Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
PYCkUgesWB.com_15e2f984de986ecb59e38a1c3a4a2300

Overview

General Information

Sample Name:PYCkUgesWB.com_15e2f984de986ecb59e38a1c3a4a2300 (renamed file extension from com_15e2f984de986ecb59e38a1c3a4a2300 to dll)
Analysis ID:666431
MD5:15e2f984de986ecb59e38a1c3a4a2300
SHA1:795383a71c9030a2c52624795a1e539bfedbf84c
SHA256:1e9a7692e74e98ac5d21a4d3bfb3696d69d8306e4e42d53bcb4604b3dff420bb
Tags:droppedexe
Infos:

Detection

Emotet
Score:88
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Yara detected Emotet
System process connects to network (likely due to code injection or exploit)
Antivirus detection for URL or domain
Snort IDS alert for network traffic
C2 URLs / IPs found in malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Queries the volume information (name, serial number etc) of a device
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query locales information (e.g. system language)
Deletes files inside the Windows folder
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Creates files inside the system directory
Internet Provider seen in connection with other malware
Detected potential crypto function
Found evasive API chain (may stop execution after checking a module file name)
Contains functionality to dynamically determine API calls
Contains functionality which may be used to detect a debugger (GetProcessHeap)
IP address seen in connection with other malware
Found inlined nop instructions (likely shell or obfuscated code)
PE file contains an invalid checksum
PE file contains strange resources
Tries to load missing DLLs
Drops PE files to the windows directory (C:\Windows)
Detected TCP or UDP traffic on non-standard ports
Connects to several IPs in different countries
Registers a DLL
Queries disk information (often used to detect virtual machines)
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • loaddll64.exe (PID: 6924 cmdline: loaddll64.exe "C:\Users\user\Desktop\PYCkUgesWB.dll" MD5: 4E8A40CAD6CCC047914E3A7830A2D8AA)
    • cmd.exe (PID: 6940 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\PYCkUgesWB.dll",#1 MD5: 4E2ACF4F8A396486AB4268C94A6A245F)
      • rundll32.exe (PID: 6960 cmdline: rundll32.exe "C:\Users\user\Desktop\PYCkUgesWB.dll",#1 MD5: 73C519F050C20580F8A62C849D49215A)
    • regsvr32.exe (PID: 6948 cmdline: regsvr32.exe /s C:\Users\user\Desktop\PYCkUgesWB.dll MD5: D78B75FC68247E8A63ACBA846182740E)
      • regsvr32.exe (PID: 5304 cmdline: C:\Windows\system32\regsvr32.exe "C:\Windows\system32\XSYhmb\vuKI.dll" MD5: D78B75FC68247E8A63ACBA846182740E)
    • rundll32.exe (PID: 6972 cmdline: rundll32.exe C:\Users\user\Desktop\PYCkUgesWB.dll,AjkRVrFNnyQmqXQdrComyaiwV MD5: 73C519F050C20580F8A62C849D49215A)
    • rundll32.exe (PID: 7024 cmdline: rundll32.exe C:\Users\user\Desktop\PYCkUgesWB.dll,AkMhEGvNFpnSswjeCw MD5: 73C519F050C20580F8A62C849D49215A)
    • rundll32.exe (PID: 7044 cmdline: rundll32.exe C:\Users\user\Desktop\PYCkUgesWB.dll,BMIWqtk MD5: 73C519F050C20580F8A62C849D49215A)
    • regsvr32.exe (PID: 2820 cmdline: C:\Windows\system32\regsvr32.exe "C:\Windows\system32\AfzDfnhsGeYDyd\OsmuofIfhwEGDVL.dll" MD5: D78B75FC68247E8A63ACBA846182740E)
  • svchost.exe (PID: 2444 cmdline: C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 6052 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 5732 cmdline: c:\windows\system32\svchost.exe -k netsvcs -p -s BITS MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 4924 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 4884 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 6628 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 5100 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • cleanup
{"C2 list": ["87.106.97.83:7080", "118.98.72.86:443", "93.104.209.107:8080", "157.230.99.206:8080", "104.244.79.94:443", "88.217.172.165:8080", "103.41.204.169:8080", "85.214.67.203:8080", "196.44.98.190:8080", "198.199.70.22:8080", "62.171.178.147:8080", "210.57.209.142:8080", "178.238.225.252:8080", "139.59.80.108:8080", "103.224.241.74:8080", "103.71.99.57:8080", "157.245.111.0:8080", "128.199.242.164:8080", "103.56.149.105:8080", "128.199.217.206:443", "85.25.120.45:8080", "190.145.8.4:443", "165.232.185.110:8080", "178.62.112.199:8080", "103.85.95.4:8080", "188.225.32.231:4143", "103.126.216.86:443", "37.44.244.177:8080", "64.227.55.231:8080", "190.107.19.179:443", "83.229.80.93:8080", "103.254.12.236:7080", "104.248.225.227:8080", "36.67.23.59:443", "43.129.209.178:443", "165.22.254.236:8080", "175.126.176.79:8080", "202.134.4.210:7080", "202.29.239.162:443", "46.101.98.60:8080", "54.37.228.122:443", "5.253.30.17:7080"], "Public Key": ["RUNTMSAAAAD0LxqDNhonUYwk8sqo7IWuUllRdUiUBnACc6romsQoe1YJD7wIe4AheqYofpZFucPDXCZ0z9i+ooUffqeoLZU0yb8XUwABAI4=", "RUNLMSAAAADYNZPXY4tQxd/N4Wn5sTYAm5tUOxY2ol1ELrI4MNhHNi640vSLasjYTHpFRBoG+o84vtr7AJachCzOHjaAJFCW6785UwAHAJM="]}
SourceRuleDescriptionAuthorStrings
00000000.00000002.492629360.000001E200010000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
    00000002.00000002.479464350.0000000001580000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
      00000000.00000002.492455276.0000000180001000.00000020.00001000.00020000.00000000.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
        00000005.00000002.477702534.000001EC47BF0000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
          0000000B.00000002.887240071.0000000180001000.00000020.00001000.00020000.00000000.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
            Click to see the 9 entries
            SourceRuleDescriptionAuthorStrings
            3.2.rundll32.exe.20500010000.0.raw.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
              4.2.rundll32.exe.1b23e930000.0.raw.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
                0.2.loaddll64.exe.1e200010000.1.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
                  6.2.rundll32.exe.21dbea20000.0.raw.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
                    11.2.regsvr32.exe.2310000.0.raw.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
                      Click to see the 9 entries
                      No Sigma rule has matched
                      Timestamp:192.168.2.7174.138.33.494978670802404316 07/16/22-19:12:04.677504
                      SID:2404316
                      Source Port:49786
                      Destination Port:7080
                      Protocol:TCP
                      Classtype:A Network Trojan was detected

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection

                      barindex
                      Source: PYCkUgesWB.dllVirustotal: Detection: 66%Perma Link
                      Source: PYCkUgesWB.dllMetadefender: Detection: 42%Perma Link
                      Source: PYCkUgesWB.dllReversingLabs: Detection: 80%
                      Source: https://174.138.33.49:7080/aAvira URL Cloud: Label: malware
                      Source: https://174.138.33.49:7080/s64Avira URL Cloud: Label: malware
                      Source: https://174.138.33.49:7080/NumAvira URL Cloud: Label: malware
                      Source: https://174.138.33.49:7080/uAvira URL Cloud: Label: malware
                      Source: 0000000B.00000002.885655028.0000000000898000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: Emotet {"C2 list": ["87.106.97.83:7080", "118.98.72.86:443", "93.104.209.107:8080", "157.230.99.206:8080", "104.244.79.94:443", "88.217.172.165:8080", "103.41.204.169:8080", "85.214.67.203:8080", "196.44.98.190:8080", "198.199.70.22:8080", "62.171.178.147:8080", "210.57.209.142:8080", "178.238.225.252:8080", "139.59.80.108:8080", "103.224.241.74:8080", "103.71.99.57:8080", "157.245.111.0:8080", "128.199.242.164:8080", "103.56.149.105:8080", "128.199.217.206:443", "85.25.120.45:8080", "190.145.8.4:443", "165.232.185.110:8080", "178.62.112.199:8080", "103.85.95.4:8080", "188.225.32.231:4143", "103.126.216.86:443", "37.44.244.177:8080", "64.227.55.231:8080", "190.107.19.179:443", "83.229.80.93:8080", "103.254.12.236:7080", "104.248.225.227:8080", "36.67.23.59:443", "43.129.209.178:443", "165.22.254.236:8080", "175.126.176.79:8080", "202.134.4.210:7080", "202.29.239.162:443", "46.101.98.60:8080", "54.37.228.122:443", "5.253.30.17:7080"], "Public Key": ["RUNTMSAAAAD0LxqDNhonUYwk8sqo7IWuUllRdUiUBnACc6romsQoe1YJD7wIe4AheqYofpZFucPDXCZ0z9i+ooUffqeoLZU0yb8XUwABAI4=", "RUNLMSAAAADYNZPXY4tQxd/N4Wn5sTYAm5tUOxY2ol1ELrI4MNhHNi640vSLasjYTHpFRBoG+o84vtr7AJachCzOHjaAJFCW6785UwAHAJM="]}
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_000000018001C9F0 FindFirstFileW,FindNextFileW,
                      Source: C:\Windows\System32\loaddll64.exeCode function: 4x nop then movzx eax, byte ptr [rcx+rdx]

                      Networking

                      barindex
                      Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 174.138.33.49 7080
                      Source: TrafficSnort IDS: 2404316 ET CNC Feodo Tracker Reported CnC Server TCP group 9 192.168.2.7:49786 -> 174.138.33.49:7080
                      Source: Malware configuration extractorIPs: 87.106.97.83:7080
                      Source: Malware configuration extractorIPs: 118.98.72.86:443
                      Source: Malware configuration extractorIPs: 93.104.209.107:8080
                      Source: Malware configuration extractorIPs: 157.230.99.206:8080
                      Source: Malware configuration extractorIPs: 104.244.79.94:443
                      Source: Malware configuration extractorIPs: 88.217.172.165:8080
                      Source: Malware configuration extractorIPs: 103.41.204.169:8080
                      Source: Malware configuration extractorIPs: 85.214.67.203:8080
                      Source: Malware configuration extractorIPs: 196.44.98.190:8080
                      Source: Malware configuration extractorIPs: 198.199.70.22:8080
                      Source: Malware configuration extractorIPs: 62.171.178.147:8080
                      Source: Malware configuration extractorIPs: 210.57.209.142:8080
                      Source: Malware configuration extractorIPs: 178.238.225.252:8080
                      Source: Malware configuration extractorIPs: 139.59.80.108:8080
                      Source: Malware configuration extractorIPs: 103.224.241.74:8080
                      Source: Malware configuration extractorIPs: 103.71.99.57:8080
                      Source: Malware configuration extractorIPs: 157.245.111.0:8080
                      Source: Malware configuration extractorIPs: 128.199.242.164:8080
                      Source: Malware configuration extractorIPs: 103.56.149.105:8080
                      Source: Malware configuration extractorIPs: 128.199.217.206:443
                      Source: Malware configuration extractorIPs: 85.25.120.45:8080
                      Source: Malware configuration extractorIPs: 190.145.8.4:443
                      Source: Malware configuration extractorIPs: 165.232.185.110:8080
                      Source: Malware configuration extractorIPs: 178.62.112.199:8080
                      Source: Malware configuration extractorIPs: 103.85.95.4:8080
                      Source: Malware configuration extractorIPs: 188.225.32.231:4143
                      Source: Malware configuration extractorIPs: 103.126.216.86:443
                      Source: Malware configuration extractorIPs: 37.44.244.177:8080
                      Source: Malware configuration extractorIPs: 64.227.55.231:8080
                      Source: Malware configuration extractorIPs: 190.107.19.179:443
                      Source: Malware configuration extractorIPs: 83.229.80.93:8080
                      Source: Malware configuration extractorIPs: 103.254.12.236:7080
                      Source: Malware configuration extractorIPs: 104.248.225.227:8080
                      Source: Malware configuration extractorIPs: 36.67.23.59:443
                      Source: Malware configuration extractorIPs: 43.129.209.178:443
                      Source: Malware configuration extractorIPs: 165.22.254.236:8080
                      Source: Malware configuration extractorIPs: 175.126.176.79:8080
                      Source: Malware configuration extractorIPs: 202.134.4.210:7080
                      Source: Malware configuration extractorIPs: 202.29.239.162:443
                      Source: Malware configuration extractorIPs: 46.101.98.60:8080
                      Source: Malware configuration extractorIPs: 54.37.228.122:443
                      Source: Malware configuration extractorIPs: 5.253.30.17:7080
                      Source: Joe Sandbox ViewASN Name: DIGITALOCEAN-ASNUS DIGITALOCEAN-ASNUS
                      Source: Joe Sandbox ViewIP Address: 157.230.99.206 157.230.99.206
                      Source: global trafficTCP traffic: 192.168.2.7:49786 -> 174.138.33.49:7080
                      Source: unknownNetwork traffic detected: IP country count 19
                      Source: unknownTCP traffic detected without corresponding DNS query: 174.138.33.49
                      Source: unknownTCP traffic detected without corresponding DNS query: 174.138.33.49
                      Source: unknownTCP traffic detected without corresponding DNS query: 174.138.33.49
                      Source: unknownTCP traffic detected without corresponding DNS query: 174.138.33.49
                      Source: unknownTCP traffic detected without corresponding DNS query: 174.138.33.49
                      Source: unknownTCP traffic detected without corresponding DNS query: 174.138.33.49
                      Source: unknownTCP traffic detected without corresponding DNS query: 174.138.33.49
                      Source: unknownTCP traffic detected without corresponding DNS query: 174.138.33.49
                      Source: unknownTCP traffic detected without corresponding DNS query: 174.138.33.49
                      Source: unknownTCP traffic detected without corresponding DNS query: 174.138.33.49
                      Source: unknownTCP traffic detected without corresponding DNS query: 174.138.33.49
                      Source: svchost.exe, 0000001B.00000003.752136141.000001705656F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Try it free for 30 days, no strings attached\r\n\r\nLike us on Facebook: http://www.facebook.com/spotify \r\nFollow us on Twitter: http://twitter.com/spotify","ProductTitle":"Spotify - Music and Podcasts","SearchTitles":[{"SearchTitleString":"Spotify","SearchTitleType":"SearchHint"},{"SearchTitleString":"Music","SearchTitleType":"SearchHint"},{"SearchTitleString":"music apps","SearchTitleType":"SearchHint"},{"SearchTitleString":"free music","SearchTitleType":"SearchHint"},{"SearchTitleString":"podcasts","SearchTitleType":"SearchHint"},{"SearchTitleString":"streaming","SearchTitleType":"SearchHint"},{"SearchTitleString":"soundcloud","SearchTitleType":"SearchHint"}],"Language":"en-us","Markets":["US","DZ","AR","AU","AT","BH","BD","BE","BR","BG","CA","CL","CN","CO","CR","HR","CY","CZ","DK","EG","EE","FI","FR","DE","GR","GT","HK","HU","IS","IN","ID","IQ","IE","IL","IT","JP","JO","KZ","KE","KW","LV","LB","LI","LT","LU","MY","MT","MR","MX","MA","NL","NZ","NG","NO","OM","PK","PE","PH","PL","PT","QA","RO","RU","SA","RS","SG","SK","SI","ZA","KR","ES","SE","CH","TW","TH","TT","TN","TR","UA","AE","GB","VN","YE","LY","LK","UY","VE","AF","AX","AL","AS","AO","AI","AQ","AG","AM","AW","BO","BQ","BA","BW","BV","IO","BN","BF","BI","KH","CM","CV","KY","CF","TD","TL","DJ","DM","DO","EC","SV","GQ","ER","ET","FK","FO","FJ","GF","PF","TF","GA","GM","GE","GH","GI","GL","GD","GP","GU","GG","GN","GW","GY","HT","HM","HN","AZ","BS","BB","BY","BZ","BJ","BM","BT","KM","CG","CD","CK","CX","CC","CI","CW","JM","SJ","JE","KI","KG","LA","LS","LR","MO","MK","MG","MW","IM","MH","MQ","MU","YT","FM","MD","MN","MS","MZ","MM","NA","NR","NP","MV","ML","NC","NI","NE","NU","NF","PW","PS","PA","PG","PY","RE","RW","BL","MF","WS","ST","SN","MP","PN","SX","SB","SO","SC","SL","GS","SH","KN","LC","PM","VC","TJ","TZ","TG","TK","TO","TM","TC","TV","UM","UG", equals www.facebook.com (Facebook)
                      Source: svchost.exe, 0000001B.00000003.752136141.000001705656F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Try it free for 30 days, no strings attached\r\n\r\nLike us on Facebook: http://www.facebook.com/spotify \r\nFollow us on Twitter: http://twitter.com/spotify","ProductTitle":"Spotify - Music and Podcasts","SearchTitles":[{"SearchTitleString":"Spotify","SearchTitleType":"SearchHint"},{"SearchTitleString":"Music","SearchTitleType":"SearchHint"},{"SearchTitleString":"music apps","SearchTitleType":"SearchHint"},{"SearchTitleString":"free music","SearchTitleType":"SearchHint"},{"SearchTitleString":"podcasts","SearchTitleType":"SearchHint"},{"SearchTitleString":"streaming","SearchTitleType":"SearchHint"},{"SearchTitleString":"soundcloud","SearchTitleType":"SearchHint"}],"Language":"en-us","Markets":["US","DZ","AR","AU","AT","BH","BD","BE","BR","BG","CA","CL","CN","CO","CR","HR","CY","CZ","DK","EG","EE","FI","FR","DE","GR","GT","HK","HU","IS","IN","ID","IQ","IE","IL","IT","JP","JO","KZ","KE","KW","LV","LB","LI","LT","LU","MY","MT","MR","MX","MA","NL","NZ","NG","NO","OM","PK","PE","PH","PL","PT","QA","RO","RU","SA","RS","SG","SK","SI","ZA","KR","ES","SE","CH","TW","TH","TT","TN","TR","UA","AE","GB","VN","YE","LY","LK","UY","VE","AF","AX","AL","AS","AO","AI","AQ","AG","AM","AW","BO","BQ","BA","BW","BV","IO","BN","BF","BI","KH","CM","CV","KY","CF","TD","TL","DJ","DM","DO","EC","SV","GQ","ER","ET","FK","FO","FJ","GF","PF","TF","GA","GM","GE","GH","GI","GL","GD","GP","GU","GG","GN","GW","GY","HT","HM","HN","AZ","BS","BB","BY","BZ","BJ","BM","BT","KM","CG","CD","CK","CX","CC","CI","CW","JM","SJ","JE","KI","KG","LA","LS","LR","MO","MK","MG","MW","IM","MH","MQ","MU","YT","FM","MD","MN","MS","MZ","MM","NA","NR","NP","MV","ML","NC","NI","NE","NU","NF","PW","PS","PA","PG","PY","RE","RW","BL","MF","WS","ST","SN","MP","PN","SX","SB","SO","SC","SL","GS","SH","KN","LC","PM","VC","TJ","TZ","TG","TK","TO","TM","TC","TV","UM","UG", equals www.twitter.com (Twitter)
                      Source: svchost.exe, 0000001B.00000003.752174346.0000017056580000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001B.00000003.752136141.000001705656F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Try it free for 30 days, no strings attached\r\n\r\nLike us on Facebook: http://www.facebook.com/spotify \r\nFollow us on Twitter: http://twitter.com/spotify","ProductTitle":"Spotify - Music and Podcasts","SearchTitles":[{"SearchTitleString":"Spotify","SearchTitleType":"SearchHint"},{"SearchTitleString":"Music","SearchTitleType":"SearchHint"},{"SearchTitleString":"music apps","SearchTitleType":"SearchHint"},{"SearchTitleString":"free music","SearchTitleType":"SearchHint"},{"SearchTitleString":"podcasts","SearchTitleType":"SearchHint"},{"SearchTitleString":"streaming","SearchTitleType":"SearchHint"},{"SearchTitleString":"soundcloud","SearchTitleType":"SearchHint"}],"Language":"en-us","Markets":["US","DZ","AR","AU","AT","BH","BD","BE","BR","BG","CA","CL","CN","CO","CR","HR","CY","CZ","DK","EG","EE","FI","FR","DE","GR","GT","HK","HU","IS","IN","ID","IQ","IE","IL","IT","JP","JO","KZ","KE","KW","LV","LB","LI","LT","LU","MY","MT","MR","MX","MA","NL","NZ","NG","NO","OM","PK","PE","PH","PL","PT","QA","RO","RU","SA","RS","SG","SK","SI","ZA","KR","ES","SE","CH","TW","TH","TT","TN","TR","UA","AE","GB","VN","YE","LY","LK","UY","VE","AF","AX","AL","AS","AO","AI","AQ","AG","AM","AW","BO","BQ","BA","BW","BV","IO","BN","BF","BI","KH","CM","CV","KY","CF","TD","TL","DJ","DM","DO","EC","SV","GQ","ER","ET","FK","FO","FJ","GF","PF","TF","GA","GM","GE","GH","GI","GL","GD","GP","GU","GG","GN","GW","GY","HT","HM","HN","AZ","BS","BB","BY","BZ","BJ","BM","BT","KM","CG","CD","CK","CX","CC","CI","CW","JM","SJ","JE","KI","KG","LA","LS","LR","MO","MK","MG","MW","IM","MH","MQ","MU","YT","FM","MD","MN","MS","MZ","MM","NA","NR","NP","MV","ML","NC","NI","NE","NU","NF","PW","PS","PA","PG","PY","RE","RW","BL","MF","WS","ST","SN","MP","PN","SX","SB","SO","SC","SL","GS","SH","KN","LC","PM","VC","TJ","TZ","TG","TK","TO","TM","TC","TV","UM","UG","VI","VG","WF","EH","ZM","ZW","UZ","VU","SR","SZ","AD","MC","SM","ME","VA","NEUTRAL"]}],"MarketProperties":[{"RelatedProducts":[],"Markets":["US"]}],"ProductASchema":"Product;3","ProductBSchema":"ProductUnifiedApp;3","ProductId":"9NCBCSZSJRSB","Properties":{"PackageFamilyName":"SpotifyAB.SpotifyMusic_zpdnekdrzrea0","PackageIdentityName":"SpotifyAB.SpotifyMusic","PublisherCertificateName":"CN=453637B3-4E12-4CDF-B0D3-2A3C863BF6EF","XboxCrossGenSetId":null,"XboxConsoleGenOptimized":null,"XboxConsoleGenCompatible":null},"AlternateIds":[{"IdType":"LegacyWindowsStoreProductId","Value":"ceac5d3f-8a4f-40e1-9a67-76d9108c7cb5"},{"IdType":"LegacyWindowsPhoneProductId","Value":"caac1b9d-621b-4f96-b143-e10e1397740a"},{"IdType":"XboxTitleId","Value":"1681279293"}],"IngestionSource":"DCE","IsMicrosoftProduct":false,"PreferredSkuId":"0010","ProductType":"Application","ValidationData":{"PassedValidation":false,"RevisionId":"2022-07-11T16:37:37.4991749Z||.||58dfb4d5-be7e-424e-8739-cac99224843f||1152921505695035586||Null||fullrelease","ValidationResultUri":""},"MerchandizingTags":[],"PartD":"","ProductFamily":"Apps","ProductKind":"Application","DisplaySkuAvailab
                      Source: svchost.exe, 0000001B.00000003.752174346.0000017056580000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001B.00000003.752136141.000001705656F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Try it free for 30 days, no strings attached\r\n\r\nLike us on Facebook: http://www.facebook.com/spotify \r\nFollow us on Twitter: http://twitter.com/spotify","ProductTitle":"Spotify - Music and Podcasts","SearchTitles":[{"SearchTitleString":"Spotify","SearchTitleType":"SearchHint"},{"SearchTitleString":"Music","SearchTitleType":"SearchHint"},{"SearchTitleString":"music apps","SearchTitleType":"SearchHint"},{"SearchTitleString":"free music","SearchTitleType":"SearchHint"},{"SearchTitleString":"podcasts","SearchTitleType":"SearchHint"},{"SearchTitleString":"streaming","SearchTitleType":"SearchHint"},{"SearchTitleString":"soundcloud","SearchTitleType":"SearchHint"}],"Language":"en-us","Markets":["US","DZ","AR","AU","AT","BH","BD","BE","BR","BG","CA","CL","CN","CO","CR","HR","CY","CZ","DK","EG","EE","FI","FR","DE","GR","GT","HK","HU","IS","IN","ID","IQ","IE","IL","IT","JP","JO","KZ","KE","KW","LV","LB","LI","LT","LU","MY","MT","MR","MX","MA","NL","NZ","NG","NO","OM","PK","PE","PH","PL","PT","QA","RO","RU","SA","RS","SG","SK","SI","ZA","KR","ES","SE","CH","TW","TH","TT","TN","TR","UA","AE","GB","VN","YE","LY","LK","UY","VE","AF","AX","AL","AS","AO","AI","AQ","AG","AM","AW","BO","BQ","BA","BW","BV","IO","BN","BF","BI","KH","CM","CV","KY","CF","TD","TL","DJ","DM","DO","EC","SV","GQ","ER","ET","FK","FO","FJ","GF","PF","TF","GA","GM","GE","GH","GI","GL","GD","GP","GU","GG","GN","GW","GY","HT","HM","HN","AZ","BS","BB","BY","BZ","BJ","BM","BT","KM","CG","CD","CK","CX","CC","CI","CW","JM","SJ","JE","KI","KG","LA","LS","LR","MO","MK","MG","MW","IM","MH","MQ","MU","YT","FM","MD","MN","MS","MZ","MM","NA","NR","NP","MV","ML","NC","NI","NE","NU","NF","PW","PS","PA","PG","PY","RE","RW","BL","MF","WS","ST","SN","MP","PN","SX","SB","SO","SC","SL","GS","SH","KN","LC","PM","VC","TJ","TZ","TG","TK","TO","TM","TC","TV","UM","UG","VI","VG","WF","EH","ZM","ZW","UZ","VU","SR","SZ","AD","MC","SM","ME","VA","NEUTRAL"]}],"MarketProperties":[{"RelatedProducts":[],"Markets":["US"]}],"ProductASchema":"Product;3","ProductBSchema":"ProductUnifiedApp;3","ProductId":"9NCBCSZSJRSB","Properties":{"PackageFamilyName":"SpotifyAB.SpotifyMusic_zpdnekdrzrea0","PackageIdentityName":"SpotifyAB.SpotifyMusic","PublisherCertificateName":"CN=453637B3-4E12-4CDF-B0D3-2A3C863BF6EF","XboxCrossGenSetId":null,"XboxConsoleGenOptimized":null,"XboxConsoleGenCompatible":null},"AlternateIds":[{"IdType":"LegacyWindowsStoreProductId","Value":"ceac5d3f-8a4f-40e1-9a67-76d9108c7cb5"},{"IdType":"LegacyWindowsPhoneProductId","Value":"caac1b9d-621b-4f96-b143-e10e1397740a"},{"IdType":"XboxTitleId","Value":"1681279293"}],"IngestionSource":"DCE","IsMicrosoftProduct":false,"PreferredSkuId":"0010","ProductType":"Application","ValidationData":{"PassedValidation":false,"RevisionId":"2022-07-11T16:37:37.4991749Z||.||58dfb4d5-be7e-424e-8739-cac99224843f||1152921505695035586||Null||fullrelease","ValidationResultUri":""},"MerchandizingTags":[],"PartD":"","ProductFamily":"Apps","ProductKind":"Application","DisplaySkuAvailab
                      Source: regsvr32.exe, 0000000B.00000003.802858560.000000000092E000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000B.00000002.886096275.000000000092E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000012.00000002.887267999.000001897A662000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001B.00000003.777530501.000001705650B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001B.00000002.804759431.000001705650C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
                      Source: svchost.exe, 0000001B.00000002.804530802.0000017055AEA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.ver)
                      Source: regsvr32.exe, 0000000B.00000002.885967879.00000000008F6000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000B.00000003.803132902.00000000008F6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en
                      Source: regsvr32.exe, 0000000B.00000003.802910460.000000000095B000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000B.00000002.885863277.00000000008CD000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000B.00000003.803078720.00000000008CD000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000B.00000002.886221388.000000000095B000.00000004.00000020.00020000.00000000.sdmp, 77EC63BDA74BD0D0E0426DC8F80085060.11.drString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
                      Source: regsvr32.exe, 0000000B.00000003.574519632.000000000097A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com:80/msdownload/update/v3/static/trustedr/en/authrootstl.cab?3a38e22c22
                      Source: svchost.exe, 0000001B.00000003.776121457.00000170565B0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://help.disneyplus.com.
                      Source: svchost.exe, 00000012.00000002.886351225.0000018974CAB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/0
                      Source: svchost.exe, 00000012.00000002.886351225.0000018974CAB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addres
                      Source: regsvr32.exe, 0000000B.00000003.803078720.00000000008CD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://174.138.33.49/
                      Source: regsvr32.exe, 0000000B.00000002.885863277.00000000008CD000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000B.00000003.803078720.00000000008CD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://174.138.33.49:7080/
                      Source: regsvr32.exe, 0000000B.00000002.885863277.00000000008CD000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000B.00000003.803078720.00000000008CD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://174.138.33.49:7080/Num
                      Source: regsvr32.exe, 0000000B.00000002.885863277.00000000008CD000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000B.00000003.803078720.00000000008CD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://174.138.33.49:7080/a
                      Source: regsvr32.exe, 0000000B.00000002.885863277.00000000008CD000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000B.00000003.803078720.00000000008CD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://174.138.33.49:7080/s64
                      Source: regsvr32.exe, 0000000B.00000002.885863277.00000000008CD000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000B.00000003.803078720.00000000008CD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://174.138.33.49:7080/u
                      Source: svchost.exe, 0000001B.00000003.776121457.00000170565B0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://disneyplus.com/legal.
                      Source: svchost.exe, 0000001B.00000003.772609747.0000017056585000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001B.00000003.772596708.0000017056582000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001B.00000003.771116472.00000170565B0000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001B.00000003.771585831.000001705657C000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001B.00000003.771543494.000001705657B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001B.00000003.771348384.000001705659E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001B.00000003.771440016.000001705657B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001B.00000003.771293341.0000017056A1A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001B.00000003.771489113.000001705657B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001B.00000003.771257487.0000017056A1A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001B.00000003.771315826.0000017056A02000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001B.00000003.771513285.000001705657C000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001B.00000003.771024338.000001705659E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001B.00000003.771224165.00000170565BA000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001B.00000003.771633828.0000017056580000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://support.hotspotshield.com/
                      Source: svchost.exe, 0000001B.00000003.776121457.00000170565B0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.disneyplus.com/legal/privacy-policy
                      Source: svchost.exe, 0000001B.00000003.776121457.00000170565B0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.disneyplus.com/legal/your-california-privacy-rights
                      Source: svchost.exe, 0000001B.00000003.772609747.0000017056585000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001B.00000003.772596708.0000017056582000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001B.00000003.771116472.00000170565B0000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001B.00000003.771585831.000001705657C000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001B.00000003.771543494.000001705657B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001B.00000003.771348384.000001705659E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001B.00000003.771440016.000001705657B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001B.00000003.771293341.0000017056A1A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001B.00000003.771489113.000001705657B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001B.00000003.771257487.0000017056A1A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001B.00000003.771315826.0000017056A02000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001B.00000003.771513285.000001705657C000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001B.00000003.771024338.000001705659E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001B.00000003.771224165.00000170565BA000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001B.00000003.771633828.0000017056580000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.hotspotshield.com/terms/
                      Source: svchost.exe, 0000001B.00000003.772609747.0000017056585000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001B.00000003.772596708.0000017056582000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001B.00000003.771116472.00000170565B0000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001B.00000003.771585831.000001705657C000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001B.00000003.771543494.000001705657B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001B.00000003.771348384.000001705659E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001B.00000003.771440016.000001705657B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001B.00000003.771293341.0000017056A1A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001B.00000003.771489113.000001705657B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001B.00000003.771257487.0000017056A1A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001B.00000003.771315826.0000017056A02000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001B.00000003.771513285.000001705657C000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001B.00000003.771024338.000001705659E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001B.00000003.771224165.00000170565BA000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001B.00000003.771633828.0000017056580000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.pango.co/privacy
                      Source: svchost.exe, 0000001B.00000003.781191744.000001705659E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.tiktok.com/legal/report/feedback

                      E-Banking Fraud

                      barindex
                      Source: Yara matchFile source: 3.2.rundll32.exe.20500010000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.1b23e930000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.loaddll64.exe.1e200010000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.2.rundll32.exe.21dbea20000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 11.2.regsvr32.exe.2310000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.loaddll64.exe.1e200010000.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 11.2.regsvr32.exe.2310000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.2.rundll32.exe.21dbea20000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.regsvr32.exe.1580000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.regsvr32.exe.1580000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.rundll32.exe.1ec47bf0000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.rundll32.exe.1ec47bf0000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.1b23e930000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.rundll32.exe.20500010000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000002.492629360.000001E200010000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.479464350.0000000001580000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.492455276.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.477702534.000001EC47BF0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000B.00000002.887240071.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.477040143.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.466000340.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000B.00000002.886485279.0000000002310000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.466138189.000001B23E930000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000006.00000002.485258322.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.466579273.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.479882020.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000006.00000002.487464916.0000021DBEA20000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.466935474.0000020500010000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: C:\Windows\System32\regsvr32.exeFile deleted: C:\Windows\System32\XSYhmb\vuKI.dll:Zone.IdentifierJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeFile created: C:\Windows\system32\AfzDfnhsGeYDyd\Jump to behavior
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_10009F20
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_10001E60
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018001A804
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180017414
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018000CCC8
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018001BD64
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180027E28
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018002B6BC
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018001EB08
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180005B18
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180018B3C
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180011B88
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018000AFE4
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018000B3E4
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001800213FC
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018001A408
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018000BC08
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180001014
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180016418
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180024020
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180002820
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018001B028
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180017C30
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180022C48
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180004848
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018002344C
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018001484C
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180015C50
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018000F850
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018000C458
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180004C64
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180020C68
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180010C68
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018001406C
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018001FC70
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180004078
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180005484
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018002A088
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180023894
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001800114A0
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018001E4A8
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180007CAC
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001800030BC
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018001C8C0
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001800178C4
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018001D4D0
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001800090D4
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001800284DC
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180008CE0
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001800124E4
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180003CE8
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018002B0EC
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018001ACEC
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018000B0F8
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180016110
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180024918
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180013D1C
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018002BD20
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180026520
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018000BD24
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180021D2C
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018000D92C
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018001A130
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018002093C
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180017144
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180004948
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018001B558
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018002155C
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180019D5C
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018002796C
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018002B570
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180016978
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180010578
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018000F580
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018000ED84
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180028990
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180014594
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180016594
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180005198
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180029DA8
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001800041A8
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018000B1A8
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018001C5AC
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180017DB0
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180020DBC
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001800129BC
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180002DC0
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018001D9C4
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180023DD4
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001800025D8
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018001C9F0
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001800031F0
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001800199F4
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180022E04
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180013210
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180013610
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180013E18
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018001F61C
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018001D620
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018001762C
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180025E30
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180022638
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018001F238
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180029A40
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018001D254
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018000E254
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018000FE58
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018001EE5C
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180010680
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018002BE90
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018000F290
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018000B698
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180006698
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018002369C
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180003A9C
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001800276A4
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001800216A8
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001800146B4
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018000B2BC
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180019EC0
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180020AC4
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018000FAD0
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180021AE0
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001800072E0
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001800036E0
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180002AE4
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180028EE8
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180024EF4
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001800212FC
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180022AFC
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018000D300
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018002A304
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180023304
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180002708
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180019720
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018001C720
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180013724
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180017B24
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180028B28
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018002632C
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180024330
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180022F3C
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180026F3C
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180026B40
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180003F40
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180008F5C
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180010B60
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018001F764
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180014368
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180001368
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018000CB6C
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018000DB74
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180012F94
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018001E7A4
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001800127A4
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018001EFAC
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001800093AC
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180013BB4
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180007BB4
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018000DFCC
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018000EFCC
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001800207D0
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018001ABD8
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001800193E0
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000001E200000000
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_01570000
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001A804
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180017414
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001FC70
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001C8C0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000CCC8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001BD64
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180027E28
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018002B6BC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001EB08
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180005B18
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180018B3C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180011B88
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000AFE4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000B3E4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800213FC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001A408
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000BC08
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180001014
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180016418
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180024020
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180002820
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001B028
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180017C30
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180022C48
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180004848
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018002344C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001484C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180015C50
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000F850
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000C458
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180004C64
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180020C68
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180010C68
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001406C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180004078
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180005484
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018002A088
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180023894
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800114A0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001E4A8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180007CAC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800030BC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800178C4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001D4D0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800090D4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800284DC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180008CE0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800124E4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180003CE8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018002B0EC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001ACEC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000B0F8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180016110
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180024918
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180013D1C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018002BD20
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180026520
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000BD24
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180021D2C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000D92C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001A130
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018002093C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180017144
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180004948
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001B558
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018002155C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180019D5C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018002796C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018002B570
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180016978
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180010578
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000F580
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000ED84
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180028990
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180014594
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180016594
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180005198
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180029DA8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800041A8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000B1A8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001C5AC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180017DB0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180020DBC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800129BC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180002DC0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001D9C4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180023DD4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800025D8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001C9F0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800031F0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800199F4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180022E04
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180013210
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180013610
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180013E18
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001F61C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001D620
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001762C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180025E30
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180022638
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001F238
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180029A40
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001D254
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000E254
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000FE58
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001EE5C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180010680
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018002BE90
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000F290
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000B698
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180006698
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018002369C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180003A9C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800276A4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800216A8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800146B4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000B2BC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180019EC0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180020AC4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000FAD0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180021AE0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800072E0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800036E0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180002AE4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180028EE8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180024EF4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800212FC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180022AFC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000D300
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018002A304
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180023304
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180002708
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180019720
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001C720
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180013724
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180017B24
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180028B28
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018002632C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180024330
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180022F3C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180026F3C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180026B40
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180003F40
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180008F5C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180010B60
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001F764
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180014368
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180001368
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000CB6C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000DB74
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180012F94
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001E7A4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800127A4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001EFAC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800093AC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180013BB4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180007BB4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000DFCC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000EFCC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800207D0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001ABD8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800193E0
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000020500000000
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000001B23E8F0000
                      Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000001EC47B90000
                      Source: C:\Windows\System32\rundll32.exeCode function: 6_2_0000021DBE810000
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_00870000
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_0000000180017FEC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_000000018001C9F0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_000000018001A804
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_0000000180027E28
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_0000000180023894
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_0000000180007CAC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_000000018002A304
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_0000000180005B18
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_0000000180022F3C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_0000000180018B3C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_000000018001BD64
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_0000000180014368
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_0000000180001368
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_00000001800041A8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_000000018000AFE4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_000000018000B3E4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_00000001800031F0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_00000001800199F4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_00000001800213FC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_0000000180022E04
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_000000018001A408
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_000000018000BC08
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_0000000180013210
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_0000000180013610
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_0000000180017414
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_0000000180001014
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_0000000180016418
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_0000000180013E18
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_000000018001F61C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_0000000180024020
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_000000018001D620
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_0000000180002820
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_000000018001B028
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_000000018001762C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_0000000180025E30
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_0000000180017C30
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_0000000180022638
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_000000018001F238
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_0000000180029A40
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_0000000180022C48
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_0000000180004848
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_000000018002344C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_000000018001484C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_0000000180015C50
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_000000018000F850
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_000000018001D254
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_000000018000E254
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_000000018000FE58
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_000000018000C458
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_000000018001EE5C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_0000000180004C64
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_0000000180020C68
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_0000000180010C68
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_000000018001406C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_000000018001FC70
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_0000000180004078
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_0000000180010680
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_0000000180005484
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_000000018002A088
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_000000018002BE90
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_000000018000F290
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_0000000180006698
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_000000018000B698
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_000000018002369C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_0000000180003A9C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_00000001800114A0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_00000001800276A4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_00000001800216A8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_000000018001E4A8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_00000001800146B4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_000000018002B6BC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_00000001800030BC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_000000018000B2BC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_000000018001C8C0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_0000000180019EC0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_0000000180020AC4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_00000001800178C4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_000000018000CCC8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_000000018001D4D0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_000000018000FAD0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_00000001800090D4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_00000001800284DC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_0000000180021AE0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_00000001800036E0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_00000001800072E0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_0000000180008CE0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_00000001800124E4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_0000000180002AE4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_0000000180028EE8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_0000000180003CE8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_000000018002B0EC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_000000018001ACEC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_0000000180024EF4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_000000018000B0F8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_00000001800212FC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_0000000180022AFC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_000000018000D300
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_0000000180023304
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_000000018001EB08
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_0000000180002708
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_0000000180016110
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_0000000180024918
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_0000000180013D1C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_000000018002BD20
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_0000000180026520
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_000000018001C720
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_0000000180019720
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_0000000180013724
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_0000000180017B24
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_000000018000BD24
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_0000000180028B28
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_0000000180021D2C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_000000018002632C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_000000018000D92C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_0000000180024330
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_000000018001A130
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_000000018002093C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_0000000180026F3C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_0000000180026B40
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_0000000180003F40
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_0000000180017144
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_0000000180004948
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_000000018001B558
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_000000018002155C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_0000000180019D5C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_0000000180008F5C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_0000000180010B60
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_000000018001F764
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_000000018002796C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_000000018000CB6C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_000000018002B570
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_000000018000DB74
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_0000000180016978
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_0000000180010578
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_000000018000F580
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_000000018000ED84
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_0000000180011B88
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_0000000180028990
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_0000000180012F94
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_0000000180014594
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_0000000180016594
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_0000000180005198
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_000000018001E7A4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_00000001800127A4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_0000000180029DA8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_000000018000B1A8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_000000018001C5AC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_000000018001EFAC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_00000001800093AC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_0000000180017DB0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_0000000180013BB4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_0000000180007BB4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_0000000180020DBC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_00000001800129BC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_0000000180002DC0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_000000018001D9C4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_000000018000DFCC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_000000018000EFCC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_00000001800207D0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_0000000180023DD4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_000000018001ABD8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_00000001800025D8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_00000001800193E0
                      Source: PYCkUgesWB.dllStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                      Source: C:\Windows\System32\regsvr32.exeSection loaded: sfc.dll
                      Source: C:\Windows\System32\regsvr32.exeSection loaded: sfc.dll
                      Source: C:\Windows\System32\regsvr32.exeSection loaded: sfc.dll
                      Source: PYCkUgesWB.dllVirustotal: Detection: 66%
                      Source: PYCkUgesWB.dllMetadefender: Detection: 42%
                      Source: PYCkUgesWB.dllReversingLabs: Detection: 80%
                      Source: PYCkUgesWB.dllStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      Source: C:\Windows\System32\loaddll64.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                      Source: unknownProcess created: C:\Windows\System32\loaddll64.exe loaddll64.exe "C:\Users\user\Desktop\PYCkUgesWB.dll"
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\PYCkUgesWB.dll",#1
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\PYCkUgesWB.dll
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\PYCkUgesWB.dll",#1
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\PYCkUgesWB.dll,AjkRVrFNnyQmqXQdrComyaiwV
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\PYCkUgesWB.dll,AkMhEGvNFpnSswjeCw
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\PYCkUgesWB.dll,BMIWqtk
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
                      Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\System32\regsvr32.exe C:\Windows\system32\regsvr32.exe "C:\Windows\system32\XSYhmb\vuKI.dll"
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\regsvr32.exe C:\Windows\system32\regsvr32.exe "C:\Windows\system32\AfzDfnhsGeYDyd\OsmuofIfhwEGDVL.dll"
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe c:\windows\system32\svchost.exe -k netsvcs -p -s BITS
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\PYCkUgesWB.dll",#1
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\PYCkUgesWB.dll
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\PYCkUgesWB.dll,AjkRVrFNnyQmqXQdrComyaiwV
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\PYCkUgesWB.dll,AkMhEGvNFpnSswjeCw
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\PYCkUgesWB.dll,BMIWqtk
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\regsvr32.exe C:\Windows\system32\regsvr32.exe "C:\Windows\system32\AfzDfnhsGeYDyd\OsmuofIfhwEGDVL.dll"
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\PYCkUgesWB.dll",#1
                      Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\System32\regsvr32.exe C:\Windows\system32\regsvr32.exe "C:\Windows\system32\XSYhmb\vuKI.dll"
                      Source: C:\Windows\System32\loaddll64.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{D105A4D4-344C-48EB-9866-EE378D90658B}\InProcServer32
                      Source: classification engineClassification label: mal88.troj.evad.winDLL@24/4@0/44
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_10010890 CoCreateInstance,SysAllocString,SysFreeString,
                      Source: C:\Windows\System32\regsvr32.exeCode function: CreateServiceW,
                      Source: C:\Windows\System32\loaddll64.exeFile read: C:\Users\desktop.iniJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018001A804 Process32FirstW,CreateToolhelp32Snapshot,Process32NextW,FindCloseChangeNotification,
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\PYCkUgesWB.dll",#1
                      Source: C:\Windows\System32\regsvr32.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: PYCkUgesWB.dllStatic PE information: More than 187 > 100 exports found
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180008C72 push ebp; ret
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180008C72 push ebp; ret
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_10004E30 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,
                      Source: PYCkUgesWB.dllStatic PE information: real checksum: 0x499a1 should be: 0x524a5
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\PYCkUgesWB.dll
                      Source: C:\Windows\System32\regsvr32.exePE file moved: C:\Windows\System32\XSYhmb\vuKI.dllJump to behavior

                      Hooking and other Techniques for Hiding and Protection

                      barindex
                      Source: C:\Windows\System32\loaddll64.exeFile opened: C:\Windows\system32\AfzDfnhsGeYDyd\OsmuofIfhwEGDVL.dll:Zone.Identifier read attributes | delete
                      Source: C:\Windows\System32\regsvr32.exeFile opened: C:\Windows\system32\XSYhmb\vuKI.dll:Zone.Identifier read attributes | delete
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\svchost.exe TID: 6920Thread sleep time: -30000s >= -30000s
                      Source: C:\Windows\System32\svchost.exe TID: 2704Thread sleep time: -150000s >= -30000s
                      Source: C:\Windows\System32\loaddll64.exeEvasive API call chain: GetModuleFileName,DecisionNodes,ExitProcess
                      Source: C:\Windows\System32\svchost.exeFile opened: PhysicalDrive0
                      Source: C:\Windows\System32\loaddll64.exeProcess information queried: ProcessInformation
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_000000018001C9F0 FindFirstFileW,FindNextFileW,
                      Source: C:\Windows\System32\loaddll64.exeAPI call chain: ExitProcess graph end node
                      Source: C:\Windows\System32\loaddll64.exeAPI call chain: ExitProcess graph end node
                      Source: C:\Windows\System32\regsvr32.exeFile Volume queried: C:\ FullSizeInformation
                      Source: regsvr32.exe, 0000000B.00000002.885983137.00000000008FD000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000B.00000003.803196731.00000000008FA000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000B.00000003.803132902.00000000008F6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWY
                      Source: svchost.exe, 00000012.00000002.887267999.000001897A662000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: @Hyper-V RAW
                      Source: svchost.exe, 0000000A.00000002.885676626.000001DB4EC02000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: HvHostWdiSystemHostScDeviceEnumWiaRpctrkwksAudioEndpointBuilderhidservdot3svcDsSvcfhsvcWPDBusEnumsvsvcwlansvcEmbeddedModeirmonSensorServicevmicvssNgcSvcsysmainDevQueryBrokerStorSvcvmickvpexchangevmicshutdownvmicguestinterfacevmicvmsessionNcbServiceNetmanDeviceAssociationServiceTabletInputServicePcaSvcIPxlatCfgSvcCscServiceUmRdpService
                      Source: regsvr32.exe, 0000000B.00000002.885983137.00000000008FD000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000B.00000003.803196731.00000000008FA000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000B.00000003.803132902.00000000008F6000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000012.00000002.886011420.0000018974C29000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000012.00000002.887207397.000001897A64A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001B.00000002.804530802.0000017055AEA000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001B.00000002.804366776.0000017055AAA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                      Source: regsvr32.exe, 0000000B.00000002.885863277.00000000008CD000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000B.00000003.803078720.00000000008CD000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW`
                      Source: regsvr32.exe, 00000002.00000003.469429616.0000000001420000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}6
                      Source: svchost.exe, 0000000A.00000002.885950299.000001DB4EC40000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_10001050 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_10004E30 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_10001500 GetProcessHeap,HeapAlloc,GetVersionExA,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetCommandLineA,FlsSetValue,GetCurrentThreadId,
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_10001050 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_10006C70 RtlCaptureContext,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_10006580 SetUnhandledExceptionFilter,
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_100065B0 SetUnhandledExceptionFilter,
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_10004660 RtlCaptureContext,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_10004700 RtlCaptureContext,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,

                      HIPS / PFW / Operating System Protection Evasion

                      barindex
                      Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 174.138.33.49 7080
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\PYCkUgesWB.dll",#1
                      Source: C:\Windows\System32\regsvr32.exeQueries volume information: C:\ VolumeInformation
                      Source: C:\Windows\System32\regsvr32.exeQueries volume information: C:\ VolumeInformation
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformation
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm VolumeInformation
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformation
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformation
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformation
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformation
                      Source: C:\Windows\System32\loaddll64.exeCode function: GetLocaleInfoA,
                      Source: C:\Windows\System32\regsvr32.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_100042A0 GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter,
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_10001500 GetProcessHeap,HeapAlloc,GetVersionExA,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetCommandLineA,FlsSetValue,GetCurrentThreadId,

                      Stealing of Sensitive Information

                      barindex
                      Source: Yara matchFile source: 3.2.rundll32.exe.20500010000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.1b23e930000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.loaddll64.exe.1e200010000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.2.rundll32.exe.21dbea20000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 11.2.regsvr32.exe.2310000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.loaddll64.exe.1e200010000.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 11.2.regsvr32.exe.2310000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.2.rundll32.exe.21dbea20000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.regsvr32.exe.1580000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.regsvr32.exe.1580000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.rundll32.exe.1ec47bf0000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.rundll32.exe.1ec47bf0000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.1b23e930000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.rundll32.exe.20500010000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000002.492629360.000001E200010000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.479464350.0000000001580000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.492455276.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.477702534.000001EC47BF0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000B.00000002.887240071.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.477040143.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.466000340.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000B.00000002.886485279.0000000002310000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.466138189.000001B23E930000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000006.00000002.485258322.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.466579273.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.479882020.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000006.00000002.487464916.0000021DBEA20000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.466935474.0000020500010000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                      Valid Accounts2
                      Native API
                      1
                      Windows Service
                      1
                      Windows Service
                      2
                      Masquerading
                      OS Credential Dumping1
                      System Time Discovery
                      Remote Services1
                      Archive Collected Data
                      Exfiltration Over Other Network Medium1
                      Encrypted Channel
                      Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                      Default AccountsScheduled Task/Job1
                      DLL Side-Loading
                      111
                      Process Injection
                      2
                      Virtualization/Sandbox Evasion
                      LSASS Memory31
                      Security Software Discovery
                      Remote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth1
                      Non-Standard Port
                      Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                      Domain AccountsAt (Linux)Logon Script (Windows)1
                      DLL Side-Loading
                      111
                      Process Injection
                      Security Account Manager2
                      Virtualization/Sandbox Evasion
                      SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration1
                      Application Layer Protocol
                      Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                      Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)1
                      Hidden Files and Directories
                      NTDS2
                      Process Discovery
                      Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
                      Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script2
                      Obfuscated Files or Information
                      LSA Secrets1
                      Remote System Discovery
                      SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                      Replication Through Removable MediaLaunchdRc.commonRc.common1
                      Regsvr32
                      Cached Domain Credentials2
                      File and Directory Discovery
                      VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                      External Remote ServicesScheduled TaskStartup ItemsStartup Items1
                      Rundll32
                      DCSync35
                      System Information Discovery
                      Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                      Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job1
                      DLL Side-Loading
                      Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
                      Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)1
                      File Deletion
                      /etc/passwd and /etc/shadowSystem Network Connections DiscoverySoftware Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet
                      behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 666431 Sample: PYCkUgesWB.com_15e2f984de98... Startdate: 16/07/2022 Architecture: WINDOWS Score: 88 33 103.224.241.74 WEBWERKS-AS-INWebWerksIndiaPvtLtdIN India 2->33 35 202.29.239.162 UNINET-AS-APUNINET-TH Thailand 2->35 37 40 other IPs or domains 2->37 45 Snort IDS alert for network traffic 2->45 47 Antivirus detection for URL or domain 2->47 49 Multi AV Scanner detection for submitted file 2->49 51 2 other signatures 2->51 8 loaddll64.exe 3 2->8         started        11 svchost.exe 9 1 2->11         started        14 svchost.exe 2->14         started        16 5 other processes 2->16 signatures3 process4 dnsIp5 53 Hides that the sample has been downloaded from the Internet (zone.identifier) 8->53 18 regsvr32.exe 5 8->18         started        21 cmd.exe 1 8->21         started        23 rundll32.exe 8->23         started        25 3 other processes 8->25 39 127.0.0.1 unknown unknown 11->39 signatures6 process7 signatures8 43 Hides that the sample has been downloaded from the Internet (zone.identifier) 18->43 27 regsvr32.exe 18->27         started        31 rundll32.exe 21->31         started        process9 dnsIp10 41 174.138.33.49, 49786, 7080 DIGITALOCEAN-ASNUS United States 27->41 55 System process connects to network (likely due to code injection or exploit) 27->55 signatures11

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                      windows-stand
                      SourceDetectionScannerLabelLink
                      PYCkUgesWB.dll67%VirustotalBrowse
                      PYCkUgesWB.dll43%MetadefenderBrowse
                      PYCkUgesWB.dll81%ReversingLabsWin64.Trojan.Emotet
                      No Antivirus matches
                      SourceDetectionScannerLabelLinkDownload
                      2.2.regsvr32.exe.1580000.0.unpack100%AviraHEUR/AGEN.1215461Download File
                      4.2.rundll32.exe.1b23e930000.0.unpack100%AviraHEUR/AGEN.1215461Download File
                      11.2.regsvr32.exe.2310000.0.unpack100%AviraHEUR/AGEN.1215461Download File
                      0.2.loaddll64.exe.1e200010000.1.unpack100%AviraHEUR/AGEN.1215461Download File
                      5.2.rundll32.exe.1ec47bf0000.0.unpack100%AviraHEUR/AGEN.1215461Download File
                      3.2.rundll32.exe.20500010000.0.unpack100%AviraHEUR/AGEN.1215461Download File
                      6.2.rundll32.exe.21dbea20000.0.unpack100%AviraHEUR/AGEN.1215461Download File
                      No Antivirus matches
                      SourceDetectionScannerLabelLink
                      https://www.disneyplus.com/legal/your-california-privacy-rights0%URL Reputationsafe
                      https://174.138.33.49:7080/a100%Avira URL Cloudmalware
                      https://www.disneyplus.com/legal/privacy-policy0%URL Reputationsafe
                      https://174.138.33.49:7080/s64100%Avira URL Cloudmalware
                      https://174.138.33.49:7080/0%URL Reputationsafe
                      https://www.pango.co/privacy0%URL Reputationsafe
                      https://disneyplus.com/legal.0%URL Reputationsafe
                      http://crl.ver)0%Avira URL Cloudsafe
                      https://174.138.33.49:7080/Num100%Avira URL Cloudmalware
                      https://www.tiktok.com/legal/report/feedback0%URL Reputationsafe
                      https://174.138.33.49:7080/u100%Avira URL Cloudmalware
                      http://help.disneyplus.com.0%URL Reputationsafe
                      https://174.138.33.49/0%URL Reputationsafe
                      No contacted domains info
                      NameSourceMaliciousAntivirus DetectionReputation
                      http://schemas.xmlsoap.org/ws/2004/08/addressvchost.exe, 00000012.00000002.886351225.0000018974CAB000.00000004.00000020.00020000.00000000.sdmpfalse
                        high
                        https://www.disneyplus.com/legal/your-california-privacy-rightssvchost.exe, 0000001B.00000003.776121457.00000170565B0000.00000004.00000020.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        https://174.138.33.49:7080/aregsvr32.exe, 0000000B.00000002.885863277.00000000008CD000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000B.00000003.803078720.00000000008CD000.00000004.00000020.00020000.00000000.sdmptrue
                        • Avira URL Cloud: malware
                        unknown
                        https://www.disneyplus.com/legal/privacy-policysvchost.exe, 0000001B.00000003.776121457.00000170565B0000.00000004.00000020.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        https://174.138.33.49:7080/s64regsvr32.exe, 0000000B.00000002.885863277.00000000008CD000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000B.00000003.803078720.00000000008CD000.00000004.00000020.00020000.00000000.sdmptrue
                        • Avira URL Cloud: malware
                        unknown
                        https://174.138.33.49:7080/regsvr32.exe, 0000000B.00000002.885863277.00000000008CD000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000B.00000003.803078720.00000000008CD000.00000004.00000020.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        https://www.hotspotshield.com/terms/svchost.exe, 0000001B.00000003.772609747.0000017056585000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001B.00000003.772596708.0000017056582000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001B.00000003.771116472.00000170565B0000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001B.00000003.771585831.000001705657C000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001B.00000003.771543494.000001705657B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001B.00000003.771348384.000001705659E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001B.00000003.771440016.000001705657B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001B.00000003.771293341.0000017056A1A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001B.00000003.771489113.000001705657B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001B.00000003.771257487.0000017056A1A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001B.00000003.771315826.0000017056A02000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001B.00000003.771513285.000001705657C000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001B.00000003.771024338.000001705659E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001B.00000003.771224165.00000170565BA000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001B.00000003.771633828.0000017056580000.00000004.00000020.00020000.00000000.sdmpfalse
                          high
                          https://www.pango.co/privacysvchost.exe, 0000001B.00000003.772609747.0000017056585000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001B.00000003.772596708.0000017056582000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001B.00000003.771116472.00000170565B0000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001B.00000003.771585831.000001705657C000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001B.00000003.771543494.000001705657B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001B.00000003.771348384.000001705659E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001B.00000003.771440016.000001705657B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001B.00000003.771293341.0000017056A1A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001B.00000003.771489113.000001705657B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001B.00000003.771257487.0000017056A1A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001B.00000003.771315826.0000017056A02000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001B.00000003.771513285.000001705657C000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001B.00000003.771024338.000001705659E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001B.00000003.771224165.00000170565BA000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001B.00000003.771633828.0000017056580000.00000004.00000020.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          https://disneyplus.com/legal.svchost.exe, 0000001B.00000003.776121457.00000170565B0000.00000004.00000020.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://crl.ver)svchost.exe, 0000001B.00000002.804530802.0000017055AEA000.00000004.00000020.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          low
                          https://174.138.33.49:7080/Numregsvr32.exe, 0000000B.00000002.885863277.00000000008CD000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000B.00000003.803078720.00000000008CD000.00000004.00000020.00020000.00000000.sdmptrue
                          • Avira URL Cloud: malware
                          unknown
                          https://www.tiktok.com/legal/report/feedbacksvchost.exe, 0000001B.00000003.781191744.000001705659E000.00000004.00000020.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://schemas.xmlsoap.org/ws/2004/0svchost.exe, 00000012.00000002.886351225.0000018974CAB000.00000004.00000020.00020000.00000000.sdmpfalse
                            high
                            https://174.138.33.49:7080/uregsvr32.exe, 0000000B.00000002.885863277.00000000008CD000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000B.00000003.803078720.00000000008CD000.00000004.00000020.00020000.00000000.sdmptrue
                            • Avira URL Cloud: malware
                            unknown
                            http://help.disneyplus.com.svchost.exe, 0000001B.00000003.776121457.00000170565B0000.00000004.00000020.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            https://support.hotspotshield.com/svchost.exe, 0000001B.00000003.772609747.0000017056585000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001B.00000003.772596708.0000017056582000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001B.00000003.771116472.00000170565B0000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001B.00000003.771585831.000001705657C000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001B.00000003.771543494.000001705657B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001B.00000003.771348384.000001705659E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001B.00000003.771440016.000001705657B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001B.00000003.771293341.0000017056A1A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001B.00000003.771489113.000001705657B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001B.00000003.771257487.0000017056A1A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001B.00000003.771315826.0000017056A02000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001B.00000003.771513285.000001705657C000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001B.00000003.771024338.000001705659E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001B.00000003.771224165.00000170565BA000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001B.00000003.771633828.0000017056580000.00000004.00000020.00020000.00000000.sdmpfalse
                              high
                              https://174.138.33.49/regsvr32.exe, 0000000B.00000003.803078720.00000000008CD000.00000004.00000020.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              • No. of IPs < 25%
                              • 25% < No. of IPs < 50%
                              • 50% < No. of IPs < 75%
                              • 75% < No. of IPs
                              IPDomainCountryFlagASNASN NameMalicious
                              157.230.99.206
                              unknownUnited States
                              14061DIGITALOCEAN-ASNUStrue
                              157.245.111.0
                              unknownUnited States
                              14061DIGITALOCEAN-ASNUStrue
                              196.44.98.190
                              unknownGhana
                              327814EcobandGHtrue
                              202.29.239.162
                              unknownThailand
                              4621UNINET-AS-APUNINET-THtrue
                              174.138.33.49
                              unknownUnited States
                              14061DIGITALOCEAN-ASNUStrue
                              43.129.209.178
                              unknownJapan4249LILLY-ASUStrue
                              103.41.204.169
                              unknownIndonesia
                              58397INFINYS-AS-IDPTInfinysSystemIndonesiaIDtrue
                              36.67.23.59
                              unknownIndonesia
                              17974TELKOMNET-AS2-APPTTelekomunikasiIndonesiaIDtrue
                              5.253.30.17
                              unknownLatvia
                              18978ENZUINC-UStrue
                              85.214.67.203
                              unknownGermany
                              6724STRATOSTRATOAGDEtrue
                              103.56.149.105
                              unknownIndonesia
                              55688BEON-AS-IDPTBeonIntermediaIDtrue
                              85.25.120.45
                              unknownGermany
                              8972GD-EMEA-DC-SXB1DEtrue
                              83.229.80.93
                              unknownUnited Kingdom
                              8513SKYVISIONGBtrue
                              198.199.70.22
                              unknownUnited States
                              14061DIGITALOCEAN-ASNUStrue
                              93.104.209.107
                              unknownGermany
                              8767MNET-ASGermanyDEtrue
                              188.225.32.231
                              unknownRussian Federation
                              9123TIMEWEB-ASRUtrue
                              175.126.176.79
                              unknownKorea Republic of
                              9523MOKWON-AS-KRMokwonUniversityKRtrue
                              128.199.242.164
                              unknownUnited Kingdom
                              14061DIGITALOCEAN-ASNUStrue
                              165.232.185.110
                              unknownUnited States
                              22255ALLEGHENYHEALTHNETWORKUStrue
                              103.126.216.86
                              unknownBangladesh
                              138482SKYVIEW-AS-APSKYVIEWONLINELTDBDtrue
                              104.248.225.227
                              unknownUnited States
                              14061DIGITALOCEAN-ASNUStrue
                              178.238.225.252
                              unknownGermany
                              51167CONTABODEtrue
                              128.199.217.206
                              unknownUnited Kingdom
                              14061DIGITALOCEAN-ASNUStrue
                              190.145.8.4
                              unknownColombia
                              14080TelmexColombiaSACOtrue
                              46.101.98.60
                              unknownNetherlands
                              14061DIGITALOCEAN-ASNUStrue
                              103.224.241.74
                              unknownIndia
                              133296WEBWERKS-AS-INWebWerksIndiaPvtLtdINtrue
                              103.71.99.57
                              unknownIndia
                              135682AWDHPL-AS-INAdvikaWebDevelopmentsHostingPvtLtdINtrue
                              210.57.209.142
                              unknownIndonesia
                              38142UNAIR-AS-IDUniversitasAirlanggaIDtrue
                              190.107.19.179
                              unknownColombia
                              27951MediaCommercePartnersSACOtrue
                              87.106.97.83
                              unknownGermany
                              8560ONEANDONE-ASBrauerstrasse48DEtrue
                              103.254.12.236
                              unknownViet Nam
                              56151DIGISTAR-VNDigiStarCompanyLimitedVNtrue
                              103.85.95.4
                              unknownIndonesia
                              136077IDNIC-UNSRAT-AS-IDUniversitasIslamNegeriMataramIDtrue
                              54.37.228.122
                              unknownFrance
                              16276OVHFRtrue
                              202.134.4.210
                              unknownIndonesia
                              7713TELKOMNET-AS-APPTTelekomunikasiIndonesiaIDtrue
                              88.217.172.165
                              unknownGermany
                              8767MNET-ASGermanyDEtrue
                              165.22.254.236
                              unknownUnited States
                              14061DIGITALOCEAN-ASNUStrue
                              118.98.72.86
                              unknownIndonesia
                              7713TELKOMNET-AS-APPTTelekomunikasiIndonesiaIDtrue
                              139.59.80.108
                              unknownSingapore
                              14061DIGITALOCEAN-ASNUStrue
                              104.244.79.94
                              unknownUnited States
                              53667PONYNETUStrue
                              178.62.112.199
                              unknownEuropean Union
                              14061DIGITALOCEAN-ASNUStrue
                              37.44.244.177
                              unknownGermany
                              47583AS-HOSTINGERLTtrue
                              62.171.178.147
                              unknownUnited Kingdom
                              51167CONTABODEtrue
                              64.227.55.231
                              unknownUnited States
                              14061DIGITALOCEAN-ASNUStrue
                              IP
                              127.0.0.1
                              Joe Sandbox Version:35.0.0 Citrine
                              Analysis ID:666431
                              Start date and time: 16/07/202219:09:112022-07-16 19:09:11 +02:00
                              Joe Sandbox Product:CloudBasic
                              Overall analysis duration:0h 10m 28s
                              Hypervisor based Inspection enabled:false
                              Report type:light
                              Sample file name:PYCkUgesWB.com_15e2f984de986ecb59e38a1c3a4a2300 (renamed file extension from com_15e2f984de986ecb59e38a1c3a4a2300 to dll)
                              Cookbook file name:default.jbs
                              Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                              Number of analysed new started processes analysed:29
                              Number of new started drivers analysed:0
                              Number of existing processes analysed:0
                              Number of existing drivers analysed:0
                              Number of injected processes analysed:0
                              Technologies:
                              • HCA enabled
                              • EGA enabled
                              • HDC enabled
                              • AMSI enabled
                              Analysis Mode:default
                              Analysis stop reason:Timeout
                              Detection:MAL
                              Classification:mal88.troj.evad.winDLL@24/4@0/44
                              EGA Information:
                              • Successful, ratio: 100%
                              HDC Information:
                              • Successful, ratio: 45.4% (good quality ratio 40.8%)
                              • Quality average: 78.1%
                              • Quality standard deviation: 33.1%
                              HCA Information:
                              • Successful, ratio: 99%
                              • Number of executed functions: 0
                              • Number of non-executed functions: 0
                              Cookbook Comments:
                              • Adjust boot time
                              • Enable AMSI
                              • Override analysis time to 240s for rundll32
                              • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, WMIADAP.exe, backgroundTaskHost.exe, conhost.exe, wuapihost.exe
                              • Excluded IPs from analysis (whitelisted): 23.211.6.115, 67.26.75.254, 8.248.145.254, 8.253.207.120, 8.248.135.254, 8.253.207.121, 8.248.133.254, 67.26.81.254, 67.26.73.254, 8.248.149.254, 67.26.139.254, 23.211.4.86, 80.67.82.235, 80.67.82.211, 20.223.24.244
                              • Excluded domains from analysis (whitelisted): www.bing.com, client.wns.windows.com, fg.download.windowsupdate.com.c.footprint.net, fs.microsoft.com, displaycatalog-rp-europe.md.mp.microsoft.com.akadns.net, neu-displaycatalogrp.useroor.bigcatalog.commerce.microsoft.com, store-images.s-microsoft.com-c.edgekey.net, ctldl.windowsupdate.com, e1723.g.akamaiedge.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, a1449.dscg2.akamai.net, arc.msn.com, wu-bg-shim.trafficmanager.net, ris.api.iris.microsoft.com, e12564.dspb.akamaiedge.net, consumer-displaycatalogrp-aks2aks-europe.md.mp.microsoft.com.akadns.net, login.live.com, store-images.s-microsoft.com, sls.update.microsoft.com, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, prod.fs.microsoft.com.akadns.net, displaycatalog-rp.md.mp.microsoft.com.akadns.net
                              • Not all processes where analyzed, report is missing behavior information
                              • Report size exceeded maximum capacity and may have missing behavior information.
                              • Report size getting too big, too many NtOpenKeyEx calls found.
                              • Report size getting too big, too many NtProtectVirtualMemory calls found.
                              • Report size getting too big, too many NtQueryValueKey calls found.
                              TimeTypeDescription
                              19:12:06API Interceptor10x Sleep call for process: svchost.exe modified
                              No context
                              No context
                              No context
                              No context
                              No context
                              Process:C:\Windows\System32\svchost.exe
                              File Type:Extensible storage engine DataBase, version 0x620, checksum 0x4dfe4fb8, page size 16384, DirtyShutdown, Windows version 10.0
                              Category:dropped
                              Size (bytes):786432
                              Entropy (8bit):0.2505933374184895
                              Encrypted:false
                              SSDEEP:384:k+W0StseCJ48EApW0StseCJ48E2rTSjlK/ebmLerYSRSY1J2:bSB2nSB2RSjlK/+mLesOj1J2
                              MD5:EB961E7113E3D08479E5A7A470B28163
                              SHA1:97161FC542A63DB96B7287C22D11D1E19C706A19
                              SHA-256:2E4145142F92749B4EC51BF620D2BE8883371813557B449FE39A9BFE1DD20024
                              SHA-512:F2CE12E33979D5093DFAA3ABBD0318D5BD2E7A88DE76CEEB5563375B8302A215DE86C34E923BDC77F2A33A25D6409C4F09EB6788F8AA9C1E9560DBA0EA34B3FF
                              Malicious:false
                              Preview:M.O.... ................e.f.3...w........................&..........w.......zo.h.(..............................3...w...........................................................................................................B...........@...................................................................................................... ........3...w......................................................................................................................................................................................................................................1H.v.....zo.................gC.......zo.........................................................................................................................................................................................................................................................................................................................................................................................
                              Process:C:\Windows\System32\regsvr32.exe
                              File Type:Microsoft Cabinet archive data, 61712 bytes, 1 file
                              Category:dropped
                              Size (bytes):61712
                              Entropy (8bit):7.995044632446497
                              Encrypted:true
                              SSDEEP:1536:gzjJiDImMsrjCtGLaexX/zL09mX/lZHIxs:gPJiDI/sr0Hexv/0S/zx
                              MD5:589C442FC7A0C70DCA927115A700D41E
                              SHA1:66A07DACE3AFBFD1AA07A47E6875BEAB62C4BB31
                              SHA-256:2E5CB72E9EB43BAAFB6C6BFCC573AAC92F49A8064C483F9D378A9E8E781A526A
                              SHA-512:1B5FA79E52BE495C42CF49618441FB7012E28C02E7A08A91DA9213DB3AB810F0E83485BC1DD5F625A47D0BA7CFCDD5EA50ACC9A8DCEBB39F048C40F01E94155B
                              Malicious:false
                              Preview:MSCF............,...................I........y.........Tf. .authroot.stl..W.`.4..CK..8U[...q.yL'sf!d.D..."2.2g.<dVI.!.....$).\...!2s..(...[.T7..{}...g....g.....w.km$.&|..qe.n.8+..&...O...`...+..C......`h!0.I.(C..1Q*L.p..".s..B.....H......fUP@..5...(X#.t.2lX.>.y|D.0Z0...M....I(.#.-... ...(.J....2..`.hO..{l+.bd7y.j..u.....3....<......3....s.T...._.'...%{v...s..............KgV.0..X=.A.9w9.Ea.x..........\.=.e.C2......9.......`.o... .......@pm.. a.....-M.....{...s.mW.....;.+...A......0.g..L9#.v.&O>./xSH.S.....GH.6.j...`2.(0g..... Lt........h4.iQ?....[.K.....uI......}.....d....M.....6q.Q~.0.\.'U^)`..u.....-........d..7...2.-.2+3.....A./.%Q...k...Q.,...H.B.%..O..x..5\...Hk.......B.';"Ym.'....X.l.E.6..a8.6..nq..x.r4..1t.....,..u.O..O.L...Uf...X.u.F .(.(.....".q...n{%U.-u....l6!....Z....~o0.}Q'.s.i....7...>4x...A.h.Mk].O.z.].6...53...b^;..>e..x.'1..\p.O.k..B1w..|..K.R.....2.e0..X.^...I...w..!.v5B]x..z.6.G^uF..].b.W...'..I.;..p..@L{.E..@W..3.&...
                              Process:C:\Windows\System32\regsvr32.exe
                              File Type:data
                              Category:modified
                              Size (bytes):326
                              Entropy (8bit):3.1358915940078615
                              Encrypted:false
                              SSDEEP:6:kK79ku+N+SkQlPlEGYRMY9z+4KlDA3RUeWlEZ21:zGuNkPlE99SNxAhUeE1
                              MD5:CB006CC6314BF3DEB2C82425738A567F
                              SHA1:91210AC0A73CDB5A354D2F1346B707377751F76E
                              SHA-256:5255C7343D802A3FE510DCC6B5E9DCA3DC3FB2BB8F891695F57354FA1812E6EA
                              SHA-512:EC31D35FB61206C20020B20AFAD8EAFFE8AFA30B8751F8585F9EF66C4276E6DF3A9D078C060E2B2C670C18944F8002193F63618B1AA1D07E58283FE1ED70EC82
                              Malicious:false
                              Preview:p...... ...............(....................................................... .........L.........$...............h.t.t.p.:././.c.t.l.d.l...w.i.n.d.o.w.s.u.p.d.a.t.e...c.o.m./.m.s.d.o.w.n.l.o.a.d./.u.p.d.a.t.e./.v.3./.s.t.a.t.i.c./.t.r.u.s.t.e.d.r./.e.n./.a.u.t.h.r.o.o.t.s.t.l...c.a.b...".0.9.f.4.c.9.6.9.8.b.d.8.1.:.0."...
                              Process:C:\Windows\System32\svchost.exe
                              File Type:ASCII text, with no line terminators
                              Category:dropped
                              Size (bytes):55
                              Entropy (8bit):4.306461250274409
                              Encrypted:false
                              SSDEEP:3:YDQRWu83XfAw2fHbY:YMRl83Xt2f7Y
                              MD5:DCA83F08D448911A14C22EBCACC5AD57
                              SHA1:91270525521B7FE0D986DB19747F47D34B6318AD
                              SHA-256:2B4B2D4A06044AD0BD2AE3287CFCBECD90B959FEB2F503AC258D7C0A235D6FE9
                              SHA-512:96F3A02DC4AE302A30A376FC7082002065C7A35ECB74573DE66254EFD701E8FD9E9D867A2C8ABEB4C482738291B715D4965A0D2412663FDF1EE6CBC0BA9FBACA
                              Malicious:false
                              Preview:{"fontSetUri":"fontset-2017-04.json","baseUri":"fonts"}
                              File type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                              Entropy (8bit):7.4523768271907125
                              TrID:
                              • Win64 Dynamic Link Library (generic) (102004/3) 86.43%
                              • Win64 Executable (generic) (12005/4) 10.17%
                              • Generic Win/DOS Executable (2004/3) 1.70%
                              • DOS Executable Generic (2002/1) 1.70%
                              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.01%
                              File name:PYCkUgesWB.dll
                              File size:284672
                              MD5:15e2f984de986ecb59e38a1c3a4a2300
                              SHA1:795383a71c9030a2c52624795a1e539bfedbf84c
                              SHA256:1e9a7692e74e98ac5d21a4d3bfb3696d69d8306e4e42d53bcb4604b3dff420bb
                              SHA512:ae2e7f175844ac5d106e36474f3c2f86d27948b2c967ab01a10e8b8dc836a2349bc1dfc26119cbc4f41a96526dca5a79f315d7d7971683fb7db4fba41edef172
                              SSDEEP:6144:H8aVTnVgcpYT4Xf+WXv8cMkjdF4r6UrjCxGNh3XlwfjR96:H8wTV7UwHXvJMmdCrvrjZA3
                              TLSH:A954D001A99DD0A5C57E5939A4B78F03D3A1BC10977A93EF9B3109349A333E56D3D3A0
                              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........N...N...N...i...F...i...l...i.......8R..C...N...9...i...M...i...O...i...O...i...O...RichN...........PE..d...c..b.........."
                              Icon Hash:66f2d2d2d2d2c4ca
                              Entrypoint:0x100018a0
                              Entrypoint Section:.text
                              Digitally signed:false
                              Imagebase:0x10000000
                              Subsystem:windows gui
                              Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, DLL
                              DLL Characteristics:
                              Time Stamp:0x62C6D463 [Thu Jul 7 12:41:07 2022 UTC]
                              TLS Callbacks:
                              CLR (.Net) Version:
                              OS Version Major:4
                              OS Version Minor:0
                              File Version Major:4
                              File Version Minor:0
                              Subsystem Version Major:4
                              Subsystem Version Minor:0
                              Import Hash:63eff8a065c6d44859c3b54eb482a5d6
                              Instruction
                              dec eax
                              sub esp, 28h
                              cmp edx, 01h
                              dec eax
                              mov dword ptr [esp+38h], ebx
                              dec eax
                              mov dword ptr [esp+40h], esi
                              dec eax
                              mov dword ptr [esp+48h], edi
                              mov ebx, edx
                              dec eax
                              mov esi, ecx
                              dec ecx
                              mov edi, eax
                              jne 00007FDA70D2C397h
                              call 00007FDA70D2ED70h
                              dec esp
                              mov eax, edi
                              mov edx, ebx
                              dec eax
                              mov ecx, esi
                              dec eax
                              mov edi, dword ptr [esp+48h]
                              dec eax
                              mov esi, dword ptr [esp+40h]
                              dec eax
                              mov ebx, dword ptr [esp+38h]
                              dec eax
                              add esp, 28h
                              jmp 00007FDA70D2C210h
                              int3
                              int3
                              int3
                              int3
                              int3
                              int3
                              int3
                              int3
                              int3
                              int3
                              int3
                              dec eax
                              mov dword ptr [esp+08h], ecx
                              dec eax
                              sub esp, 00000088h
                              dec eax
                              lea ecx, dword ptr [0001593Dh]
                              call dword ptr [0000F86Fh]
                              dec eax
                              mov eax, dword ptr [00015A28h]
                              dec eax
                              mov dword ptr [esp+58h], eax
                              inc ebp
                              xor eax, eax
                              dec eax
                              lea edx, dword ptr [esp+60h]
                              dec eax
                              mov ecx, dword ptr [esp+58h]
                              call 00007FDA70D32B90h
                              dec eax
                              mov dword ptr [esp+50h], eax
                              dec eax
                              cmp dword ptr [esp+50h], 00000000h
                              je 00007FDA70D2C3D3h
                              dec eax
                              mov dword ptr [esp+38h], 00000000h
                              dec eax
                              lea eax, dword ptr [esp+48h]
                              dec eax
                              mov dword ptr [esp+30h], eax
                              dec eax
                              lea eax, dword ptr [esp+40h]
                              dec eax
                              mov dword ptr [esp+28h], eax
                              dec eax
                              lea eax, dword ptr [000158E8h]
                              dec eax
                              mov dword ptr [esp+20h], eax
                              dec esp
                              mov ecx, dword ptr [esp+50h]
                              dec esp
                              mov eax, dword ptr [esp+58h]
                              Programming Language:
                              • [ASM] VS2005 build 50727
                              • [C++] VS2005 build 50727
                              • [ C ] VS2005 build 50727
                              • [EXP] VS2005 build 50727
                              • [RES] VS2005 build 50727
                              • [LNK] VS2005 build 50727
                              NameVirtual AddressVirtual Size Is in Section
                              IMAGE_DIRECTORY_ENTRY_EXPORT0x14a100x13a4.rdata
                              IMAGE_DIRECTORY_ENTRY_IMPORT0x13ec40x8c.rdata
                              IMAGE_DIRECTORY_ENTRY_RESOURCE0x1a0000x2e480.rsrc
                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x190000x99c.pdata
                              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                              IMAGE_DIRECTORY_ENTRY_BASERELOC0x490000x1e4.reloc
                              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_IAT0x110000x368.rdata
                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                              NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                              .text0x10000xfd4a0xfe00False0.4856206938976378data5.920035349065038IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                              .rdata0x110000x4db40x4e00False0.47571113782051283data5.5301844227687305IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                              .data0x160000x28780x1200False0.2055121527777778data2.203174750959508IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                              .pdata0x190000x99c0xa00False0.488671875data4.691904567122826IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                              .rsrc0x1a0000x2e4800x2e600False0.8459452914420486data7.832588443776017IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                              .reloc0x490000x5b00x600False0.23372395833333334data2.3778281936909145IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                              NameRVASizeTypeLanguageCountry
                              RT_ICON0x1a3400x128GLS_BINARY_LSB_FIRSTEnglishUnited States
                              RT_ICON0x1a4680x2e8dataEnglishUnited States
                              RT_MENU0x1a7500x4adataEnglishUnited States
                              RT_DIALOG0x1a79c0xacdataEnglishUnited States
                              RT_DIALOG0x1a8480xfedataEnglishUnited States
                              RT_DIALOG0x1a9480x12adataEnglishUnited States
                              RT_STRING0x1aa740x10cdataEnglishUnited States
                              RT_STRING0x1ab800x12adataEnglishUnited States
                              RT_STRING0x1acac0x38dataEnglishUnited States
                              RT_ACCELERATOR0x1ace40x10dataEnglishUnited States
                              RT_GROUP_ICON0x1acf40x22dataEnglishUnited States
                              RT_HTML0x1ad180x2d600dataEnglishUnited States
                              RT_MANIFEST0x483180x168ASCII text, with CRLF line terminatorsEnglishUnited States
                              DLLImport
                              KERNEL32.dllVirtualAlloc, FormatMessageW, LocalFree, GetStringTypeW, GetStringTypeA, LCMapStringW, GetLastError, GetLocaleInfoA, MultiByteToWideChar, HeapReAlloc, HeapSize, GetOEMCP, GetACP, GetCPInfo, InitializeCriticalSection, LoadLibraryA, EnterCriticalSection, LeaveCriticalSection, GetSystemTimeAsFileTime, LCMapStringA, GetFullPathNameW, GetCurrentProcessId, GetTickCount, QueryPerformanceCounter, RtlUnwindEx, GetEnvironmentStringsW, WideCharToMultiByte, FreeEnvironmentStringsW, GetEnvironmentStrings, FreeEnvironmentStringsA, DeleteCriticalSection, HeapAlloc, HeapFree, GetCurrentThreadId, FlsSetValue, GetCommandLineA, GetVersionExA, GetProcessHeap, TerminateProcess, GetCurrentProcess, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsDebuggerPresent, RtlVirtualUnwind, RtlLookupFunctionEntry, RtlCaptureContext, GetProcAddress, GetModuleHandleA, ExitProcess, WriteFile, GetStdHandle, GetModuleFileNameA, HeapSetInformation, HeapCreate, HeapDestroy, RaiseException, RtlPcToFileHeader, FlsGetValue, TlsFree, FlsFree, SetLastError, TlsSetValue, FlsAlloc, Sleep, SetHandleCount, GetFileType, GetStartupInfoA
                              USER32.dllMessageBoxW, LoadStringW, LoadAcceleratorsW, GetMessageW, IsDialogMessageW, TranslateAcceleratorW, PostMessageW, EndPaint, BeginPaint, DefWindowProcW, PostQuitMessage, GetDlgItem, GetWindowRect, SetWindowPos, CreateDialogParamW, TranslateMessage, SendMessageW, SetWindowTextW, GetWindowTextW, DestroyWindow, UpdateWindow, ShowWindow, CreateWindowExW, RegisterClassExW, LoadCursorW, LoadIconW, MessageBoxA, DispatchMessageW
                              GDI32.dllCreateSolidBrush
                              comdlg32.dllGetOpenFileNameW
                              ole32.dllCoInitializeEx, CoUninitialize, CoCreateInstance, CoInitialize
                              OLEAUT32.dllSysFreeString, SysAllocString
                              NameOrdinalAddress
                              AjkRVrFNnyQmqXQdrComyaiwV10x100085a0
                              AkMhEGvNFpnSswjeCw20x10008690
                              BMIWqtk30x10008520
                              BpsBUyIiAmXYU40x10008ab0
                              BxBybURSqJfOwVmXj50x100083e0
                              CCSLGUsdVtcCbfF60x10008d00
                              CWBdqFubMR70x10008500
                              CbEceKaoQvfuhhIK80x100089c0
                              CcBDyidVYuvtjWfG90x10008460
                              CeOVtVdkUnRPoUvswsvkEf100x10008710
                              CvxIGiXAzAG110x10008c30
                              DPsWXvFrrwOLZwoq120x10008b70
                              DllRegisterServer130x10009510
                              ENtihcf140x10008c80
                              EVYoaysfyVmedMKzqOkd150x10008dd0
                              FSgLIbzCJsGhKrdTRUhBnjq160x10008c70
                              FXswjNvwqEmJHSzKXfB170x10008450
                              FmRrLoGPniSXxeHYAaRXrsSIt180x100087d0
                              FzYYWlRKDQMfKaJAUq190x10008610
                              GEQqgSeWrJkaNSdjOw200x100083d0
                              GLvPFjzv210x10008cc0
                              GTfYoyhXUmiOrfM220x10008630
                              GVTerofsGHUASHLhWfIFX230x100088b0
                              GlLOHKioWJZCQPS240x10008c20
                              GpqOdmj250x10008970
                              GtaEQGQNcgERZqWo260x10008930
                              GzdHPyIXWoMGb270x10008680
                              HKgdkPfboZzjQODFfSu280x100084a0
                              HmXZBMEhrWvTg290x10008f00
                              HvFWvy300x100084e0
                              ICrKqnEJHHrxYaH310x10008bd0
                              IDENrF320x10008af0
                              ISuniIBoqjzfv330x10008800
                              IcEiBSQQHwaxZGs340x10008a00
                              JCFScdjDVMLKVa350x100085f0
                              JGwGKVHFHwfxsyCIp360x10008eb0
                              JnkFkZthy370x10008e30
                              LSRvMYckceDUkCMxwUAq380x10008b10
                              LhZoEaJRggyJr390x10008490
                              MknuTlXosJJdvczIkg400x10008410
                              MrhDZxAutnSSobTVt410x10008c10
                              NRfTvw420x10008a50
                              NZDMYgNWoHhCVPBFWyuTBSesQ430x100083b0
                              NmBmwe440x10008440
                              NzYPpUvQ450x10008df0
                              OThzaIZTEfYKTCCRQlcnW460x100088a0
                              OWMilsbkgGVyJL470x10008540
                              OguxguFiYSHz480x100089b0
                              PHzWjRI490x100083f0
                              PNJeVrAcZDAW500x10008ad0
                              PSDYwIgmLiVzYESIaUYrbKg510x10008b00
                              PiJSThSmMmzNNC520x10008b40
                              PneIJqdSVVerltCm530x10008cd0
                              PpsLezsCiHiCVkHmZP540x10008e60
                              PuoUVwFKYxjCqT550x10008b20
                              PwNlKX560x10008a70
                              QRkaVvgiLqTCjGKy570x10008c90
                              RJAcdfSthTv580x10008550
                              RYkwsDq590x10008890
                              RZtKxjO600x10008b50
                              RcnQoaySRBXJxsiZQIHxe610x10008c60
                              RdnXeofUSzEDgzxXeW620x100086b0
                              RfsPQSmuvBYXfIScfOT630x100086c0
                              RkfakVk640x10008720
                              RmhqixPgftgQ650x10008ef0
                              SInCoGYrouPZGmYYJGKIR660x10008420
                              SRXSueHCT670x10008430
                              SVlQsYSAXEyhEvVkdWdX680x10008860
                              SnLgFTA690x10008de0
                              SxfQZPkEOIcG700x10008dc0
                              TJZCJgp710x10008590
                              TSNqZL720x10008820
                              TfpEQJjWUDp730x10008ba0
                              TvUVDsEcInyvKdGRA740x10008d70
                              TvtXyQtNShHDYCMvH750x10008a10
                              UGXSNpc760x10008e10
                              ULOMXGiV770x10008940
                              UVzHIeChKCEwTMG780x100084b0
                              UagSsmENTltTUKpktiEuRJfE790x10008b90
                              UbjFSQJG800x10008780
                              UjDfVglhgynLAuMpwrtpXkH810x10008a80
                              UrxprELRNWbXXBuOJlJ820x10008bf0
                              VXDuMBzruSCyfbAMzIrvV830x10008a90
                              VcrtEzpxSRmZr840x10008760
                              VkRjra850x10008750
                              WMxfpgNLwoiQTZjkM860x10008920
                              WjtCBeYwDkRZvKLfJD870x10008a20
                              XoMiJXhdBRBldnkLkgMM880x10008a40
                              XsBeDFcmOsaqRihqMytJ890x100088c0
                              YGPQhuvjFbQXSoJfVilOnVw900x100084d0
                              YvzKAJK910x10008830
                              ZAppiYnp920x10008c50
                              ZXZEfUeKC930x10008910
                              ZoyjBLvuBnIxXaWxFC940x10008660
                              aZwlVZLRtCIfDmaYbAXR950x10008e40
                              bdnAzUNoMZJXxzHG960x100086f0
                              btmsIKQVm970x100084f0
                              cFminOM980x100088e0
                              cKjOEfqQYYQ990x10008730
                              czIvuAZ1000x100085d0
                              dMEJcsHSUiODu1010x10008810
                              dPYgmMRi1020x10008880
                              dStUmppUwHfwVxtCgCewXt1030x10008ca0
                              deMXieymThIxfyWzHCMb1040x10008e80
                              dgCMMkwNpUNZ1050x10008cb0
                              eDtAbxMTINFwGjIRymBKxBFTe1060x10008da0
                              ePfrWQkHuKqOV1070x10008480
                              eQnPJdIEwUrOjHyYKajVY1080x10008770
                              eWqtOcNgKbDEwKynrCTAaqRd1090x10008ac0
                              eiRJXgFAjkyObQxtC1100x10008740
                              fLsjxmtTmthGKPw1110x10008700
                              fqsAeZLb1120x10008e00
                              frkkGhhTKCPBzCLoveBHn1130x10008640
                              fxmvSQNzSiXj1140x100087a0
                              gATjvjWkzNfdmAJbeFMKFtUmoI1150x10008ce0
                              gCFmNdxvaAq1160x10008e50
                              gfeRIwKkCZUnQQ1170x10008f10
                              gjZENXkR1180x10008400
                              gzzlrzxMlshrI1190x10008d30
                              hClTxV1200x100087b0
                              hDdSABujeGhBdM1210x10008c00
                              hJbRrovBnfzadHBLOAaX1220x100085b0
                              hLNWWET1230x10008d10
                              iIJmtODVuCFQPMFae1240x10008600
                              iItzzFKWzIZojfOFqJG1250x10008b80
                              ibqesePIQXoUwnfgkLvfcuMFHK1260x100086a0
                              ieuLWaTjVeuBYegSaGXuly1270x100088f0
                              igFffrhNCQcHQStroQFS1280x10008f20
                              irtTnxRuuXAWDuDRGCivHz1290x100086d0
                              jVNpFjHcSQ1300x100084c0
                              jotleypmamgIHEUfZPLSmMtq1310x10008db0
                              jrkFXlWfdhOn1320x100085c0
                              kOcvjMhVkKI1330x10008580
                              kPsHiOxOlxeVBpHYooACxIXHB1340x10008560
                              kUHyuFSDHjRQgcFnZIHgvahta1350x100089e0
                              kXMermOELWqc1360x10008790
                              kkWRnVCjitIbHTy1370x100087c0
                              kpoFTDgQJFpD1380x10008be0
                              kvCgXPvHuWWWdAHGy1390x10008aa0
                              lFcjChjFWgKWuOuaAxn1400x10008b30
                              lKFTvqNg1410x100089a0
                              lcbnVGCdYXcKZTYevsVX1420x10008900
                              lefIOOsVMhliLLj1430x10008390
                              mKrNVAlauoRSIht1440x10008c40
                              nRVfeUAoalGiEviupjuyTviKt1450x10008ea0
                              nWkMZMN1460x100087e0
                              naKLRCkO1470x10008510
                              njUWLbQgRBGSd1480x10008d20
                              nlBfCJTJQhnnPxbkQkUAwWpmaA1490x10008b60
                              nmBYnmjGCq1500x10008cf0
                              oIAdOUfQaetEfqMDSL1510x10008ec0
                              osSAAvHx1520x10008620
                              ovwgmHjsMpOQyjNpuqeLd1530x100085e0
                              ozpFyAlRWIHNYPuJbOLpoZosmO1540x10008650
                              pAbWNQjHuawouRBUprBVrXw1550x10008670
                              pCYRinZyYkFOxayPFyJDEDxKzO1560x10008870
                              pQvYHQSqPMdqFOFub1570x10008ae0
                              pbzbgZeZipMwitVYJJbYTdyYQ1580x100089f0
                              pnbxRJnSdfpDADRIEWZXepR1590x100087f0
                              qAirVWefWGdomxGs1600x100086e0
                              qbgUwwXPUNM1610x10008850
                              rJVMJaiBojiOWxURyzmLWnxH1620x10008bb0
                              rOlGGoosrOYjYnwqSX1630x10008d60
                              rSHUNkevMkknNwSlqR1640x10008950
                              rmrMOmqIIM1650x10008e70
                              sBcaPzIWckINwkFTBxmdkiKID1660x10008960
                              sJXDLm1670x10008d50
                              sNQjkxnpfL1680x10008530
                              sPKnvGEKVGRHsXgbRRJFS1690x10008ee0
                              snoSMpnSAlGCDUoadZDE1700x10008a60
                              tGDiqYCDbgMaBXHmxqrJv1710x10008e90
                              tGdwKquShaUWskzgERPqeG1720x100083c0
                              tXncljehbaR1730x10008bc0
                              taNCAYWnFedga1740x10008d80
                              uFBMgXMRHfYmHKtd1750x10008e20
                              uQadijPTgYiRGTkxDpqTOeI1760x10008380
                              vlEZdJoJilVuJxGaLFCzX1770x10008990
                              vlPATCQWfWfv1780x10008570
                              vnMwerzIvV1790x10008d90
                              wDtWqzCTVUWdqo1800x10008ed0
                              weKcSTEtgvLwNKGEWr1810x10008980
                              wyslQDXAh1820x10008840
                              xRklmHvgNdkXc1830x10008470
                              xbTTVacjLMTUBskAADEzpolBV1840x100083a0
                              xbcfQIhiMJswKveISUtGpEWTr1850x10008d40
                              ytgHNsgBKfkMoZjHI1860x100089d0
                              zLypEkbxfdampkTf1870x10008a30
                              ziTLFIzOnbzURBefGdA1880x100088d0
                              Language of compilation systemCountry where language is spokenMap
                              EnglishUnited States
                              TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                              192.168.2.7174.138.33.494978670802404316 07/16/22-19:12:04.677504TCP2404316ET CNC Feodo Tracker Reported CnC Server TCP group 9497867080192.168.2.7174.138.33.49
                              TimestampSource PortDest PortSource IPDest IP
                              Jul 16, 2022 19:12:04.677504063 CEST497867080192.168.2.7174.138.33.49
                              Jul 16, 2022 19:12:04.782668114 CEST708049786174.138.33.49192.168.2.7
                              Jul 16, 2022 19:12:04.782854080 CEST497867080192.168.2.7174.138.33.49
                              Jul 16, 2022 19:12:04.846545935 CEST497867080192.168.2.7174.138.33.49
                              Jul 16, 2022 19:12:04.949121952 CEST708049786174.138.33.49192.168.2.7
                              Jul 16, 2022 19:12:04.969825983 CEST708049786174.138.33.49192.168.2.7
                              Jul 16, 2022 19:12:04.969861984 CEST708049786174.138.33.49192.168.2.7
                              Jul 16, 2022 19:12:04.974636078 CEST497867080192.168.2.7174.138.33.49
                              Jul 16, 2022 19:12:09.163804054 CEST497867080192.168.2.7174.138.33.49
                              Jul 16, 2022 19:12:09.266911983 CEST708049786174.138.33.49192.168.2.7
                              Jul 16, 2022 19:12:09.267055035 CEST497867080192.168.2.7174.138.33.49
                              Jul 16, 2022 19:12:09.271817923 CEST497867080192.168.2.7174.138.33.49
                              Jul 16, 2022 19:12:09.414453983 CEST708049786174.138.33.49192.168.2.7
                              Jul 16, 2022 19:12:09.797220945 CEST708049786174.138.33.49192.168.2.7
                              Jul 16, 2022 19:12:09.797314882 CEST497867080192.168.2.7174.138.33.49
                              Jul 16, 2022 19:12:12.801305056 CEST708049786174.138.33.49192.168.2.7
                              Jul 16, 2022 19:12:12.801331997 CEST708049786174.138.33.49192.168.2.7
                              Jul 16, 2022 19:12:12.801448107 CEST497867080192.168.2.7174.138.33.49
                              Jul 16, 2022 19:13:54.821356058 CEST497867080192.168.2.7174.138.33.49
                              Jul 16, 2022 19:13:54.821396112 CEST497867080192.168.2.7174.138.33.49

                              Click to jump to process

                              Target ID:0
                              Start time:19:10:27
                              Start date:16/07/2022
                              Path:C:\Windows\System32\loaddll64.exe
                              Wow64 process (32bit):false
                              Commandline:loaddll64.exe "C:\Users\user\Desktop\PYCkUgesWB.dll"
                              Imagebase:0x7ff770350000
                              File size:140288 bytes
                              MD5 hash:4E8A40CAD6CCC047914E3A7830A2D8AA
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Yara matches:
                              • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000000.00000002.492629360.000001E200010000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000000.00000002.492455276.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
                              Reputation:high

                              Target ID:1
                              Start time:19:10:28
                              Start date:16/07/2022
                              Path:C:\Windows\System32\cmd.exe
                              Wow64 process (32bit):false
                              Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\PYCkUgesWB.dll",#1
                              Imagebase:0x7ff6a6590000
                              File size:273920 bytes
                              MD5 hash:4E2ACF4F8A396486AB4268C94A6A245F
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high

                              Target ID:2
                              Start time:19:10:28
                              Start date:16/07/2022
                              Path:C:\Windows\System32\regsvr32.exe
                              Wow64 process (32bit):false
                              Commandline:regsvr32.exe /s C:\Users\user\Desktop\PYCkUgesWB.dll
                              Imagebase:0x7ff6047c0000
                              File size:24064 bytes
                              MD5 hash:D78B75FC68247E8A63ACBA846182740E
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Yara matches:
                              • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000002.00000002.479464350.0000000001580000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000002.00000002.479882020.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
                              Reputation:high

                              Target ID:3
                              Start time:19:10:28
                              Start date:16/07/2022
                              Path:C:\Windows\System32\rundll32.exe
                              Wow64 process (32bit):false
                              Commandline:rundll32.exe "C:\Users\user\Desktop\PYCkUgesWB.dll",#1
                              Imagebase:0x7ff7efde0000
                              File size:69632 bytes
                              MD5 hash:73C519F050C20580F8A62C849D49215A
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Yara matches:
                              • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000003.00000002.466579273.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000003.00000002.466935474.0000020500010000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                              Reputation:high

                              Target ID:4
                              Start time:19:10:29
                              Start date:16/07/2022
                              Path:C:\Windows\System32\rundll32.exe
                              Wow64 process (32bit):false
                              Commandline:rundll32.exe C:\Users\user\Desktop\PYCkUgesWB.dll,AjkRVrFNnyQmqXQdrComyaiwV
                              Imagebase:0x7ff7efde0000
                              File size:69632 bytes
                              MD5 hash:73C519F050C20580F8A62C849D49215A
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Yara matches:
                              • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000004.00000002.466000340.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000004.00000002.466138189.000001B23E930000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                              Reputation:high

                              Target ID:5
                              Start time:19:10:33
                              Start date:16/07/2022
                              Path:C:\Windows\System32\rundll32.exe
                              Wow64 process (32bit):false
                              Commandline:rundll32.exe C:\Users\user\Desktop\PYCkUgesWB.dll,AkMhEGvNFpnSswjeCw
                              Imagebase:0x7ff7efde0000
                              File size:69632 bytes
                              MD5 hash:73C519F050C20580F8A62C849D49215A
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Yara matches:
                              • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000005.00000002.477702534.000001EC47BF0000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000005.00000002.477040143.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
                              Reputation:high

                              Target ID:6
                              Start time:19:10:38
                              Start date:16/07/2022
                              Path:C:\Windows\System32\rundll32.exe
                              Wow64 process (32bit):false
                              Commandline:rundll32.exe C:\Users\user\Desktop\PYCkUgesWB.dll,BMIWqtk
                              Imagebase:0x7ff7efde0000
                              File size:69632 bytes
                              MD5 hash:73C519F050C20580F8A62C849D49215A
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Yara matches:
                              • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000006.00000002.485258322.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000006.00000002.487464916.0000021DBEA20000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                              Reputation:high

                              Target ID:10
                              Start time:19:11:09
                              Start date:16/07/2022
                              Path:C:\Windows\System32\svchost.exe
                              Wow64 process (32bit):false
                              Commandline:C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
                              Imagebase:0x7ff7e8070000
                              File size:51288 bytes
                              MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high

                              Target ID:11
                              Start time:19:11:21
                              Start date:16/07/2022
                              Path:C:\Windows\System32\regsvr32.exe
                              Wow64 process (32bit):false
                              Commandline:C:\Windows\system32\regsvr32.exe "C:\Windows\system32\XSYhmb\vuKI.dll"
                              Imagebase:0x7ff6047c0000
                              File size:24064 bytes
                              MD5 hash:D78B75FC68247E8A63ACBA846182740E
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Yara matches:
                              • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000B.00000002.887240071.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000B.00000002.886485279.0000000002310000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security

                              Target ID:12
                              Start time:19:11:28
                              Start date:16/07/2022
                              Path:C:\Windows\System32\regsvr32.exe
                              Wow64 process (32bit):false
                              Commandline:C:\Windows\system32\regsvr32.exe "C:\Windows\system32\AfzDfnhsGeYDyd\OsmuofIfhwEGDVL.dll"
                              Imagebase:0x7ff6047c0000
                              File size:24064 bytes
                              MD5 hash:D78B75FC68247E8A63ACBA846182740E
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language

                              Target ID:17
                              Start time:19:12:01
                              Start date:16/07/2022
                              Path:C:\Windows\System32\svchost.exe
                              Wow64 process (32bit):false
                              Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p
                              Imagebase:0x7ff7e8070000
                              File size:51288 bytes
                              MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language

                              Target ID:18
                              Start time:19:12:05
                              Start date:16/07/2022
                              Path:C:\Windows\System32\svchost.exe
                              Wow64 process (32bit):false
                              Commandline:c:\windows\system32\svchost.exe -k netsvcs -p -s BITS
                              Imagebase:0x7ff7e8070000
                              File size:51288 bytes
                              MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language

                              Target ID:20
                              Start time:19:12:31
                              Start date:16/07/2022
                              Path:C:\Windows\System32\svchost.exe
                              Wow64 process (32bit):false
                              Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p
                              Imagebase:0x7ff7e8070000
                              File size:51288 bytes
                              MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language

                              Target ID:21
                              Start time:19:12:41
                              Start date:16/07/2022
                              Path:C:\Windows\System32\svchost.exe
                              Wow64 process (32bit):true
                              Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p
                              Imagebase:0x210000
                              File size:51288 bytes
                              MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language

                              Target ID:24
                              Start time:19:13:08
                              Start date:16/07/2022
                              Path:C:\Windows\System32\svchost.exe
                              Wow64 process (32bit):false
                              Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p
                              Imagebase:0x7ff7e8070000
                              File size:51288 bytes
                              MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language

                              Target ID:27
                              Start time:19:13:25
                              Start date:16/07/2022
                              Path:C:\Windows\System32\svchost.exe
                              Wow64 process (32bit):false
                              Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p
                              Imagebase:0x7ff7e8070000
                              File size:51288 bytes
                              MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language

                              No disassembly