC0
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_000000018001D9C4 0_2_000000018001D9C4
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_0000000180023DD4 0_2_0000000180023DD4
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_00000001800025D8 0_2_00000001800025D8
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_000000018001C9F0 0_2_000000018001C9F0
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_00000001800031F0 0_2_00000001800031F0
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_00000001800199F4 0_2_00000001800199F4
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_0000000180022E04 0_2_0000000180022E04
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_0000000180013210 0_2_0000000180013210
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_0000000180013610 0_2_0000000180013610
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_0000000180013E18 0_2_0000000180013E18
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_000000018001F61C 0_2_000000018001F61C
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_000000018001D620 0_2_000000018001D620
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_000000018001762C 0_2_000000018001762C
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_0000000180025E30 0_2_0000000180025E30
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_0000000180022638 0_2_0000000180022638
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_000000018001F238 0_2_000000018001F238
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_0000000180029A40 0_2_0000000180029A40
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_000000018001D254 0_2_000000018001D254
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_000000018000E254 0_2_000000018000E254
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_000000018000FE58 0_2_000000018000FE58
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_000000018001EE5C 0_2_000000018001EE5C
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_0000000180010680 0_2_0000000180010680
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_000000018002BE90 0_2_000000018002BE90
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_000000018000F290 0_2_000000018000F290
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_000000018000B698 0_2_000000018000B698
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_0000000180006698 0_2_0000000180006698
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_000000018002369C 0_2_000000018002369C
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_0000000180003A9C 0_2_0000000180003A9C
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_00000001800276A4 0_2_00000001800276A4
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_00000001800216A8 0_2_00000001800216A8
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_00000001800146B4 0_2_00000001800146B4
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_000000018000B2BC 0_2_000000018000B2BC
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_0000000180019EC0 0_2_0000000180019EC0
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_0000000180020AC4 0_2_0000000180020AC4
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_000000018000FAD0 0_2_000000018000FAD0
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_0000000180021AE0 0_2_0000000180021AE0
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_00000001800072E0 0_2_00000001800072E0
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_00000001800036E0 0_2_00000001800036E0
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_0000000180002AE4 0_2_0000000180002AE4
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_0000000180028EE8 0_2_0000000180028EE8
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_0000000180024EF4 0_2_0000000180024EF4
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_00000001800212FC 0_2_00000001800212FC
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_0000000180022AFC 0_2_0000000180022AFC
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_000000018000D300 0_2_000000018000D300
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_000000018002A304 0_2_000000018002A304
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_0000000180023304 0_2_0000000180023304
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_0000000180002708 0_2_0000000180002708
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_0000000180019720 0_2_0000000180019720
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_000000018001C720 0_2_000000018001C720
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_0000000180013724 0_2_0000000180013724
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_0000000180017B24 0_2_0000000180017B24
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_0000000180028B28 0_2_0000000180028B28
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_000000018002632C 0_2_000000018002632C
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_0000000180024330 0_2_0000000180024330
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_0000000180022F3C 0_2_0000000180022F3C
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_0000000180026F3C 0_2_0000000180026F3C
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_0000000180026B40 0_2_0000000180026B40
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_0000000180003F40 0_2_0000000180003F40
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_0000000180008F5C 0_2_0000000180008F5C
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_0000000180010B60 0_2_0000000180010B60
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_000000018001F764 0_2_000000018001F764
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_0000000180014368 0_2_0000000180014368
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_0000000180001368 0_2_0000000180001368
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_000000018000CB6C 0_2_000000018000CB6C
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_000000018000DB74 0_2_000000018000DB74
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_0000000180012F94 0_2_0000000180012F94
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_000000018001E7A4 0_2_000000018001E7A4
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_00000001800127A4 0_2_00000001800127A4
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_000000018001EFAC 0_2_000000018001EFAC
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_00000001800093AC 0_2_00000001800093AC
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_0000000180013BB4 0_2_0000000180013BB4
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_0000000180007BB4 0_2_0000000180007BB4
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_000000018000DFCC 0_2_000000018000DFCC
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_000000018000EFCC 0_2_000000018000EFCC
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_00000001800207D0 0_2_00000001800207D0
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_000000018001ABD8 0_2_000000018001ABD8
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_00000001800193E0 0_2_00000001800193E0
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_000001E200000000 0_2_000001E200000000
Source: C:\Windows\System32\regsvr32.exe Code function: 2_2_01570000 2_2_01570000
Source: C:\Windows\System32\regsvr32.exe Code function: 2_2_000000018001A804 2_2_000000018001A804
Source: C:\Windows\System32\regsvr32.exe Code function: 2_2_0000000180017414 2_2_0000000180017414
Source: C:\Windows\System32\regsvr32.exe Code function: 2_2_000000018001FC70 2_2_000000018001FC70
Source: C:\Windows\System32\regsvr32.exe Code function: 2_2_000000018001C8C0 2_2_000000018001C8C0
Source: C:\Windows\System32\regsvr32.exe Code function: 2_2_000000018000CCC8 2_2_000000018000CCC8
Source: C:\Windows\System32\regsvr32.exe Code function: 2_2_000000018001BD64 2_2_000000018001BD64
Source: C:\Windows\System32\regsvr32.exe Code function: 2_2_0000000180027E28 2_2_0000000180027E28
Source: C:\Windows\System32\regsvr32.exe Code function: 2_2_000000018002B6BC 2_2_000000018002B6BC
Source: C:\Windows\System32\regsvr32.exe Code function: 2_2_000000018001EB08 2_2_000000018001EB08
Source: C:\Windows\System32\regsvr32.exe Code function: 2_2_0000000180005B18 2_2_0000000180005B18
Source: C:\Windows\System32\regsvr32.exe Code function: 2_2_0000000180018B3C 2_2_0000000180018B3C
Source: C:\Windows\System32\regsvr32.exe Code function: 2_2_0000000180011B88 2_2_0000000180011B88
Source: C:\Windows\System32\regsvr32.exe Code function: 2_2_000000018000AFE4 2_2_000000018000AFE4
Source: C:\Windows\System32\regsvr32.exe Code function: 2_2_000000018000B3E4 2_2_000000018000B3E4
Source: C:\Windows\System32\regsvr32.exe Code function: 2_2_00000001800213FC 2_2_00000001800213FC
Source: C:\Windows\System32\regsvr32.exe Code function: 2_2_000000018001A408 2_2_000000018001A408
Source: C:\Windows\System32\regsvr32.exe Code function: 2_2_000000018000BC08 2_2_000000018000BC08
Source: C:\Windows\System32\regsvr32.exe Code function: 2_2_0000000180001014 2_2_0000000180001014
Source: C:\Windows\System32\regsvr32.exe Code function: 2_2_0000000180016418 2_2_0000000180016418
Source: C:\Windows\System32\regsvr32.exe Code function: 2_2_0000000180024020 2_2_0000000180024020
Source: C:\Windows\System32\regsvr32.exe Code function: 2_2_0000000180002820 2_2_0000000180002820
Source: C:\Windows\System32\regsvr32.exe Code function: 2_2_000000018001B028 2_2_000000018001B028
Source: C:\Windows\System32\regsvr32.exe Code function: 2_2_0000000180017C30 2_2_0000000180017C30
Source: C:\Windows\System32\regsvr32.exe Code function: 2_2_0000000180022C48 2_2_0000000180022C48
Source: C:\Windows\System32\regsvr32.exe Code function: 2_2_0000000180004848 2_2_0000000180004848
Source: C:\Windows\System32\regsvr32.exe Code function: 2_2_000000018002344C 2_2_000000018002344C
Source: C:\Windows\System32\regsvr32.exe Code function: 2_2_000000018001484C 2_2_000000018001484C
Source: C:\Windows\System32\regsvr32.exe Code function: 2_2_0000000180015C50 2_2_0000000180015C50
Source: C:\Windows\System32\regsvr32.exe Code function: 2_2_000000018000F850 2_2_000000018000F850
Source: C:\Windows\System32\regsvr32.exe Code function: 2_2_000000018000C458 2_2_000000018000C458
Source: C:\Windows\System32\regsvr32.exe Code function: 2_2_0000000180004C64 2_2_0000000180004C64
Source: C:\Windows\System32\regsvr32.exe Code function: 2_2_0000000180020C68 2_2_0000000180020C68
Source: C:\Windows\System32\regsvr32.exe Code function: 2_2_0000000180010C68 2_2_0000000180010C68
Source: C:\Windows\System32\regsvr32.exe Code function: 2_2_000000018001406C 2_2_000000018001406C
Source: C:\Windows\System32\regsvr32.exe Code function: 2_2_0000000180004078 2_2_0000000180004078
Source: C:\Windows\System32\regsvr32.exe Code function: 2_2_0000000180005484 2_2_0000000180005484
Source: C:\Windows\System32\regsvr32.exe Code function: 2_2_000000018002A088 2_2_000000018002A088
Source: C:\Windows\System32\regsvr32.exe Code function: 2_2_0000000180023894 2_2_0000000180023894
Source: C:\Windows\System32\regsvr32.exe Code function: 2_2_00000001800114A0 2_2_00000001800114A0
Source: C:\Windows\System32\regsvr32.exe Code function: 2_2_000000018001E4A8 2_2_000000018001E4A8
Source: C:\Windows\System32\regsvr32.exe Code function: 2_2_0000000180007CAC 2_2_0000000180007CAC
Source: C:\Windows\System32\regsvr32.exe Code function: 2_2_00000001800030BC 2_2_00000001800030BC
Source: C:\Windows\System32\regsvr32.exe Code function: 2_2_00000001800178C4 2_2_00000001800178C4
Source: C:\Windows\System32\regsvr32.exe Code function: 2_2_000000018001D4D0 2_2_000000018001D4D0
Source: C:\Windows\System32\regsvr32.exe Code function: 2_2_00000001800090D4 2_2_00000001800090D4
Source: C:\Windows\System32\regsvr32.exe Code function: 2_2_00000001800284DC 2_2_00000001800284DC
Source: C:\Windows\System32\regsvr32.exe Code function: 2_2_0000000180008CE0 2_2_0000000180008CE0
Source: C:\Windows\System32\regsvr32.exe Code function: 2_2_00000001800124E4 2_2_00000001800124E4
Source: C:\Windows\System32\regsvr32.exe Code function: 2_2_0000000180003CE8 2_2_0000000180003CE8
Source: C:\Windows\System32\regsvr32.exe Code function: 2_2_000000018002B0EC 2_2_000000018002B0EC
Source: C:\Windows\System32\regsvr32.exe Code function: 2_2_000000018001ACEC 2_2_000000018001ACEC
Source: C:\Windows\System32\regsvr32.exe Code function: 2_2_000000018000B0F8 2_2_000000018000B0F8
Source: C:\Windows\System32\regsvr32.exe Code function: 2_2_0000000180016110 2_2_0000000180016110
Source: C:\Windows\System32\regsvr32.exe Code function: 2_2_0000000180024918 2_2_0000000180024918
Source: C:\Windows\System32\regsvr32.exe Code function: 2_2_0000000180013D1C 2_2_0000000180013D1C
Source: C:\Windows\System32\regsvr32.exe Code function: 2_2_000000018002BD20 2_2_000000018002BD20
Source: C:\Windows\System32\regsvr32.exe Code function: 2_2_0000000180026520 2_2_0000000180026520
Source: C:\Windows\System32\regsvr32.exe Code function: 2_2_000000018000BD24 2_2_000000018000BD24
Source: C:\Windows\System32\regsvr32.exe Code function: 2_2_0000000180021D2C 2_2_0000000180021D2C
Source: C:\Windows\System32\regsvr32.exe Code function: 2_2_000000018000D92C 2_2_000000018000D92C
Source: C:\Windows\System32\regsvr32.exe Code function: 2_2_000000018001A130 2_2_000000018001A130
Source: C:\Windows\System32\regsvr32.exe Code function: 2_2_000000018002093C 2_2_000000018002093C
Source: C:\Windows\System32\regsvr32.exe Code function: 2_2_0000000180017144 2_2_0000000180017144
Source: C:\Windows\System32\regsvr32.exe Code function: 2_2_0000000180004948 2_2_0000000180004948
Source: C:\Windows\System32\regsvr32.exe Code function: 2_2_000000018001B558 2_2_000000018001B558
Source: C:\Windows\System32\regsvr32.exe Code function: 2_2_000000018002155C 2_2_000000018002155C
Source: C:\Windows\System32\regsvr32.exe Code function: 2_2_0000000180019D5C 2_2_0000000180019D5C
Source: C:\Windows\System32\regsvr32.exe Code function: 2_2_000000018002796C 2_2_000000018002796C
Source: C:\Windows\System32\regsvr32.exe Code function: 2_2_000000018002B570 2_2_000000018002B570
Source: C:\Windows\System32\regsvr32.exe Code function: 2_2_0000000180016978 2_2_0000000180016978
Source: C:\Windows\System32\regsvr32.exe Code function: 2_2_0000000180010578 2_2_0000000180010578
Source: C:\Windows\System32\regsvr32.exe Code function: 2_2_000000018000F580 2_2_000000018000F580
Source: C:\Windows\System32\regsvr32.exe Code function: 2_2_000000018000ED84 2_2_000000018000ED84
Source: C:\Windows\System32\regsvr32.exe Code function: 2_2_0000000180028990 2_2_0000000180028990
Source: C:\Windows\System32\regsvr32.exe Code function: 2_2_0000000180014594 2_2_0000000180014594
Source: C:\Windows\System32\regsvr32.exe Code function: 2_2_0000000180016594 2_2_0000000180016594
Source: C:\Windows\System32\regsvr32.exe Code function: 2_2_0000000180005198 2_2_0000000180005198
Source: C:\Windows\System32\regsvr32.exe Code function: 2_2_0000000180029DA8 2_2_0000000180029DA8
Source: C:\Windows\System32\regsvr32.exe Code function: 2_2_00000001800041A8 2_2_00000001800041A8
Source: C:\Windows\System32\regsvr32.exe Code function: 2_2_000000018000B1A8 2_2_000000018000B1A8
Source: C:\Windows\System32\regsvr32.exe Code function: 2_2_000000018001C5AC 2_2_000000018001C5AC
Source: C:\Windows\System32\regsvr32.exe Code function: 2_2_0000000180017DB0 2_2_0000000180017DB0
Source: C:\Windows\System32\regsvr32.exe Code function: 2_2_0000000180020DBC 2_2_0000000180020DBC
Source: C:\Windows\System32\regsvr32.exe Code function: 2_2_00000001800129BC 2_2_00000001800129BC
Source: C:\Windows\System32\regsvr32.exe Code function: 2_2_0000000180002DC0 2_2_0000000180002DC0
Source: C:\Windows\System32\regsvr32.exe Code function: 2_2_000000018001D9C4 2_2_000000018001D9C4
Source: C:\Windows\System32\regsvr32.exe Code function: 2_2_0000000180023DD4 2_2_0000000180023DD4
Source: C:\Windows\System32\regsvr32.exe Code function: 2_2_00000001800025D8 2_2_00000001800025D8
Source: C:\Windows\System32\regsvr32.exe Code function: 2_2_000000018001C9F0 2_2_000000018001C9F0
Source: C:\Windows\System32\regsvr32.exe Code function: 2_2_00000001800031F0 2_2_00000001800031F0
Source: C:\Windows\System32\regsvr32.exe Code function: 2_2_00000001800199F4 2_2_00000001800199F4
Source: C:\Windows\System32\regsvr32.exe Code function: 2_2_0000000180022E04 2_2_0000000180022E04
Source: C:\Windows\System32\regsvr32.exe Code function: 2_2_0000000180013210 2_2_0000000180013210
Source: C:\Windows\System32\regsvr32.exe Code function: 2_2_0000000180013610 2_2_0000000180013610
Source: C:\Windows\System32\regsvr32.exe Code function: 2_2_0000000180013E18 2_2_0000000180013E18
Source: C:\Windows\System32\regsvr32.exe Code function: 2_2_000000018001F61C 2_2_000000018001F61C
Source: C:\Windows\System32\regsvr32.exe Code function: 2_2_000000018001D620 2_2_000000018001D620
Source: C:\Windows\System32\regsvr32.exe Code function: 2_2_000000018001762C 2_2_000000018001762C
Source: C:\Windows\System32\regsvr32.exe Code function: 2_2_0000000180025E30 2_2_0000000180025E30
Source: C:\Windows\System32\regsvr32.exe Code function: 2_2_0000000180022638 2_2_0000000180022638
Source: C:\Windows\System32\regsvr32.exe Code function: 2_2_000000018001F238 2_2_000000018001F238
Source: C:\Windows\System32\regsvr32.exe Code function: 2_2_0000000180029A40 2_2_0000000180029A40
Source: C:\Windows\System32\regsvr32.exe Code function: 2_2_000000018001D254 2_2_000000018001D254
Source: C:\Windows\System32\regsvr32.exe Code function: 2_2_000000018000E254 2_2_000000018000E254
Source: C:\Windows\System32\regsvr32.exe Code function: 2_2_000000018000FE58 2_2_000000018000FE58
Source: C:\Windows\System32\regsvr32.exe Code function: 2_2_000000018001EE5C 2_2_000000018001EE5C
Source: C:\Windows\System32\regsvr32.exe Code function: 2_2_0000000180010680 2_2_0000000180010680
Source: C:\Windows\System32\regsvr32.exe Code function: 2_2_000000018002BE90 2_2_000000018002BE90
Source: C:\Windows\System32\regsvr32.exe Code function: 2_2_000000018000F290 2_2_000000018000F290
Source: C:\Windows\System32\regsvr32.exe Code function: 2_2_000000018000B698 2_2_000000018000B698
Source: C:\Windows\System32\regsvr32.exe Code function: 2_2_0000000180006698 2_2_0000000180006698
Source: C:\Windows\System32\regsvr32.exe Code function: 2_2_000000018002369C 2_2_000000018002369C
Source: C:\Windows\System32\regsvr32.exe Code function: 2_2_0000000180003A9C 2_2_0000000180003A9C
Source: C:\Windows\System32\regsvr32.exe Code function: 2_2_00000001800276A4 2_2_00000001800276A4
Source: C:\Windows\System32\regsvr32.exe Code function: 2_2_00000001800216A8 2_2_00000001800216A8
Source: C:\Windows\System32\regsvr32.exe Code function: 2_2_00000001800146B4 2_2_00000001800146B4
Source: C:\Windows\System32\regsvr32.exe Code function: 2_2_000000018000B2BC 2_2_000000018000B2BC
Source: C:\Windows\System32\regsvr32.exe Code function: 2_2_0000000180019EC0 2_2_0000000180019EC0
Source: C:\Windows\System32\regsvr32.exe Code function: 2_2_0000000180020AC4 2_2_0000000180020AC4
Source: C:\Windows\System32\regsvr32.exe Code function: 2_2_000000018000FAD0 2_2_000000018000FAD0
Source: C:\Windows\System32\regsvr32.exe Code function: 2_2_0000000180021AE0 2_2_0000000180021AE0
Source: C:\Windows\System32\regsvr32.exe Code function: 2_2_00000001800072E0 2_2_00000001800072E0
Source: C:\Windows\System32\regsvr32.exe Code function: 2_2_00000001800036E0 2_2_00000001800036E0
Source: C:\Windows\System32\regsvr32.exe Code function: 2_2_0000000180002AE4 2_2_0000000180002AE4
Source: C:\Windows\System32\regsvr32.exe Code function: 2_2_0000000180028EE8 2_2_0000000180028EE8
Source: C:\Windows\System32\regsvr32.exe Code function: 2_2_0000000180024EF4 2_2_0000000180024EF4
Source: C:\Windows\System32\regsvr32.exe Code function: 2_2_00000001800212FC 2_2_00000001800212FC
Source: C:\Windows\System32\regsvr32.exe Code function: 2_2_0000000180022AFC 2_2_0000000180022AFC
Source: C:\Windows\System32\regsvr32.exe Code function: 2_2_000000018000D300 2_2_000000018000D300
Source: C:\Windows\System32\regsvr32.exe Code function: 2_2_000000018002A304 2_2_000000018002A304
Source: C:\Windows\System32\regsvr32.exe Code function: 2_2_0000000180023304 2_2_0000000180023304
Source: C:\Windows\System32\regsvr32.exe Code function: 2_2_0000000180002708 2_2_0000000180002708
Source: C:\Windows\System32\regsvr32.exe Code function: 2_2_0000000180019720 2_2_0000000180019720
Source: C:\Windows\System32\regsvr32.exe Code function: 2_2_000000018001C720 2_2_000000018001C720
Source: C:\Windows\System32\regsvr32.exe Code function: 2_2_0000000180013724 2_2_0000000180013724
Source: C:\Windows\System32\regsvr32.exe Code function: 2_2_0000000180017B24 2_2_0000000180017B24
Source: C:\Windows\System32\regsvr32.exe Code function: 2_2_0000000180028B28 2_2_0000000180028B28
Source: C:\Windows\System32\regsvr32.exe Code function: 2_2_000000018002632C 2_2_000000018002632C
Source: C:\Windows\System32\regsvr32.exe Code function: 2_2_0000000180024330 2_2_0000000180024330
Source: C:\Windows\System32\regsvr32.exe Code function: 2_2_0000000180022F3C 2_2_0000000180022F3C
Source: C:\Windows\System32\regsvr32.exe Code function: 2_2_0000000180026F3C 2_2_0000000180026F3C
Source: C:\Windows\System32\regsvr32.exe Code function: 2_2_0000000180026B40 2_2_0000000180026B40
Source: C:\Windows\System32\regsvr32.exe Code function: 2_2_0000000180003F40 2_2_0000000180003F40
Source: C:\Windows\System32\regsvr32.exe Code function: 2_2_0000000180008F5C 2_2_0000000180008F5C
Source: C:\Windows\System32\regsvr32.exe Code function: 2_2_0000000180010B60 2_2_0000000180010B60
Source: C:\Windows\System32\regsvr32.exe Code function: 2_2_000000018001F764 2_2_000000018001F764
Source: C:\Windows\System32\regsvr32.exe Code function: 2_2_0000000180014368 2_2_0000000180014368
Source: C:\Windows\System32\regsvr32.exe Code function: 2_2_0000000180001368 2_2_0000000180001368
Source: C:\Windows\System32\regsvr32.exe Code function: 2_2_000000018000CB6C 2_2_000000018000CB6C
Source: C:\Windows\System32\regsvr32.exe Code function: 2_2_000000018000DB74 2_2_000000018000DB74
Source: C:\Windows\System32\regsvr32.exe Code function: 2_2_0000000180012F94 2_2_0000000180012F94
Source: C:\Windows\System32\regsvr32.exe Code function: 2_2_000000018001E7A4 2_2_000000018001E7A4
Source: C:\Windows\System32\regsvr32.exe Code function: 2_2_00000001800127A4 2_2_00000001800127A4
Source: C:\Windows\System32\regsvr32.exe Code function: 2_2_000000018001EFAC 2_2_000000018001EFAC
Source: C:\Windows\System32\regsvr32.exe Code function: 2_2_00000001800093AC 2_2_00000001800093AC
Source: C:\Windows\System32\regsvr32.exe Code function: 2_2_0000000180013BB4 2_2_0000000180013BB4
Source: C:\Windows\System32\regsvr32.exe Code function: 2_2_0000000180007BB4 2_2_0000000180007BB4
Source: C:\Windows\System32\regsvr32.exe Code function: 2_2_000000018000DFCC 2_2_000000018000DFCC
Source: C:\Windows\System32\regsvr32.exe Code function: 2_2_000000018000EFCC 2_2_000000018000EFCC
Source: C:\Windows\System32\regsvr32.exe Code function: 2_2_00000001800207D0 2_2_00000001800207D0
Source: C:\Windows\System32\regsvr32.exe Code function: 2_2_000000018001ABD8 2_2_000000018001ABD8
Source: C:\Windows\System32\regsvr32.exe Code function: 2_2_00000001800193E0 2_2_00000001800193E0
Source: C:\Windows\System32\rundll32.exe Code function: 3_2_0000020500000000 3_2_0000020500000000
Source: C:\Windows\System32\rundll32.exe Code function: 4_2_000001B23E8F0000 4_2_000001B23E8F0000
Source: C:\Windows\System32\rundll32.exe Code function: 5_2_000001EC47B90000 5_2_000001EC47B90000
Source: C:\Windows\System32\rundll32.exe Code function: 6_2_0000021DBE810000 6_2_0000021DBE810000
Source: C:\Windows\System32\regsvr32.exe Code function: 11_2_00870000 11_2_00870000
Source: C:\Windows\System32\regsvr32.exe Code function: 11_2_0000000180017FEC 11_2_0000000180017FEC
Source: C:\Windows\System32\regsvr32.exe Code function: 11_2_000000018001C9F0 11_2_000000018001C9F0
Source: C:\Windows\System32\regsvr32.exe Code function: 11_2_000000018001A804 11_2_000000018001A804
Source: C:\Windows\System32\regsvr32.exe Code function: 11_2_0000000180027E28 11_2_0000000180027E28
Source: C:\Windows\System32\regsvr32.exe Code function: 11_2_0000000180023894 11_2_0000000180023894
Source: C:\Windows\System32\regsvr32.exe Code function: 11_2_0000000180007CAC 11_2_0000000180007CAC
Source: C:\Windows\System32\regsvr32.exe Code function: 11_2_000000018002A304 11_2_000000018002A304
Source: C:\Windows\System32\regsvr32.exe Code function: 11_2_0000000180005B18 11_2_0000000180005B18
Source: C:\Windows\System32\regsvr32.exe Code function: 11_2_0000000180022F3C 11_2_0000000180022F3C
Source: C:\Windows\System32\regsvr32.exe Code function: 11_2_0000000180018B3C 11_2_0000000180018B3C
Source: C:\Windows\System32\regsvr32.exe Code function: 11_2_000000018001BD64 11_2_000000018001BD64
Source: C:\Windows\System32\regsvr32.exe Code function: 11_2_0000000180014368 11_2_0000000180014368
Source: C:\Windows\System32\regsvr32.exe Code function: 11_2_0000000180001368 11_2_0000000180001368
Source: C:\Windows\System32\regsvr32.exe Code function: 11_2_00000001800041A8 11_2_00000001800041A8
Source: C:\Windows\System32\regsvr32.exe Code function: 11_2_000000018000AFE4 11_2_000000018000AFE4
Source: C:\Windows\System32\regsvr32.exe Code function: 11_2_000000018000B3E4 11_2_000000018000B3E4
Source: C:\Windows\System32\regsvr32.exe Code function: 11_2_00000001800031F0 11_2_00000001800031F0
Source: C:\Windows\System32\regsvr32.exe Code function: 11_2_00000001800199F4 11_2_00000001800199F4
Source: C:\Windows\System32\regsvr32.exe Code function: 11_2_00000001800213FC 11_2_00000001800213FC
Source: C:\Windows\System32\regsvr32.exe Code function: 11_2_0000000180022E04 11_2_0000000180022E04
Source: C:\Windows\System32\regsvr32.exe Code function: 11_2_000000018001A408 11_2_000000018001A408
Source: C:\Windows\System32\regsvr32.exe Code function: 11_2_000000018000BC08 11_2_000000018000BC08
Source: C:\Windows\System32\regsvr32.exe Code function: 11_2_0000000180013210 11_2_0000000180013210
Source: C:\Windows\System32\regsvr32.exe Code function: 11_2_0000000180013610 11_2_0000000180013610
Source: C:\Windows\System32\regsvr32.exe Code function: 11_2_0000000180017414 11_2_0000000180017414
Source: C:\Windows\System32\regsvr32.exe Code function: 11_2_0000000180001014 11_2_0000000180001014
Source: C:\Windows\System32\regsvr32.exe Code function: 11_2_0000000180016418 11_2_0000000180016418
Source: C:\Windows\System32\regsvr32.exe Code function: 11_2_0000000180013E18 11_2_0000000180013E18
Source: C:\Windows\System32\regsvr32.exe Code function: 11_2_000000018001F61C 11_2_000000018001F61C
Source: C:\Windows\System32\regsvr32.exe Code function: 11_2_0000000180024020 11_2_0000000180024020
Source: C:\Windows\System32\regsvr32.exe Code function: 11_2_000000018001D620 11_2_000000018001D620
Source: C:\Windows\System32\regsvr32.exe Code function: 11_2_0000000180002820 11_2_0000000180002820
Source: C:\Windows\System32\regsvr32.exe Code function: 11_2_000000018001B028 11_2_000000018001B028
Source: C:\Windows\System32\regsvr32.exe Code function: 11_2_000000018001762C 11_2_000000018001762C
Source: C:\Windows\System32\regsvr32.exe Code function: 11_2_0000000180025E30 11_2_0000000180025E30
Source: C:\Windows\System32\regsvr32.exe Code function: 11_2_0000000180017C30 11_2_0000000180017C30
Source: C:\Windows\System32\regsvr32.exe Code function: 11_2_0000000180022638 11_2_0000000180022638
Source: C:\Windows\System32\regsvr32.exe Code function: 11_2_000000018001F238 11_2_000000018001F238
Source: C:\Windows\System32\regsvr32.exe Code function: 11_2_0000000180029A40 11_2_0000000180029A40
Source: C:\Windows\System32\regsvr32.exe Code function: 11_2_0000000180022C48 11_2_0000000180022C48
Source: C:\Windows\System32\regsvr32.exe Code function: 11_2_0000000180004848 11_2_0000000180004848
Source: C:\Windows\System32\regsvr32.exe Code function: 11_2_000000018002344C 11_2_000000018002344C
Source: C:\Windows\System32\regsvr32.exe Code function: 11_2_000000018001484C 11_2_000000018001484C
Source: C:\Windows\System32\regsvr32.exe Code function: 11_2_0000000180015C50 11_2_0000000180015C50
Source: C:\Windows\System32\regsvr32.exe Code function: 11_2_000000018000F850 11_2_000000018000F850
Source: C:\Windows\System32\regsvr32.exe Code function: 11_2_000000018001D254 11_2_000000018001D254
Source: C:\Windows\System32\regsvr32.exe Code function: 11_2_000000018000E254 11_2_000000018000E254
Source: C:\Windows\System32\regsvr32.exe Code function: 11_2_000000018000FE58 11_2_000000018000FE58
Source: C:\Windows\System32\regsvr32.exe Code function: 11_2_000000018000C458 11_2_000000018000C458
Source: C:\Windows\System32\regsvr32.exe Code function: 11_2_000000018001EE5C 11_2_000000018001EE5C
Source: C:\Windows\System32\regsvr32.exe Code function: 11_2_0000000180004C64 11_2_0000000180004C64
Source: C:\Windows\System32\regsvr32.exe Code function: 11_2_0000000180020C68 11_2_0000000180020C68
Source: C:\Windows\System32\regsvr32.exe Code function: 11_2_0000000180010C68 11_2_0000000180010C68
Source: C:\Windows\System32\regsvr32.exe Code function: 11_2_000000018001406C 11_2_000000018001406C
Source: C:\Windows\System32\regsvr32.exe Code function: 11_2_000000018001FC70 11_2_000000018001FC70
Source: C:\Windows\System32\regsvr32.exe Code function: 11_2_0000000180004078 11_2_0000000180004078
Source: C:\Windows\System32\regsvr32.exe Code function: 11_2_0000000180010680 11_2_0000000180010680
Source: C:\Windows\System32\regsvr32.exe Code function: 11_2_0000000180005484 11_2_0000000180005484
Source: C:\Windows\System32\regsvr32.exe Code function: 11_2_000000018002A088 11_2_000000018002A088
Source: C:\Windows\System32\regsvr32.exe Code function: 11_2_000000018002BE90 11_2_000000018002BE90
Source: C:\Windows\System32\regsvr32.exe Code function: 11_2_000000018000F290 11_2_000000018000F290
Source: C:\Windows\System32\regsvr32.exe Code function: 11_2_0000000180006698 11_2_0000000180006698
Source: C:\Windows\System32\regsvr32.exe Code function: 11_2_000000018000B698 11_2_000000018000B698
Source: C:\Windows\System32\regsvr32.exe Code function: 11_2_000000018002369C 11_2_000000018002369C
Source: C:\Windows\System32\regsvr32.exe Code function: 11_2_0000000180003A9C 11_2_0000000180003A9C
Source: C:\Windows\System32\regsvr32.exe Code function: 11_2_00000001800114A0 11_2_00000001800114A0
Source: C:\Windows\System32\regsvr32.exe Code function: 11_2_00000001800276A4 11_2_00000001800276A4
Source: C:\Windows\System32\regsvr32.exe Code function: 11_2_00000001800216A8 11_2_00000001800216A8
Source: C:\Windows\System32\regsvr32.exe Code function: 11_2_000000018001E4A8 11_2_000000018001E4A8
Source: C:\Windows\System32\regsvr32.exe Code function: 11_2_00000001800146B4 11_2_00000001800146B4
Source: C:\Windows\System32\regsvr32.exe Code function: 11_2_000000018002B6BC 11_2_000000018002B6BC
Source: C:\Windows\System32\regsvr32.exe Code function: 11_2_00000001800030BC 11_2_00000001800030BC
Source: C:\Windows\System32\regsvr32.exe Code function: 11_2_000000018000B2BC 11_2_000000018000B2BC
Source: C:\Windows\System32\regsvr32.exe Code function: 11_2_000000018001C8C0 11_2_000000018001C8C0
Source: C:\Windows\System32\regsvr32.exe Code function: 11_2_0000000180019EC0 11_2_0000000180019EC0
Source: C:\Windows\System32\regsvr32.exe Code function: 11_2_0000000180020AC4 11_2_0000000180020AC4
Source: C:\Windows\System32\regsvr32.exe Code function: 11_2_00000001800178C4 11_2_00000001800178C4
Source: C:\Windows\System32\regsvr32.exe Code function: 11_2_000000018000CCC8 11_2_000000018000CCC8
Source: C:\Windows\System32\regsvr32.exe Code function: 11_2_000000018001D4D0 11_2_000000018001D4D0
Source: C:\Windows\System32\regsvr32.exe Code function: 11_2_000000018000FAD0 11_2_000000018000FAD0
Source: C:\Windows\System32\regsvr32.exe Code function: 11_2_00000001800090D4 11_2_00000001800090D4
Source: C:\Windows\System32\regsvr32.exe Code function: 11_2_00000001800284DC 11_2_00000001800284DC
Source: C:\Windows\System32\regsvr32.exe Code function: 11_2_0000000180021AE0 11_2_0000000180021AE0
Source: C:\Windows\System32\regsvr32.exe Code function: 11_2_00000001800036E0 11_2_00000001800036E0
Source: C:\Windows\System32\regsvr32.exe Code function: 11_2_00000001800072E0 11_2_00000001800072E0
Source: C:\Windows\System32\regsvr32.exe Code function: 11_2_0000000180008CE0 11_2_0000000180008CE0
Source: C:\Windows\System32\regsvr32.exe Code function: 11_2_00000001800124E4 11_2_00000001800124E4
Source: C:\Windows\System32\regsvr32.exe Code function: 11_2_0000000180002AE4 11_2_0000000180002AE4
Source: C:\Windows\System32\regsvr32.exe Code function: 11_2_0000000180028EE8 11_2_0000000180028EE8
Source: C:\Windows\System32\regsvr32.exe Code function: 11_2_0000000180003CE8 11_2_0000000180003CE8
Source: C:\Windows\System32\regsvr32.exe Code function: 11_2_000000018002B0EC 11_2_000000018002B0EC
Source: C:\Windows\System32\regsvr32.exe Code function: 11_2_000000018001ACEC 11_2_000000018001ACEC
Source: C:\Windows\System32\regsvr32.exe Code function: 11_2_0000000180024EF4 11_2_0000000180024EF4
Source: C:\Windows\System32\regsvr32.exe Code function: 11_2_000000018000B0F8 11_2_000000018000B0F8
Source: C:\Windows\System32\regsvr32.exe Code function: 11_2_00000001800212FC 11_2_00000001800212FC
Source: C:\Windows\System32\regsvr32.exe Code function: 11_2_0000000180022AFC 11_2_0000000180022AFC
Source: C:\Windows\System32\regsvr32.exe Code function: 11_2_000000018000D300 11_2_000000018000D300
Source: C:\Windows\System32\regsvr32.exe Code function: 11_2_0000000180023304 11_2_0000000180023304
Source: C:\Windows\System32\regsvr32.exe Code function: 11_2_000000018001EB08 11_2_000000018001EB08
Source: C:\Windows\System32\regsvr32.exe Code function: 11_2_0000000180002708 11_2_0000000180002708
Source: C:\Windows\System32\regsvr32.exe Code function: 11_2_0000000180016110 11_2_0000000180016110
Source: C:\Windows\System32\regsvr32.exe Code function: 11_2_0000000180024918 11_2_0000000180024918
Source: C:\Windows\System32\regsvr32.exe Code function: 11_2_0000000180013D1C 11_2_0000000180013D1C
Source: C:\Windows\System32\regsvr32.exe Code function: 11_2_000000018002BD20 11_2_000000018002BD20
Source: C:\Windows\System32\regsvr32.exe Code function: 11_2_0000000180026520 11_2_0000000180026520
Source: C:\Windows\System32\regsvr32.exe Code function: 11_2_000000018001C720 11_2_000000018001C720
Source: C:\Windows\System32\regsvr32.exe Code function: 11_2_0000000180019720 11_2_0000000180019720
Source: C:\Windows\System32\regsvr32.exe Code function: 11_2_0000000180013724 11_2_0000000180013724
Source: C:\Windows\System32\regsvr32.exe Code function: 11_2_0000000180017B24 11_2_0000000180017B24
Source: C:\Windows\System32\regsvr32.exe Code function: 11_2_000000018000BD24 11_2_000000018000BD24
Source: C:\Windows\System32\regsvr32.exe Code function: 11_2_0000000180028B28 11_2_0000000180028B28
Source: C:\Windows\System32\regsvr32.exe Code function: 11_2_0000000180021D2C 11_2_0000000180021D2C
Source: C:\Windows\System32\regsvr32.exe Code function: 11_2_000000018002632C 11_2_000000018002632C
Source: C:\Windows\System32\regsvr32.exe Code function: 11_2_000000018000D92C 11_2_000000018000D92C
Source: C:\Windows\System32\regsvr32.exe Code function: 11_2_0000000180024330 11_2_0000000180024330
Source: C:\Windows\System32\regsvr32.exe Code function: 11_2_000000018001A130 11_2_000000018001A130
Source: C:\Windows\System32\regsvr32.exe Code function: 11_2_000000018002093C 11_2_000000018002093C
Source: C:\Windows\System32\regsvr32.exe Code function: 11_2_0000000180026F3C 11_2_0000000180026F3C
Source: C:\Windows\System32\regsvr32.exe Code function: 11_2_0000000180026B40 11_2_0000000180026B40
Source: C:\Windows\System32\regsvr32.exe Code function: 11_2_0000000180003F40 11_2_0000000180003F40
Source: C:\Windows\System32\regsvr32.exe Code function: 11_2_0000000180017144 11_2_0000000180017144
Source: C:\Windows\System32\regsvr32.exe Code function: 11_2_0000000180004948 11_2_0000000180004948
Source: C:\Windows\System32\regsvr32.exe Code function: 11_2_000000018001B558 11_2_000000018001B558
Source: C:\Windows\System32\regsvr32.exe Code function: 11_2_000000018002155C 11_2_000000018002155C
Source: C:\Windows\System32\regsvr32.exe Code function: 11_2_0000000180019D5C 11_2_0000000180019D5C
Source: C:\Windows\System32\regsvr32.exe Code function: 11_2_0000000180008F5C 11_2_0000000180008F5C
Source: C:\Windows\System32\regsvr32.exe Code function: 11_2_0000000180010B60 11_2_0000000180010B60
Source: C:\Windows\System32\regsvr32.exe Code function: 11_2_000000018001F764 11_2_000000018001F764
Source: C:\Windows\System32\regsvr32.exe Code function: 11_2_000000018002796C 11_2_000000018002796C
Source: C:\Windows\System32\regsvr32.exe Code function: 11_2_000000018000CB6C 11_2_000000018000CB6C
Source: C:\Windows\System32\regsvr32.exe Code function: 11_2_000000018002B570 11_2_000000018002B570
Source: C:\Windows\System32\regsvr32.exe Code function: 11_2_000000018000DB74 11_2_000000018000DB74
Source: C:\Windows\System32\regsvr32.exe Code function: 11_2_0000000180016978 11_2_0000000180016978
Source: C:\Windows\System32\regsvr32.exe Code function: 11_2_0000000180010578 11_2_0000000180010578
Source: C:\Windows\System32\regsvr32.exe Code function: 11_2_000000018000F580 11_2_000000018000F580
Source: C:\Windows\System32\regsvr32.exe Code function: 11_2_000000018000ED84 11_2_000000018000ED84
Source: C:\Windows\System32\regsvr32.exe Code function: 11_2_0000000180011B88 11_2_0000000180011B88
Source: C:\Windows\System32\regsvr32.exe Code function: 11_2_0000000180028990 11_2_0000000180028990
Source: C:\Windows\System32\regsvr32.exe Code function: 11_2_0000000180012F94 11_2_0000000180012F94
Source: C:\Windows\System32\regsvr32.exe Code function: 11_2_0000000180014594 11_2_0000000180014594
Source: C:\Windows\System32\regsvr32.exe Code function: 11_2_0000000180016594 11_2_0000000180016594
Source: C:\Windows\System32\regsvr32.exe Code function: 11_2_0000000180005198 11_2_0000000180005198
Source: C:\Windows\System32\regsvr32.exe Code function: 11_2_000000018001E7A4 11_2_000000018001E7A4
Source: C:\Windows\System32\regsvr32.exe Code function: 11_2_00000001800127A4 11_2_00000001800127A4
Source: C:\Windows\System32\regsvr32.exe Code function: 11_2_0000000180029DA8 11_2_0000000180029DA8
Source: C:\Windows\System32\regsvr32.exe Code function: 11_2_000000018000B1A8 11_2_000000018000B1A8
Source: C:\Windows\System32\regsvr32.exe Code function: 11_2_000000018001C5AC 11_2_000000018001C5AC
Source: C:\Windows\System32\regsvr32.exe Code function: 11_2_000000018001EFAC 11_2_000000018001EFAC
Source: C:\Windows\System32\regsvr32.exe Code function: 11_2_00000001800093AC 11_2_00000001800093AC
Source: C:\Windows\System32\regsvr32.exe Code function: 11_2_0000000180017DB0 11_2_0000000180017DB0
Source: C:\Windows\System32\regsvr32.exe Code function: 11_2_0000000180013BB4 11_2_0000000180013BB4
Source: C:\Windows\System32\regsvr32.exe Code function: 11_2_0000000180007BB4 11_2_0000000180007BB4
Source: C:\Windows\System32\regsvr32.exe Code function: 11_2_0000000180020DBC 11_2_0000000180020DBC
Source: C:\Windows\System32\regsvr32.exe Code function: 11_2_00000001800129BC 11_2_00000001800129BC
Source: C:\Windows\System32\regsvr32.exe Code function: 11_2_0000000180002DC0 11_2_0000000180002DC0
Source: C:\Windows\System32\regsvr32.exe Code function: 11_2_000000018001D9C4 11_2_000000018001D9C4
Source: C:\Windows\System32\regsvr32.exe Code function: 11_2_000000018000DFCC 11_2_000000018000DFCC
Source: C:\Windows\System32\regsvr32.exe Code function: 11_2_000000018000EFCC 11_2_000000018000EFCC
Source: C:\Windows\System32\regsvr32.exe Code function: 11_2_00000001800207D0 11_2_00000001800207D0
Source: C:\Windows\System32\regsvr32.exe Code function: 11_2_0000000180023DD4 11_2_0000000180023DD4
Source: C:\Windows\System32\regsvr32.exe Code function: 11_2_000000018001ABD8 11_2_000000018001ABD8
Source: C:\Windows\System32\regsvr32.exe Code function: 11_2_00000001800025D8 11_2_00000001800025D8
Source: C:\Windows\System32\regsvr32.exe Code function: 11_2_00000001800193E0 11_2_00000001800193E0
Source: PYCkUgesWB.dll Static PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Source: C:\Windows\System32\regsvr32.exe Section loaded: sfc.dll Jump to behavior
Source: C:\Windows\System32\regsvr32.exe Section loaded: sfc.dll Jump to behavior
Source: C:\Windows\System32\regsvr32.exe Section loaded: sfc.dll Jump to behavior
Source: PYCkUgesWB.dll Virustotal: Detection: 66%
Source: PYCkUgesWB.dll Metadefender: Detection: 42%
Source: PYCkUgesWB.dll ReversingLabs: Detection: 80%
Source: PYCkUgesWB.dll Static PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Windows\System32\loaddll64.exe Key opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers Jump to behavior
Source: unknown Process created: C:\Windows\System32\loaddll64.exe loaddll64.exe "C:\Users\user\Desktop\PYCkUgesWB.dll"
Source: C:\Windows\System32\loaddll64.exe Process created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\PYCkUgesWB.dll",#1
Source: C:\Windows\System32\loaddll64.exe Process created: C:\Windows\System32\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\PYCkUgesWB.dll
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\PYCkUgesWB.dll",#1
Source: C:\Windows\System32\loaddll64.exe Process created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\PYCkUgesWB.dll,AjkRVrFNnyQmqXQdrComyaiwV
Source: C:\Windows\System32\loaddll64.exe Process created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\PYCkUgesWB.dll,AkMhEGvNFpnSswjeCw
Source: C:\Windows\System32\loaddll64.exe Process created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\PYCkUgesWB.dll,BMIWqtk
Source: unknown Process created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
Source: C:\Windows\System32\regsvr32.exe Process created: C:\Windows\System32\regsvr32.exe C:\Windows\system32\regsvr32.exe "C:\Windows\system32\XSYhmb\vuKI.dll"
Source: C:\Windows\System32\loaddll64.exe Process created: C:\Windows\System32\regsvr32.exe C:\Windows\system32\regsvr32.exe "C:\Windows\system32\AfzDfnhsGeYDyd\OsmuofIfhwEGDVL.dll"
Source: unknown Process created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p
Source: unknown Process created: C:\Windows\System32\svchost.exe c:\windows\system32\svchost.exe -k netsvcs -p -s BITS
Source: unknown Process created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p
Source: unknown Process created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p
Source: unknown Process created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p
Source: unknown Process created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p
Source: C:\Windows\System32\loaddll64.exe Process created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\PYCkUgesWB.dll",#1 Jump to behavior
Source: C:\Windows\System32\loaddll64.exe Process created: C:\Windows\System32\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\PYCkUgesWB.dll Jump to behavior
Source: C:\Windows\System32\loaddll64.exe Process created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\PYCkUgesWB.dll,AjkRVrFNnyQmqXQdrComyaiwV Jump to behavior
Source: C:\Windows\System32\loaddll64.exe Process created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\PYCkUgesWB.dll,AkMhEGvNFpnSswjeCw Jump to behavior
Source: C:\Windows\System32\loaddll64.exe Process created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\PYCkUgesWB.dll,BMIWqtk Jump to behavior
Source: C:\Windows\System32\loaddll64.exe Process created: C:\Windows\System32\regsvr32.exe C:\Windows\system32\regsvr32.exe "C:\Windows\system32\AfzDfnhsGeYDyd\OsmuofIfhwEGDVL.dll" Jump to behavior
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\PYCkUgesWB.dll",#1 Jump to behavior
Source: C:\Windows\System32\regsvr32.exe Process created: C:\Windows\System32\regsvr32.exe C:\Windows\system32\regsvr32.exe "C:\Windows\system32\XSYhmb\vuKI.dll" Jump to behavior
Source: C:\Windows\System32\loaddll64.exe Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{D105A4D4-344C-48EB-9866-EE378D90658B}\InProcServer32 Jump to behavior
Source: classification engine Classification label: mal88.troj.evad.winDLL@24/4@0/44
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_10010890 CoCreateInstance,SysAllocString,SysFreeString, 0_2_10010890
Source: C:\Windows\System32\regsvr32.exe Code function: CreateServiceW, 2_2_000000018001FC70
Source: C:\Windows\System32\loaddll64.exe File read: C:\Users\desktop.ini Jump to behavior
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_000000018001A804 Process32FirstW,CreateToolhelp32Snapshot,Process32NextW,FindCloseChangeNotification, 0_2_000000018001A804
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\PYCkUgesWB.dll",#1
Source: C:\Windows\System32\regsvr32.exe File read: C:\Windows\System32\drivers\etc\hosts Jump to behavior
Source: C:\Windows\System32\svchost.exe File read: C:\Windows\System32\drivers\etc\hosts Jump to behavior
Source: C:\Windows\System32\svchost.exe File read: C:\Windows\System32\drivers\etc\hosts Jump to behavior
Source: C:\Windows\System32\svchost.exe File read: C:\Windows\System32\drivers\etc\hosts Jump to behavior
Source: C:\Windows\System32\svchost.exe File read: C:\Windows\System32\drivers\etc\hosts Jump to behavior
Source: PYCkUgesWB.dll Static PE information: More than 187 > 100 exports found
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_0000000180008C72 push ebp; ret 0_2_0000000180008C7D
Source: C:\Windows\System32\regsvr32.exe Code function: 2_2_0000000180008C72 push ebp; ret 2_2_0000000180008C7D
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_10004E30 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress, 0_2_10004E30
Source: PYCkUgesWB.dll Static PE information: real checksum: 0x499a1 should be: 0x524a5
Source: C:\Windows\System32\loaddll64.exe Process created: C:\Windows\System32\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\PYCkUgesWB.dll
Source: C:\Windows\System32\regsvr32.exe PE file moved: C:\Windows\System32\XSYhmb\vuKI.dll Jump to behavior

Hooking and other Techniques for Hiding and Protection

barindex
Source: C:\Windows\System32\loaddll64.exe File opened: C:\Windows\system32\AfzDfnhsGeYDyd\OsmuofIfhwEGDVL.dll:Zone.Identifier read attributes | delete Jump to behavior
Source: C:\Windows\System32\regsvr32.exe File opened: C:\Windows\system32\XSYhmb\vuKI.dll:Zone.Identifier read attributes | delete Jump to behavior
Source: C:\Windows\System32\rundll32.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\rundll32.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\rundll32.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\rundll32.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\svchost.exe TID: 6920 Thread sleep time: -30000s >= -30000s Jump to behavior
Source: C:\Windows\System32\svchost.exe TID: 2704 Thread sleep time: -150000s >= -30000s Jump to behavior
Source: C:\Windows\System32\loaddll64.exe Evasive API call chain: GetModuleFileName,DecisionNodes,ExitProcess
Source: C:\Windows\System32\svchost.exe File opened: PhysicalDrive0 Jump to behavior
Source: C:\Windows\System32\loaddll64.exe Process information queried: ProcessInformation Jump to behavior
Source: C:\Windows\System32\regsvr32.exe Code function: 11_2_000000018001C9F0 FindFirstFileW,FindNextFileW, 11_2_000000018001C9F0
Source: C:\Windows\System32\loaddll64.exe API call chain: ExitProcess graph end node
Source: C:\Windows\System32\loaddll64.exe API call chain: ExitProcess graph end node
Source: C:\Windows\System32\regsvr32.exe File Volume queried: C:\ FullSizeInformation Jump to behavior
Source: regsvr32.exe, 0000000B.00000002.885983137.00000000008FD000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000B.00000003.803196731.00000000008FA000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000B.00000003.803132902.00000000008F6000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V RAWY
Source: svchost.exe, 00000012.00000002.887267999.000001897A662000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: @Hyper-V RAW
Source: svchost.exe, 0000000A.00000002.885676626.000001DB4EC02000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: HvHostWdiSystemHostScDeviceEnumWiaRpctrkwksAudioEndpointBuilderhidservdot3svcDsSvcfhsvcWPDBusEnumsvsvcwlansvcEmbeddedModeirmonSensorServicevmicvssNgcSvcsysmainDevQueryBrokerStorSvcvmickvpexchangevmicshutdownvmicguestinterfacevmicvmsessionNcbServiceNetmanDeviceAssociationServiceTabletInputServicePcaSvcIPxlatCfgSvcCscServiceUmRdpService
Source: regsvr32.exe, 0000000B.00000002.885983137.00000000008FD000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000B.00000003.803196731.00000000008FA000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000B.00000003.803132902.00000000008F6000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000012.00000002.886011420.0000018974C29000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000012.00000002.887207397.000001897A64A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001B.00000002.804530802.0000017055AEA000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001B.00000002.804366776.0000017055AAA000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V RAW
Source: regsvr32.exe, 0000000B.00000002.885863277.00000000008CD000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000B.00000003.803078720.00000000008CD000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V RAW`
Source: regsvr32.exe, 00000002.00000003.469429616.0000000001420000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}6
Source: svchost.exe, 0000000A.00000002.885950299.000001DB4EC40000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_10001050 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, 0_2_10001050
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_10004E30 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress, 0_2_10004E30
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_10001500 GetProcessHeap,HeapAlloc,GetVersionExA,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetCommandLineA,FlsSetValue,GetCurrentThreadId, 0_2_10001500
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_10001050 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, 0_2_10001050
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_10006C70 RtlCaptureContext,SetUnhandledExceptionFilter,UnhandledExceptionFilter, 0_2_10006C70
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_10006580 SetUnhandledExceptionFilter, 0_2_10006580
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_100065B0 SetUnhandledExceptionFilter, 0_2_100065B0
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_10004660 RtlCaptureContext,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, 0_2_10004660
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_10004700 RtlCaptureContext,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, 0_2_10004700

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Windows\System32\regsvr32.exe Network Connect: 174.138.33.49 7080 Jump to behavior
Source: C:\Windows\System32\cmd.exe Process created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\PYCkUgesWB.dll",#1 Jump to behavior
Source: C:\Windows\System32\regsvr32.exe Queries volume information: C:\ VolumeInformation Jump to behavior
Source: C:\Windows\System32\regsvr32.exe Queries volume information: C:\ VolumeInformation Jump to behavior
Source: C:\Windows\System32\svchost.exe Queries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation Jump to behavior
Source: C:\Windows\System32\svchost.exe Queries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation Jump to behavior
Source: C:\Windows\System32\svchost.exe Queries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation Jump to behavior
Source: C:\Windows\System32\svchost.exe Queries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation Jump to behavior
Source: C:\Windows\System32\svchost.exe Queries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation Jump to behavior
Source: C:\Windows\System32\svchost.exe Queries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation Jump to behavior
Source: C:\Windows\System32\svchost.exe Queries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation Jump to behavior
Source: C:\Windows\System32\svchost.exe Queries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformation Jump to behavior
Source: C:\Windows\System32\svchost.exe Queries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm VolumeInformation Jump to behavior
Source: C:\Windows\System32\svchost.exe Queries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformation Jump to behavior
Source: C:\Windows\System32\svchost.exe Queries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformation Jump to behavior
Source: C:\Windows\System32\svchost.exe Queries volume information: C:\ VolumeInformation Jump to behavior
Source: C:\Windows\System32\svchost.exe Queries volume information: C:\ VolumeInformation Jump to behavior
Source: C:\Windows\System32\loaddll64.exe Code function: GetLocaleInfoA, 0_2_10007E00
Source: C:\Windows\System32\regsvr32.exe Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid Jump to behavior
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_100042A0 GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter, 0_2_100042A0
Source: C:\Windows\System32\loaddll64.exe Code function: 0_2_10001500 GetProcessHeap,HeapAlloc,GetVersionExA,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetCommandLineA,FlsSetValue,GetCurrentThreadId, 0_2_10001500

Stealing of Sensitive Information

barindex
Source: Yara match File source: 3.2.rundll32.exe.20500010000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 4.2.rundll32.exe.1b23e930000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 0.2.loaddll64.exe.1e200010000.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 6.2.rundll32.exe.21dbea20000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 11.2.regsvr32.exe.2310000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 0.2.loaddll64.exe.1e200010000.1.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 11.2.regsvr32.exe.2310000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 6.2.rundll32.exe.21dbea20000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 2.2.regsvr32.exe.1580000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 2.2.regsvr32.exe.1580000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 5.2.rundll32.exe.1ec47bf0000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 5.2.rundll32.exe.1ec47bf0000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 4.2.rundll32.exe.1b23e930000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 3.2.rundll32.exe.20500010000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 00000000.00000002.492629360.000001E200010000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000002.00000002.479464350.0000000001580000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000002.492455276.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000005.00000002.477702534.000001EC47BF0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000B.00000002.887240071.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000005.00000002.477040143.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000004.00000002.466000340.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000B.00000002.886485279.0000000002310000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000004.00000002.466138189.000001B23E930000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000006.00000002.485258322.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000002.466579273.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000002.00000002.479882020.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000006.00000002.487464916.0000021DBEA20000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000002.466935474.0000020500010000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs