Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
MIpuuSiSZ4.dll

Overview

General Information

Sample Name:MIpuuSiSZ4.dll
Analysis ID:671702
MD5:1dd34935a785a419fb552b5086ea682e
SHA1:c6c966e4ba623f9972273de07b842ffbb9a9efce
SHA256:8b5a10f9a8f2b25057442111a01faf021ef7e048eab875a4078a44758d952c6f
Tags:exeOpenCTIBRSandboxed
Infos:

Detection

Emotet
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Yara detected Emotet
System process connects to network (likely due to code injection or exploit)
Antivirus detection for URL or domain
Snort IDS alert for network traffic
Changes security center settings (notifications, updates, antivirus, firewall)
C2 URLs / IPs found in malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Queries the volume information (name, serial number etc) of a device
One or more processes crash
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query locales information (e.g. system language)
Deletes files inside the Windows folder
May sleep (evasive loops) to hinder dynamic analysis
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Uses code obfuscation techniques (call, push, ret)
Creates files inside the system directory
PE file contains sections with non-standard names
Internet Provider seen in connection with other malware
Detected potential crypto function
Contains functionality to query CPU information (cpuid)
Found potential string decryption / allocating functions
Sample execution stops while process was sleeping (likely an evasion)
Contains functionality to enumerate running services
Contains functionality which may be used to detect a debugger (GetProcessHeap)
IP address seen in connection with other malware
AV process strings found (often used to terminate AV products)
Tries to load missing DLLs
Drops PE files to the windows directory (C:\Windows)
Detected TCP or UDP traffic on non-standard ports
Checks if the current process is being debugged
Registers a DLL
Queries disk information (often used to detect virtual machines)
Found large amount of non-executed APIs
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • loaddll64.exe (PID: 6740 cmdline: loaddll64.exe "C:\Users\user\Desktop\MIpuuSiSZ4.dll" MD5: 4E8A40CAD6CCC047914E3A7830A2D8AA)
    • cmd.exe (PID: 6756 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\MIpuuSiSZ4.dll",#1 MD5: 4E2ACF4F8A396486AB4268C94A6A245F)
      • rundll32.exe (PID: 6776 cmdline: rundll32.exe "C:\Users\user\Desktop\MIpuuSiSZ4.dll",#1 MD5: 73C519F050C20580F8A62C849D49215A)
        • WerFault.exe (PID: 1992 cmdline: C:\Windows\system32\WerFault.exe -u -p 6776 -s 324 MD5: 2AFFE478D86272288BBEF5A00BBEF6A0)
    • regsvr32.exe (PID: 6764 cmdline: regsvr32.exe /s C:\Users\user\Desktop\MIpuuSiSZ4.dll MD5: D78B75FC68247E8A63ACBA846182740E)
      • regsvr32.exe (PID: 5660 cmdline: C:\Windows\system32\regsvr32.exe "C:\Windows\system32\GAjjZRZVj\QFdWkQKkPokX.dll" MD5: D78B75FC68247E8A63ACBA846182740E)
    • rundll32.exe (PID: 6792 cmdline: rundll32.exe C:\Users\user\Desktop\MIpuuSiSZ4.dll,AddStroke MD5: 73C519F050C20580F8A62C849D49215A)
      • WerFault.exe (PID: 3660 cmdline: C:\Windows\system32\WerFault.exe -u -p 6792 -s 328 MD5: 2AFFE478D86272288BBEF5A00BBEF6A0)
    • rundll32.exe (PID: 6836 cmdline: rundll32.exe C:\Users\user\Desktop\MIpuuSiSZ4.dll,AddWordsToWordList MD5: 73C519F050C20580F8A62C849D49215A)
    • rundll32.exe (PID: 6852 cmdline: rundll32.exe C:\Users\user\Desktop\MIpuuSiSZ4.dll,AdviseInkChange MD5: 73C519F050C20580F8A62C849D49215A)
    • regsvr32.exe (PID: 5852 cmdline: C:\Windows\system32\regsvr32.exe "C:\Windows\system32\ZcjkHmdxs\qpwRIIkrlFzB.dll" MD5: D78B75FC68247E8A63ACBA846182740E)
  • svchost.exe (PID: 6880 cmdline: C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 6984 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 908 cmdline: c:\windows\system32\svchost.exe -k localservice -p -s CDPSvc MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 6380 cmdline: c:\windows\system32\svchost.exe -k networkservice -p -s DoSvc MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 1524 cmdline: C:\Windows\System32\svchost.exe -k NetworkService -p MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • SgrmBroker.exe (PID: 5112 cmdline: C:\Windows\system32\SgrmBroker.exe MD5: D3170A3F3A9626597EEE1888686E3EA6)
  • svchost.exe (PID: 1428 cmdline: c:\windows\system32\svchost.exe -k localservicenetworkrestricted -p -s wscsvc MD5: 32569E403279B3FD2EDB7EBD036273FA)
    • MpCmdRun.exe (PID: 6256 cmdline: "C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable MD5: A267555174BFA53844371226F482B86B)
      • conhost.exe (PID: 6352 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • svchost.exe (PID: 7100 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 5604 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 3308 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 3052 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • cleanup
{"C2 list": ["101.69.85.108:20", "200.18.0.0:1", "208.9.0.0:2512", "82.10.0.0:2642", "144.1.49.1:2", "20.7.0.0:1", "176.6.0.0:1", "232.6.0.0:1", "136.6.0.0:1", "24.7.0.0:1", "248.6.0.0:1", "68.7.0.0:1", "80.7.0.0:1", "172.6.0.0:1", "96.7.0.0:1", "84.7.0.0:1", "4.7.0.0:1", "100.7.0.0:1", "112.7.0.0:1", "116.7.0.0:1", "180.6.0.0:1", "8.7.0.0:1", "236.6.0.0:1", "64.7.0.0:1", "204.6.0.0:1"]}
SourceRuleDescriptionAuthorStrings
00000000.00000002.364452628.0000015738060000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
    00000002.00000002.345850399.0000000000710000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
      00000005.00000002.351700174.0000020000071000.00000020.00001000.00020000.00000000.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
        0000000C.00000002.662977936.0000000002D11000.00000020.00001000.00020000.00000000.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
          00000003.00000000.348541554.0000022FC4510000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
            Click to see the 18 entries
            SourceRuleDescriptionAuthorStrings
            2.2.regsvr32.exe.710000.0.raw.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
              3.0.rundll32.exe.22fc4510000.1.raw.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
                12.2.regsvr32.exe.2cb0000.0.raw.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
                  3.0.rundll32.exe.22fc4510000.3.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
                    4.0.rundll32.exe.14980010000.3.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
                      Click to see the 17 entries
                      No Sigma rule has matched
                      Timestamp:192.168.2.7174.138.33.494979470802404316 07/22/22-13:58:44.263207
                      SID:2404316
                      Source Port:49794
                      Destination Port:7080
                      Protocol:TCP
                      Classtype:A Network Trojan was detected

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection

                      barindex
                      Source: MIpuuSiSZ4.dllVirustotal: Detection: 72%Perma Link
                      Source: MIpuuSiSZ4.dllMetadefender: Detection: 54%Perma Link
                      Source: MIpuuSiSZ4.dllReversingLabs: Detection: 88%
                      Source: https://174.138.33.49:7080/xAvira URL Cloud: Label: malware
                      Source: https://174.138.33.49/TAvira URL Cloud: Label: malware
                      Source: https://174.138.33.49:7080/temURL Reputation: Label: malware
                      Source: https://174.138.33.49:7080/944Avira URL Cloud: Label: malware
                      Source: 0000000C.00000002.662226882.000000000132F000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: Emotet {"C2 list": ["101.69.85.108:20", "200.18.0.0:1", "208.9.0.0:2512", "82.10.0.0:2642", "144.1.49.1:2", "20.7.0.0:1", "176.6.0.0:1", "232.6.0.0:1", "136.6.0.0:1", "24.7.0.0:1", "248.6.0.0:1", "68.7.0.0:1", "80.7.0.0:1", "172.6.0.0:1", "96.7.0.0:1", "84.7.0.0:1", "4.7.0.0:1", "100.7.0.0:1", "112.7.0.0:1", "116.7.0.0:1", "180.6.0.0:1", "8.7.0.0:1", "236.6.0.0:1", "64.7.0.0:1", "204.6.0.0:1"]}
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001800427CC _invalid_parameter_noinfo,_invalid_parameter_noinfo,FindFirstFileExW,FindNextFileW,FindClose,FindClose,0_2_00000001800427CC
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001800427CC _invalid_parameter_noinfo,_invalid_parameter_noinfo,FindFirstFileExW,FindNextFileW,FindClose,FindClose,0_2_00000001800427CC
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180042F88 FindFirstFileExW,0_2_0000000180042F88
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180043464 FindFirstFileExW,FindNextFileW,FindClose,FindClose,0_2_0000000180043464
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800427CC _invalid_parameter_noinfo,_invalid_parameter_noinfo,FindFirstFileExW,FindNextFileW,FindClose,FindClose,2_2_00000001800427CC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800427CC _invalid_parameter_noinfo,_invalid_parameter_noinfo,FindFirstFileExW,FindNextFileW,FindClose,FindClose,2_2_00000001800427CC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180042F88 FindFirstFileExW,2_2_0000000180042F88
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180043464 FindFirstFileExW,FindNextFileW,FindClose,FindClose,2_2_0000000180043464
                      Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_02D2C9F0 FindFirstFileW,FindNextFileW,12_2_02D2C9F0

                      Networking

                      barindex
                      Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 174.138.33.49 7080Jump to behavior
                      Source: TrafficSnort IDS: 2404316 ET CNC Feodo Tracker Reported CnC Server TCP group 9 192.168.2.7:49794 -> 174.138.33.49:7080
                      Source: Malware configuration extractorIPs: 101.69.85.108:20
                      Source: Malware configuration extractorIPs: 200.18.0.0:1
                      Source: Malware configuration extractorIPs: 208.9.0.0:2512
                      Source: Malware configuration extractorIPs: 82.10.0.0:2642
                      Source: Malware configuration extractorIPs: 144.1.49.1:2
                      Source: Malware configuration extractorIPs: 20.7.0.0:1
                      Source: Malware configuration extractorIPs: 176.6.0.0:1
                      Source: Malware configuration extractorIPs: 232.6.0.0:1
                      Source: Malware configuration extractorIPs: 136.6.0.0:1
                      Source: Malware configuration extractorIPs: 24.7.0.0:1
                      Source: Malware configuration extractorIPs: 248.6.0.0:1
                      Source: Malware configuration extractorIPs: 68.7.0.0:1
                      Source: Malware configuration extractorIPs: 80.7.0.0:1
                      Source: Malware configuration extractorIPs: 172.6.0.0:1
                      Source: Malware configuration extractorIPs: 96.7.0.0:1
                      Source: Malware configuration extractorIPs: 84.7.0.0:1
                      Source: Malware configuration extractorIPs: 4.7.0.0:1
                      Source: Malware configuration extractorIPs: 100.7.0.0:1
                      Source: Malware configuration extractorIPs: 112.7.0.0:1
                      Source: Malware configuration extractorIPs: 116.7.0.0:1
                      Source: Malware configuration extractorIPs: 180.6.0.0:1
                      Source: Malware configuration extractorIPs: 8.7.0.0:1
                      Source: Malware configuration extractorIPs: 236.6.0.0:1
                      Source: Malware configuration extractorIPs: 64.7.0.0:1
                      Source: Malware configuration extractorIPs: 204.6.0.0:1
                      Source: Joe Sandbox ViewASN Name: DIGITALOCEAN-ASNUS DIGITALOCEAN-ASNUS
                      Source: Joe Sandbox ViewASN Name: MICROSOFT-CORP-MSN-AS-BLOCKUS MICROSOFT-CORP-MSN-AS-BLOCKUS
                      Source: Joe Sandbox ViewIP Address: 174.138.33.49 174.138.33.49
                      Source: global trafficTCP traffic: 192.168.2.3:49761 -> 174.138.33.49:7080
                      Source: unknownTCP traffic detected without corresponding DNS query: 174.138.33.49
                      Source: unknownTCP traffic detected without corresponding DNS query: 174.138.33.49
                      Source: unknownTCP traffic detected without corresponding DNS query: 174.138.33.49
                      Source: unknownTCP traffic detected without corresponding DNS query: 174.138.33.49
                      Source: unknownTCP traffic detected without corresponding DNS query: 174.138.33.49
                      Source: unknownTCP traffic detected without corresponding DNS query: 174.138.33.49
                      Source: unknownTCP traffic detected without corresponding DNS query: 174.138.33.49
                      Source: unknownTCP traffic detected without corresponding DNS query: 174.138.33.49
                      Source: unknownTCP traffic detected without corresponding DNS query: 174.138.33.49
                      Source: unknownTCP traffic detected without corresponding DNS query: 174.138.33.49
                      Source: unknownTCP traffic detected without corresponding DNS query: 174.138.33.49
                      Source: svchost.exe, 00000020.00000003.605789439.00000298A2773000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Try it free for 30 days, no strings attached\r\n\r\nLike us on Facebook: http://www.facebook.com/spotify \r\nFollow us on Twitter: http://twitter.com/spotify","ProductTitle":"Spotify - Music and Podcasts","SearchTitles":[{"SearchTitleString":"Spotify","SearchTitleType":"SearchHint"},{"SearchTitleString":"Music","SearchTitleType":"SearchHint"},{"SearchTitleString":"music apps","SearchTitleType":"SearchHint"},{"SearchTitleString":"free music","SearchTitleType":"SearchHint"},{"SearchTitleString":"podcasts","SearchTitleType":"SearchHint"},{"SearchTitleString":"streaming","SearchTitleType":"SearchHint"},{"SearchTitleString":"soundcloud","SearchTitleType":"SearchHint"}],"Language":"en-us","Markets":["US","DZ","AR","AU","AT","BH","BD","BE","BR","BG","CA","CL","CN","CO","CR","HR","CY","CZ","DK","EG","EE","FI","FR","DE","GR","GT","HK","HU","IS","IN","ID","IQ","IE","IL","IT","JP","JO","KZ","KE","KW","LV","LB","LI","LT","LU","MY","MT","MR","MX","MA","NL","NZ","NG","NO","OM","PK","PE","PH","PL","PT","QA","RO","RU","SA","RS","SG","SK","SI","ZA","KR","ES","SE","CH","TW","TH","TT","TN","TR","UA","AE","GB","VN","YE","LY","LK","UY","VE","AF","AX","AL","AS","AO","AI","AQ","AG","AM","AW","BO","BQ","BA","BW","BV","IO","BN","BF","BI","KH","CM","CV","KY","CF","TD","TL","DJ","DM","DO","EC","SV","GQ","ER","ET","FK","FO","FJ","GF","PF","TF","GA","GM","GE","GH","GI","GL","GD","GP","GU","GG","GN","GW","GY","HT","HM","HN","AZ","BS","BB","BY","BZ","BJ","BM","BT","KM","CG","CD","CK","CX","CC","CI","CW","JM","SJ","JE","KI","KG","LA","LS","LR","MO","MK","MG","MW","IM","MH","MQ","MU","YT","FM","MD","MN","MS","MZ","MM","NA","NR","NP","MV","ML","NC","NI","NE","NU","NF","PW","PS","PA","PG","PY","RE","RW","BL","MF","WS","ST","SN","MP","PN","SX","SB","SO","SC","SL","GS","SH","KN","LC","PM","VC","TJ","TZ","TG","TK","TO","TM","TC","TV","UM","UG", equals www.facebook.com (Facebook)
                      Source: svchost.exe, 00000020.00000003.605789439.00000298A2773000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Try it free for 30 days, no strings attached\r\n\r\nLike us on Facebook: http://www.facebook.com/spotify \r\nFollow us on Twitter: http://twitter.com/spotify","ProductTitle":"Spotify - Music and Podcasts","SearchTitles":[{"SearchTitleString":"Spotify","SearchTitleType":"SearchHint"},{"SearchTitleString":"Music","SearchTitleType":"SearchHint"},{"SearchTitleString":"music apps","SearchTitleType":"SearchHint"},{"SearchTitleString":"free music","SearchTitleType":"SearchHint"},{"SearchTitleString":"podcasts","SearchTitleType":"SearchHint"},{"SearchTitleString":"streaming","SearchTitleType":"SearchHint"},{"SearchTitleString":"soundcloud","SearchTitleType":"SearchHint"}],"Language":"en-us","Markets":["US","DZ","AR","AU","AT","BH","BD","BE","BR","BG","CA","CL","CN","CO","CR","HR","CY","CZ","DK","EG","EE","FI","FR","DE","GR","GT","HK","HU","IS","IN","ID","IQ","IE","IL","IT","JP","JO","KZ","KE","KW","LV","LB","LI","LT","LU","MY","MT","MR","MX","MA","NL","NZ","NG","NO","OM","PK","PE","PH","PL","PT","QA","RO","RU","SA","RS","SG","SK","SI","ZA","KR","ES","SE","CH","TW","TH","TT","TN","TR","UA","AE","GB","VN","YE","LY","LK","UY","VE","AF","AX","AL","AS","AO","AI","AQ","AG","AM","AW","BO","BQ","BA","BW","BV","IO","BN","BF","BI","KH","CM","CV","KY","CF","TD","TL","DJ","DM","DO","EC","SV","GQ","ER","ET","FK","FO","FJ","GF","PF","TF","GA","GM","GE","GH","GI","GL","GD","GP","GU","GG","GN","GW","GY","HT","HM","HN","AZ","BS","BB","BY","BZ","BJ","BM","BT","KM","CG","CD","CK","CX","CC","CI","CW","JM","SJ","JE","KI","KG","LA","LS","LR","MO","MK","MG","MW","IM","MH","MQ","MU","YT","FM","MD","MN","MS","MZ","MM","NA","NR","NP","MV","ML","NC","NI","NE","NU","NF","PW","PS","PA","PG","PY","RE","RW","BL","MF","WS","ST","SN","MP","PN","SX","SB","SO","SC","SL","GS","SH","KN","LC","PM","VC","TJ","TZ","TG","TK","TO","TM","TC","TV","UM","UG", equals www.twitter.com (Twitter)
                      Source: svchost.exe, 00000020.00000003.605789439.00000298A2773000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000020.00000003.605830890.00000298A2784000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Try it free for 30 days, no strings attached\r\n\r\nLike us on Facebook: http://www.facebook.com/spotify \r\nFollow us on Twitter: http://twitter.com/spotify","ProductTitle":"Spotify - Music and Podcasts","SearchTitles":[{"SearchTitleString":"Spotify","SearchTitleType":"SearchHint"},{"SearchTitleString":"Music","SearchTitleType":"SearchHint"},{"SearchTitleString":"music apps","SearchTitleType":"SearchHint"},{"SearchTitleString":"free music","SearchTitleType":"SearchHint"},{"SearchTitleString":"podcasts","SearchTitleType":"SearchHint"},{"SearchTitleString":"streaming","SearchTitleType":"SearchHint"},{"SearchTitleString":"soundcloud","SearchTitleType":"SearchHint"}],"Language":"en-us","Markets":["US","DZ","AR","AU","AT","BH","BD","BE","BR","BG","CA","CL","CN","CO","CR","HR","CY","CZ","DK","EG","EE","FI","FR","DE","GR","GT","HK","HU","IS","IN","ID","IQ","IE","IL","IT","JP","JO","KZ","KE","KW","LV","LB","LI","LT","LU","MY","MT","MR","MX","MA","NL","NZ","NG","NO","OM","PK","PE","PH","PL","PT","QA","RO","RU","SA","RS","SG","SK","SI","ZA","KR","ES","SE","CH","TW","TH","TT","TN","TR","UA","AE","GB","VN","YE","LY","LK","UY","VE","AF","AX","AL","AS","AO","AI","AQ","AG","AM","AW","BO","BQ","BA","BW","BV","IO","BN","BF","BI","KH","CM","CV","KY","CF","TD","TL","DJ","DM","DO","EC","SV","GQ","ER","ET","FK","FO","FJ","GF","PF","TF","GA","GM","GE","GH","GI","GL","GD","GP","GU","GG","GN","GW","GY","HT","HM","HN","AZ","BS","BB","BY","BZ","BJ","BM","BT","KM","CG","CD","CK","CX","CC","CI","CW","JM","SJ","JE","KI","KG","LA","LS","LR","MO","MK","MG","MW","IM","MH","MQ","MU","YT","FM","MD","MN","MS","MZ","MM","NA","NR","NP","MV","ML","NC","NI","NE","NU","NF","PW","PS","PA","PG","PY","RE","RW","BL","MF","WS","ST","SN","MP","PN","SX","SB","SO","SC","SL","GS","SH","KN","LC","PM","VC","TJ","TZ","TG","TK","TO","TM","TC","TV","UM","UG","VI","VG","WF","EH","ZM","ZW","UZ","VU","SR","SZ","AD","MC","SM","ME","VA","NEUTRAL"]}],"MarketProperties":[{"RelatedProducts":[],"Markets":["US"]}],"ProductASchema":"Product;3","ProductBSchema":"ProductUnifiedApp;3","ProductId":"9NCBCSZSJRSB","Properties":{"PackageFamilyName":"SpotifyAB.SpotifyMusic_zpdnekdrzrea0","PackageIdentityName":"SpotifyAB.SpotifyMusic","PublisherCertificateName":"CN=453637B3-4E12-4CDF-B0D3-2A3C863BF6EF","XboxCrossGenSetId":null,"XboxConsoleGenOptimized":null,"XboxConsoleGenCompatible":null},"AlternateIds":[{"IdType":"LegacyWindowsStoreProductId","Value":"ceac5d3f-8a4f-40e1-9a67-76d9108c7cb5"},{"IdType":"LegacyWindowsPhoneProductId","Value":"caac1b9d-621b-4f96-b143-e10e1397740a"},{"IdType":"XboxTitleId","Value":"1681279293"}],"IngestionSource":"DCE","IsMicrosoftProduct":false,"PreferredSkuId":"0010","ProductType":"Application","ValidationData":{"PassedValidation":false,"RevisionId":"2022-07-22T07:55:01.8237416Z||.||b7e2ac48-308b-4ab0-ad70-c01dd95863e0||1152921505695074449||Null||fullrelease","ValidationResultUri":""},"MerchandizingTags":[],"PartD":"","ProductFamily":"Apps","ProductKind":"Application","DisplaySkuAvailab
                      Source: svchost.exe, 00000020.00000003.605789439.00000298A2773000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000020.00000003.605830890.00000298A2784000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Try it free for 30 days, no strings attached\r\n\r\nLike us on Facebook: http://www.facebook.com/spotify \r\nFollow us on Twitter: http://twitter.com/spotify","ProductTitle":"Spotify - Music and Podcasts","SearchTitles":[{"SearchTitleString":"Spotify","SearchTitleType":"SearchHint"},{"SearchTitleString":"Music","SearchTitleType":"SearchHint"},{"SearchTitleString":"music apps","SearchTitleType":"SearchHint"},{"SearchTitleString":"free music","SearchTitleType":"SearchHint"},{"SearchTitleString":"podcasts","SearchTitleType":"SearchHint"},{"SearchTitleString":"streaming","SearchTitleType":"SearchHint"},{"SearchTitleString":"soundcloud","SearchTitleType":"SearchHint"}],"Language":"en-us","Markets":["US","DZ","AR","AU","AT","BH","BD","BE","BR","BG","CA","CL","CN","CO","CR","HR","CY","CZ","DK","EG","EE","FI","FR","DE","GR","GT","HK","HU","IS","IN","ID","IQ","IE","IL","IT","JP","JO","KZ","KE","KW","LV","LB","LI","LT","LU","MY","MT","MR","MX","MA","NL","NZ","NG","NO","OM","PK","PE","PH","PL","PT","QA","RO","RU","SA","RS","SG","SK","SI","ZA","KR","ES","SE","CH","TW","TH","TT","TN","TR","UA","AE","GB","VN","YE","LY","LK","UY","VE","AF","AX","AL","AS","AO","AI","AQ","AG","AM","AW","BO","BQ","BA","BW","BV","IO","BN","BF","BI","KH","CM","CV","KY","CF","TD","TL","DJ","DM","DO","EC","SV","GQ","ER","ET","FK","FO","FJ","GF","PF","TF","GA","GM","GE","GH","GI","GL","GD","GP","GU","GG","GN","GW","GY","HT","HM","HN","AZ","BS","BB","BY","BZ","BJ","BM","BT","KM","CG","CD","CK","CX","CC","CI","CW","JM","SJ","JE","KI","KG","LA","LS","LR","MO","MK","MG","MW","IM","MH","MQ","MU","YT","FM","MD","MN","MS","MZ","MM","NA","NR","NP","MV","ML","NC","NI","NE","NU","NF","PW","PS","PA","PG","PY","RE","RW","BL","MF","WS","ST","SN","MP","PN","SX","SB","SO","SC","SL","GS","SH","KN","LC","PM","VC","TJ","TZ","TG","TK","TO","TM","TC","TV","UM","UG","VI","VG","WF","EH","ZM","ZW","UZ","VU","SR","SZ","AD","MC","SM","ME","VA","NEUTRAL"]}],"MarketProperties":[{"RelatedProducts":[],"Markets":["US"]}],"ProductASchema":"Product;3","ProductBSchema":"ProductUnifiedApp;3","ProductId":"9NCBCSZSJRSB","Properties":{"PackageFamilyName":"SpotifyAB.SpotifyMusic_zpdnekdrzrea0","PackageIdentityName":"SpotifyAB.SpotifyMusic","PublisherCertificateName":"CN=453637B3-4E12-4CDF-B0D3-2A3C863BF6EF","XboxCrossGenSetId":null,"XboxConsoleGenOptimized":null,"XboxConsoleGenCompatible":null},"AlternateIds":[{"IdType":"LegacyWindowsStoreProductId","Value":"ceac5d3f-8a4f-40e1-9a67-76d9108c7cb5"},{"IdType":"LegacyWindowsPhoneProductId","Value":"caac1b9d-621b-4f96-b143-e10e1397740a"},{"IdType":"XboxTitleId","Value":"1681279293"}],"IngestionSource":"DCE","IsMicrosoftProduct":false,"PreferredSkuId":"0010","ProductType":"Application","ValidationData":{"PassedValidation":false,"RevisionId":"2022-07-22T07:55:01.8237416Z||.||b7e2ac48-308b-4ab0-ad70-c01dd95863e0||1152921505695074449||Null||fullrelease","ValidationResultUri":""},"MerchandizingTags":[],"PartD":"","ProductFamily":"Apps","ProductKind":"Application","DisplaySkuAvailab
                      Source: svchost.exe, 00000009.00000002.626913081.000002413A266000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000C.00000002.662226882.000000000132F000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000C.00000003.444256705.000000000132F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000020.00000002.649942559.00000298A2711000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
                      Source: svchost.exe, 00000009.00000002.626913081.000002413A266000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000020.00000002.649749481.00000298A1EEA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.ver)
                      Source: regsvr32.exe, 0000000C.00000002.661740445.00000000012D3000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000C.00000003.444163231.00000000012E2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en
                      Source: regsvr32.exe, 0000000C.00000003.444256705.000000000132F000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000C.00000002.662502712.000000000136D000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000C.00000003.445329795.000000000136D000.00000004.00000020.00020000.00000000.sdmp, 77EC63BDA74BD0D0E0426DC8F80085060.12.drString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
                      Source: regsvr32.exe, 0000000C.00000003.443936950.000000000138D000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000C.00000003.445018013.00000000034A1000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000C.00000002.663236738.000000000350D000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000C.00000003.445267551.000000000350D000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000C.00000003.445153458.00000000034E7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab?e0707f5d6733f
                      Source: regsvr32.exe, 0000000C.00000002.662226882.000000000132F000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000C.00000003.444256705.000000000132F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cabvH
                      Source: regsvr32.exe, 0000000C.00000003.444256705.000000000132F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/pXX
                      Source: svchost.exe, 00000020.00000003.627116814.00000298A279A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://help.disneyplus.com.
                      Source: svchost.exe, 00000012.00000002.405412295.000002D970813000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.bingmapsportal.com
                      Source: svchost.exe, 00000010.00000002.661987254.000002D0F6641000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://%s.dnet.xboxlive.com
                      Source: svchost.exe, 00000010.00000002.661987254.000002D0F6641000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://%s.xboxlive.com
                      Source: svchost.exe, 00000010.00000002.661987254.000002D0F6641000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://%s.xboxlive.come
                      Source: regsvr32.exe, 0000000C.00000002.661956267.0000000001301000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000C.00000003.444203872.0000000001301000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://174.138.33.49/
                      Source: regsvr32.exe, 0000000C.00000002.661956267.0000000001301000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000C.00000003.444203872.0000000001301000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://174.138.33.49/T
                      Source: regsvr32.exe, 0000000C.00000002.661956267.0000000001301000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000C.00000002.661740445.00000000012D3000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000C.00000003.444163231.00000000012E2000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000C.00000003.444203872.0000000001301000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://174.138.33.49:7080/
                      Source: regsvr32.exe, 0000000C.00000002.661740445.00000000012D3000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000C.00000003.444163231.00000000012E2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://174.138.33.49:7080/944
                      Source: regsvr32.exe, 0000000C.00000002.661740445.00000000012D3000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000C.00000003.444163231.00000000012E2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://174.138.33.49:7080/tem
                      Source: regsvr32.exe, 0000000C.00000002.661956267.0000000001301000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000C.00000003.444203872.0000000001301000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://174.138.33.49:7080/x
                      Source: svchost.exe, 00000010.00000002.661987254.000002D0F6641000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://activity.windows.com
                      Source: svchost.exe, 00000012.00000003.404914654.000002D970861000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://appexmapsappupdate.blob.core.windows.net
                      Source: svchost.exe, 00000010.00000002.661987254.000002D0F6641000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bn2.notify.windows.com/v2/register/xplatform/device
                      Source: svchost.exe, 00000010.00000002.661987254.000002D0F6641000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://co4-df.notify.windows.com/v2/register/xplatform/device
                      Source: svchost.exe, 00000012.00000003.404945537.000002D97085A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.ditu.live.com/REST/v1/Imagery/Copyright/
                      Source: svchost.exe, 00000012.00000002.405473479.000002D97085C000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000012.00000003.404945537.000002D97085A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.ditu.live.com/REST/v1/JsonFilter/VenueMaps/data/
                      Source: svchost.exe, 00000012.00000003.404914654.000002D970861000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.ditu.live.com/REST/v1/Locations
                      Source: svchost.exe, 00000012.00000002.405452602.000002D97083D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.ditu.live.com/REST/v1/Routes/
                      Source: svchost.exe, 00000012.00000002.405473479.000002D97085C000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000012.00000003.404945537.000002D97085A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.ditu.live.com/REST/v1/Traffic/Incidents/
                      Source: svchost.exe, 00000012.00000003.404914654.000002D970861000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.ditu.live.com/mapcontrol/logging.ashx
                      Source: svchost.exe, 00000012.00000002.405466984.000002D97084E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000012.00000003.404854812.000002D970849000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.ditu.live.com/mapcontrol/mapconfiguration.ashx?name=native&v=
                      Source: svchost.exe, 00000012.00000002.405473479.000002D97085C000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000012.00000003.404945537.000002D97085A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/JsonFilter/VenueMaps/data/
                      Source: svchost.exe, 00000012.00000003.404914654.000002D970861000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Locations
                      Source: svchost.exe, 00000012.00000002.405452602.000002D97083D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Routes/
                      Source: svchost.exe, 00000012.00000003.404914654.000002D970861000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Routes/Driving
                      Source: svchost.exe, 00000012.00000003.404914654.000002D970861000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Routes/Transit
                      Source: svchost.exe, 00000012.00000003.404914654.000002D970861000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Routes/Walking
                      Source: svchost.exe, 00000012.00000002.405457932.000002D970842000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000012.00000003.404980940.000002D970840000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000012.00000003.405017263.000002D970841000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Transit/Schedules/
                      Source: svchost.exe, 00000012.00000002.405457932.000002D970842000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000012.00000003.404980940.000002D970840000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000012.00000003.405017263.000002D970841000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/mapcontrol/HumanScaleServices/GetBubbles.ashx?n=
                      Source: svchost.exe, 00000012.00000003.404914654.000002D970861000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/mapcontrol/logging.ashx
                      Source: svchost.exe, 00000012.00000002.405473479.000002D97085C000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000012.00000003.404980940.000002D970840000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000012.00000003.404945537.000002D97085A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/webservices/v1/LoggingService/LoggingService.svc/Log?
                      Source: svchost.exe, 00000020.00000003.627116814.00000298A279A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://disneyplus.com/legal.
                      Source: svchost.exe, 00000012.00000003.404945537.000002D97085A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dynamic.api.tiles.ditu.live.com/odvs/gd?pv=1&r=
                      Source: svchost.exe, 00000012.00000002.405473479.000002D97085C000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000012.00000003.404945537.000002D97085A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dynamic.api.tiles.ditu.live.com/odvs/gdi?pv=1&r=
                      Source: svchost.exe, 00000012.00000003.404945537.000002D97085A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dynamic.api.tiles.ditu.live.com/odvs/gdv?pv=1&r=
                      Source: svchost.exe, 00000012.00000003.404854812.000002D970849000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dynamic.t
                      Source: svchost.exe, 00000012.00000003.404914654.000002D970861000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dynamic.t0.tiles.ditu.live.com/comp/gen.ashx
                      Source: svchost.exe, 00000012.00000002.405452602.000002D97083D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ecn.dev.virtualearth.net/REST/v1/Imagery/Copyright/
                      Source: svchost.exe, 00000012.00000003.383087363.000002D970831000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ecn.dev.virtualearth.net/mapcontrol/mapconfiguration.ashx?name=native&v=
                      Source: svchost.exe, 00000020.00000003.620490256.00000298A2781000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000020.00000003.620519716.00000298A2C19000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000020.00000003.620333446.00000298A279D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000020.00000003.620402747.00000298A2C02000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000020.00000003.620475663.00000298A27AD000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000020.00000003.620374463.00000298A27AD000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000020.00000003.620430135.00000298A2C03000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://support.hotspotshield.com/
                      Source: svchost.exe, 00000012.00000002.405452602.000002D97083D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/comp/gen.ashx
                      Source: svchost.exe, 00000012.00000002.405412295.000002D970813000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000012.00000002.405452602.000002D97083D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gd?pv=1&r=
                      Source: svchost.exe, 00000012.00000003.383087363.000002D970831000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdi?pv=1&r=
                      Source: svchost.exe, 00000012.00000003.404980940.000002D970840000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000012.00000003.405005326.000002D970845000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdv?pv=1&r=
                      Source: svchost.exe, 00000012.00000003.383087363.000002D970831000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gri?pv=1&r=
                      Source: svchost.exe, 00000012.00000003.383087363.000002D970831000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000012.00000002.405447191.000002D97083A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t0.ssl.ak.tiles.virtualearth.net/tiles/gen
                      Source: svchost.exe, 00000012.00000002.405412295.000002D970813000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t0.tiles.ditu.live.com/tiles/gen
                      Source: svchost.exe, 00000020.00000003.627116814.00000298A279A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.disneyplus.com/legal/privacy-policy
                      Source: svchost.exe, 00000020.00000003.627116814.00000298A279A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.disneyplus.com/legal/your-california-privacy-rights
                      Source: svchost.exe, 00000020.00000003.620490256.00000298A2781000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000020.00000003.620519716.00000298A2C19000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000020.00000003.620333446.00000298A279D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000020.00000003.620402747.00000298A2C02000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000020.00000003.620475663.00000298A27AD000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000020.00000003.620374463.00000298A27AD000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000020.00000003.620430135.00000298A2C03000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.hotspotshield.com/terms/
                      Source: svchost.exe, 00000020.00000003.620490256.00000298A2781000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000020.00000003.620519716.00000298A2C19000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000020.00000003.620333446.00000298A279D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000020.00000003.620402747.00000298A2C02000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000020.00000003.620475663.00000298A27AD000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000020.00000003.620374463.00000298A27AD000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000020.00000003.620430135.00000298A2C03000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.pango.co/privacy
                      Source: svchost.exe, 00000020.00000003.629383351.00000298A279F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.tiktok.com/legal/report/feedback

                      E-Banking Fraud

                      barindex
                      Source: Yara matchFile source: 0000000C.00000002.661348004.0000000001298000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 2.2.regsvr32.exe.710000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.0.rundll32.exe.22fc4510000.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 12.2.regsvr32.exe.2cb0000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.0.rundll32.exe.22fc4510000.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.0.rundll32.exe.14980010000.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.0.rundll32.exe.22fc4510000.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.rundll32.exe.20000010000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.rundll32.exe.22fc4510000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.14980010000.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.2.rundll32.exe.1a029ee0000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.0.rundll32.exe.22fc4510000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.2.rundll32.exe.1a029ee0000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.0.rundll32.exe.14980010000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.rundll32.exe.22fc4510000.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.rundll32.exe.20000010000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.0.rundll32.exe.14980010000.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.regsvr32.exe.710000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.0.rundll32.exe.14980010000.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.14980010000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 12.2.regsvr32.exe.2cb0000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.loaddll64.exe.15738060000.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.loaddll64.exe.15738060000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000002.364452628.0000015738060000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.345850399.0000000000710000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.351700174.0000020000071000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000C.00000002.662977936.0000000002D11000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000000.348541554.0000022FC4510000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.351638703.0000020000010000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.377797661.0000022FC4510000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.378702987.0000014980010000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.378747717.0000014980071000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.346021007.0000000002061000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000000.348813253.0000022FC4571000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000006.00000002.358968494.000001A029F41000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000000.338942505.0000022FC4510000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.377880147.0000022FC4571000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000C.00000002.662715077.0000000002CB0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000000.352241442.0000014980010000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000000.338998123.0000022FC4571000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.364805521.0000015739971000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000000.345097590.0000014980010000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000000.349632978.0000014980071000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000000.352325443.0000014980071000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000006.00000002.358868561.000001A029EE0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 6776 -s 324
                      Source: C:\Windows\System32\regsvr32.exeFile deleted: C:\Windows\System32\GAjjZRZVj\QFdWkQKkPokX.dll:Zone.IdentifierJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeFile created: C:\Windows\system32\ZcjkHmdxs\Jump to behavior
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018001A0980_2_000000018001A098
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018003E0D00_2_000000018003E0D0
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001800180E00_2_00000001800180E0
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018001C0F40_2_000000018001C0F4
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018001E1340_2_000000018001E134
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018002C1500_2_000000018002C150
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018001A1A00_2_000000018001A1A0
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018004E1C00_2_000000018004E1C0
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001800181E40_2_00000001800181E4
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001800262880_2_0000000180026288
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018001A2A80_2_000000018001A2A8
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001800182E80_2_00000001800182E8
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018001E3200_2_000000018001E320
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018001C3240_2_000000018001C324
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001800583380_2_0000000180058338
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018001A3B40_2_000000018001A3B4
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001800063E00_2_00000001800063E0
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001800183F00_2_00000001800183F0
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018002E4200_2_000000018002E420
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018001E5080_2_000000018001E508
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018001C5100_2_000000018001C510
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001800285140_2_0000000180028514
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018002C51C0_2_000000018002C51C
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001800185480_2_0000000180018548
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018005A5A40_2_000000018005A5A4
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001800266180_2_0000000180026618
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001800186500_2_0000000180018650
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001800286680_2_0000000180028668
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018004067C0_2_000000018004067C
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018004E6F00_2_000000018004E6F0
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018001C6FC0_2_000000018001C6FC
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018001E7340_2_000000018001E734
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001800187580_2_0000000180018758
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001800427CC0_2_00000001800427CC
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001800287E40_2_00000001800287E4
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001800188600_2_0000000180018860
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001800168700_2_0000000180016870
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001800548F80_2_00000001800548F8
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018002C9000_2_000000018002C900
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018001E91C0_2_000000018001E91C
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018001C92C0_2_000000018001C92C
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001800169780_2_0000000180016978
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001800189CC0_2_00000001800189CC
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001800427CC0_2_00000001800427CC
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180026A240_2_0000000180026A24
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180016A800_2_0000000180016A80
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018001EB040_2_000000018001EB04
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180018B100_2_0000000180018B10
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018001CB180_2_000000018001CB18
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180016B8C0_2_0000000180016B8C
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018004EBA00_2_000000018004EBA0
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180018C540_2_0000000180018C54
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018002CCCC0_2_000000018002CCCC
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180016CE80_2_0000000180016CE8
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018001CD000_2_000000018001CD00
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018001ED300_2_000000018001ED30
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180018D980_2_0000000180018D98
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180016DF00_2_0000000180016DF0
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018004CEC80_2_000000018004CEC8
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180018EC80_2_0000000180018EC8
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180016EF80_2_0000000180016EF8
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018001EF180_2_000000018001EF18
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018001CF2C0_2_000000018001CF2C
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180042F880_2_0000000180042F88
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180018FD00_2_0000000180018FD0
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001800170000_2_0000000180017000
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001800190D80_2_00000001800190D8
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018001F1040_2_000000018001F104
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018001D1140_2_000000018001D114
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001800171580_2_0000000180017158
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018002D19C0_2_000000018002D19C
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001800191E00_2_00000001800191E0
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001800172600_2_0000000180017260
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018001D2FC0_2_000000018001D2FC
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018004F2FC0_2_000000018004F2FC
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018001B3100_2_000000018001B310
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018001F3340_2_000000018001F334
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001800193380_2_0000000180019338
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001800173680_2_0000000180017368
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001800194400_2_0000000180019440
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001800174740_2_0000000180017474
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018002B49C0_2_000000018002B49C
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018001B4F80_2_000000018001B4F8
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018001F5200_2_000000018001F520
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018001D5280_2_000000018001D528
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001800195480_2_0000000180019548
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001800175D00_2_00000001800175D0
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001800196500_2_0000000180019650
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018002D6800_2_000000018002D680
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001800176D40_2_00000001800176D4
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018001F70C0_2_000000018001F70C
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018001D7100_2_000000018001D710
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018001B7240_2_000000018001B724
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018004972C0_2_000000018004972C
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001800257400_2_0000000180025740
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001800197B80_2_00000001800197B8
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018004B7E80_2_000000018004B7E8
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001800178000_2_0000000180017800
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001800198C00_2_00000001800198C0
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018002B8D00_2_000000018002B8D0
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018001D8FC0_2_000000018001D8FC
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001800179080_2_0000000180017908
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018001B90C0_2_000000018001B90C
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018001F93C0_2_000000018001F93C
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001800199C80_2_00000001800199C8
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180017A100_2_0000000180017A10
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018003FA6C0_2_000000018003FA6C
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180045A700_2_0000000180045A70
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180019AD00_2_0000000180019AD0
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180025AD40_2_0000000180025AD4
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018001BAF40_2_000000018001BAF4
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180017B180_2_0000000180017B18
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018001DB2C0_2_000000018001DB2C
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018002DB500_2_000000018002DB50
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180019C280_2_0000000180019C28
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180017C700_2_0000000180017C70
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018003BD000_2_000000018003BD00
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018001DD180_2_000000018001DD18
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018002BD1C0_2_000000018002BD1C
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018001BD200_2_000000018001BD20
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180019D300_2_0000000180019D30
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180017D780_2_0000000180017D78
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180045A700_2_0000000180045A70
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180019E380_2_0000000180019E38
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180017E800_2_0000000180017E80
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180049EEC0_2_0000000180049EEC
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180025EFC0_2_0000000180025EFC
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018001DF040_2_000000018001DF04
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018001BF080_2_000000018001BF08
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018003FF1C0_2_000000018003FF1C
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180019F400_2_0000000180019F40
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180017F880_2_0000000180017F88
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018002DFAC0_2_000000018002DFAC
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000157380500000_2_0000015738050000
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000157399874140_2_0000015739987414
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000001573998A8040_2_000001573998A804
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000001573999B6BC0_2_000001573999B6BC
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000001573998FC700_2_000001573998FC70
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000015739981B880_2_0000015739981B88
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000001573998EB080_2_000001573998EB08
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000015739975B180_2_0000015739975B18
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000015739988B3C0_2_0000015739988B3C
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000015739997E280_2_0000015739997E28
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000001573998BD640_2_000001573998BD64
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000001573997CCC80_2_000001573997CCC8
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000157399710140_2_0000015739971014
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000001573998B0280_2_000001573998B028
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000157399940200_2_0000015739994020
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000001573998406C0_2_000001573998406C
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000015739982F940_2_0000015739982F94
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000001573998EFAC0_2_000001573998EFAC
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000001573997DFCC0_2_000001573997DFCC
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000001573997EFCC0_2_000001573997EFCC
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000001573997AFE40_2_000001573997AFE4
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000015739992F3C0_2_0000015739992F3C
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000015739996F3C0_2_0000015739996F3C
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000015739973F400_2_0000015739973F40
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000015739978F5C0_2_0000015739978F5C
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000001573999BE900_2_000001573999BE90
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000015739989EC00_2_0000015739989EC0
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000015739994EF40_2_0000015739994EF4
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000015739998EE80_2_0000015739998EE8
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000157399832100_2_0000015739983210
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000001573997E2540_2_000001573997E254
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000001573998D2540_2_000001573998D254
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000001573998F2380_2_000001573998F238
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000157399741A80_2_00000157399741A8
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000001573997B1A80_2_000001573997B1A8
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000157399751980_2_0000015739975198
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000157399731F00_2_00000157399731F0
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000157399861100_2_0000015739986110
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000001573997B0F80_2_000001573997B0F8
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000001573998A1300_2_000001573998A130
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000157399871440_2_0000015739987144
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000001573999A0880_2_000001573999A088
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000157399740780_2_0000015739974078
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000157399790D40_2_00000157399790D4
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000157399730BC0_2_00000157399730BC
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000001573999B0EC0_2_000001573999B0EC
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000001573998A4080_2_000001573998A408
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000157399913FC0_2_00000157399913FC
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000157399864180_2_0000015739986418
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000001573999344C0_2_000001573999344C
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000001573997C4580_2_000001573997C458
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000157399793AC0_2_00000157399793AC
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000157399893E00_2_00000157399893E0
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000001573997B3E40_2_000001573997B3E4
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000001573999A3040_2_000001573999A304
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000157399933040_2_0000015739993304
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000157399912FC0_2_00000157399912FC
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000001573997D3000_2_000001573997D300
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000157399943300_2_0000015739994330
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000001573999632C0_2_000001573999632C
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000157399713680_2_0000015739971368
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000157399843680_2_0000015739984368
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000001573997F2900_2_000001573997F290
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000001573997B2BC0_2_000001573997B2BC
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000157399772E00_2_00000157399772E0
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000157399836100_2_0000015739983610
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000001573998762C0_2_000001573998762C
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000001573998D6200_2_000001573998D620
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000001573998F61C0_2_000001573998F61C
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000157399926380_2_0000015739992638
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000157399845940_2_0000015739984594
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000157399865940_2_0000015739986594
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000001573997F5800_2_000001573997F580
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000157399805780_2_0000015739980578
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000001573998C5AC0_2_000001573998C5AC
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000157399725D80_2_00000157399725D8
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000157399965200_2_0000015739996520
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000001573999B5700_2_000001573999B570
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000001573998B5580_2_000001573998B558
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000001573999155C0_2_000001573999155C
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000157399754840_2_0000015739975484
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000001573998E4A80_2_000001573998E4A8
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000157399814A00_2_00000157399814A0
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000001573998D4D00_2_000001573998D4D0
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000157399824E40_2_00000157399824E4
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000157399984DC0_2_00000157399984DC
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000157399728200_2_0000015739972820
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000001573997F8500_2_000001573997F850
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000157399748480_2_0000015739974848
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000001573998484C0_2_000001573998484C
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000001573998E7A40_2_000001573998E7A4
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000157399827A40_2_00000157399827A4
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000157399907D00_2_00000157399907D0
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000157399727080_2_0000015739972708
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000157399897200_2_0000015739989720
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000001573998C7200_2_000001573998C720
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000157399837240_2_0000015739983724
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000001573998F7640_2_000001573998F764
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000157399806800_2_0000015739980680
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000157399846B40_2_00000157399846B4
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000157399916A80_2_00000157399916A8
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000157399976A40_2_00000157399976A4
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000001573997B6980_2_000001573997B698
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000157399766980_2_0000015739976698
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000001573999369C0_2_000001573999369C
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000157399736E00_2_00000157399736E0
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000015739999A400_2_0000015739999A40
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000157399989900_2_0000015739998990
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000157399869780_2_0000015739986978
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000001573998D9C40_2_000001573998D9C4
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000157399829BC0_2_00000157399829BC
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000001573998C9F00_2_000001573998C9F0
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000157399899F40_2_00000157399899F4
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000001573997D92C0_2_000001573997D92C
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000157399949180_2_0000015739994918
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000157399749480_2_0000015739974948
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000001573999093C0_2_000001573999093C
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000001573999796C0_2_000001573999796C
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000157399938940_2_0000015739993894
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000001573998C8C00_2_000001573998C8C0
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000157399878C40_2_00000157399878C4
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000001573997BC080_2_000001573997BC08
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000015739987C300_2_0000015739987C30
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000015739985C500_2_0000015739985C50
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000015739992C480_2_0000015739992C48
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000015739990C680_2_0000015739990C68
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000015739980C680_2_0000015739980C68
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000015739974C640_2_0000015739974C64
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000015739983BB40_2_0000015739983BB4
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000015739977BB40_2_0000015739977BB4
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000001573998ABD80_2_000001573998ABD8
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000015739992AFC0_2_0000015739992AFC
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000015739998B280_2_0000015739998B28
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000015739987B240_2_0000015739987B24
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000015739996B400_2_0000015739996B40
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000001573997CB6C0_2_000001573997CB6C
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000001573997DB740_2_000001573997DB74
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000015739980B600_2_0000015739980B60
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000015739973A9C0_2_0000015739973A9C
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000001573997FAD00_2_000001573997FAD0
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000015739990AC40_2_0000015739990AC4
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000015739991AE00_2_0000015739991AE0
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000015739972AE40_2_0000015739972AE4
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000015739992E040_2_0000015739992E04
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000015739995E300_2_0000015739995E30
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000015739983E180_2_0000015739983E18
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000001573997FE580_2_000001573997FE58
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000001573998EE5C0_2_000001573998EE5C
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000001573997ED840_2_000001573997ED84
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000015739987DB00_2_0000015739987DB0
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000015739999DA80_2_0000015739999DA8
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000015739993DD40_2_0000015739993DD4
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000015739990DBC0_2_0000015739990DBC
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000015739972DC00_2_0000015739972DC0
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000015739991D2C0_2_0000015739991D2C
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000001573999BD200_2_000001573999BD20
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000001573997BD240_2_000001573997BD24
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000015739983D1C0_2_0000015739983D1C
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000015739989D5C0_2_0000015739989D5C
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000015739977CAC0_2_0000015739977CAC
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000015739973CE80_2_0000015739973CE8
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000001573998ACEC0_2_000001573998ACEC
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000015739978CE00_2_0000015739978CE0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001A0982_2_000000018001A098
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018003E0D02_2_000000018003E0D0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800180E02_2_00000001800180E0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001C0F42_2_000000018001C0F4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001E1342_2_000000018001E134
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018002C1502_2_000000018002C150
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001A1A02_2_000000018001A1A0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018004E1C02_2_000000018004E1C0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800181E42_2_00000001800181E4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800262882_2_0000000180026288
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001A2A82_2_000000018001A2A8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800182E82_2_00000001800182E8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001E3202_2_000000018001E320
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001C3242_2_000000018001C324
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800583382_2_0000000180058338
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001A3B42_2_000000018001A3B4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800063E02_2_00000001800063E0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800183F02_2_00000001800183F0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018002E4202_2_000000018002E420
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001E5082_2_000000018001E508
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001C5102_2_000000018001C510
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800285142_2_0000000180028514
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018002C51C2_2_000000018002C51C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800185482_2_0000000180018548
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018005A5A42_2_000000018005A5A4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800266182_2_0000000180026618
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800186502_2_0000000180018650
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800286682_2_0000000180028668
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018004067C2_2_000000018004067C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018004E6F02_2_000000018004E6F0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001C6FC2_2_000000018001C6FC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001E7342_2_000000018001E734
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800187582_2_0000000180018758
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800427CC2_2_00000001800427CC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800287E42_2_00000001800287E4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800188602_2_0000000180018860
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800168702_2_0000000180016870
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800548F82_2_00000001800548F8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018002C9002_2_000000018002C900
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001E91C2_2_000000018001E91C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001C92C2_2_000000018001C92C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800169782_2_0000000180016978
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800189CC2_2_00000001800189CC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800427CC2_2_00000001800427CC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180026A242_2_0000000180026A24
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180016A802_2_0000000180016A80
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001EB042_2_000000018001EB04
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180018B102_2_0000000180018B10
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001CB182_2_000000018001CB18
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180016B8C2_2_0000000180016B8C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018004EBA02_2_000000018004EBA0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180018C542_2_0000000180018C54
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018002CCCC2_2_000000018002CCCC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180016CE82_2_0000000180016CE8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001CD002_2_000000018001CD00
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001ED302_2_000000018001ED30
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180018D982_2_0000000180018D98
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180016DF02_2_0000000180016DF0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018004CEC82_2_000000018004CEC8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180018EC82_2_0000000180018EC8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180016EF82_2_0000000180016EF8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001EF182_2_000000018001EF18
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001CF2C2_2_000000018001CF2C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180042F882_2_0000000180042F88
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180018FD02_2_0000000180018FD0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800170002_2_0000000180017000
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800190D82_2_00000001800190D8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001F1042_2_000000018001F104
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001D1142_2_000000018001D114
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800171582_2_0000000180017158
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018002D19C2_2_000000018002D19C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800191E02_2_00000001800191E0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800172602_2_0000000180017260
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001D2FC2_2_000000018001D2FC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018004F2FC2_2_000000018004F2FC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001B3102_2_000000018001B310
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001F3342_2_000000018001F334
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800193382_2_0000000180019338
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800173682_2_0000000180017368
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800194402_2_0000000180019440
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800174742_2_0000000180017474
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018002B49C2_2_000000018002B49C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001B4F82_2_000000018001B4F8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001F5202_2_000000018001F520
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001D5282_2_000000018001D528
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800195482_2_0000000180019548
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800175D02_2_00000001800175D0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800196502_2_0000000180019650
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018002D6802_2_000000018002D680
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800176D42_2_00000001800176D4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001F70C2_2_000000018001F70C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001D7102_2_000000018001D710
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001B7242_2_000000018001B724
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018004972C2_2_000000018004972C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800257402_2_0000000180025740
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800197B82_2_00000001800197B8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018004B7E82_2_000000018004B7E8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800178002_2_0000000180017800
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800198C02_2_00000001800198C0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018002B8D02_2_000000018002B8D0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001D8FC2_2_000000018001D8FC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800179082_2_0000000180017908
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001B90C2_2_000000018001B90C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001F93C2_2_000000018001F93C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800199C82_2_00000001800199C8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180017A102_2_0000000180017A10
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018003FA6C2_2_000000018003FA6C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180045A702_2_0000000180045A70
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180019AD02_2_0000000180019AD0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180025AD42_2_0000000180025AD4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001BAF42_2_000000018001BAF4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180017B182_2_0000000180017B18
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001DB2C2_2_000000018001DB2C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018002DB502_2_000000018002DB50
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180019C282_2_0000000180019C28
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180017C702_2_0000000180017C70
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018003BD002_2_000000018003BD00
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001DD182_2_000000018001DD18
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018002BD1C2_2_000000018002BD1C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001BD202_2_000000018001BD20
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180019D302_2_0000000180019D30
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180017D782_2_0000000180017D78
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180045A702_2_0000000180045A70
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180019E382_2_0000000180019E38
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180017E802_2_0000000180017E80
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180049EEC2_2_0000000180049EEC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180025EFC2_2_0000000180025EFC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001DF042_2_000000018001DF04
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001BF082_2_000000018001BF08
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018003FF1C2_2_000000018003FF1C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180019F402_2_0000000180019F40
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180017F882_2_0000000180017F88
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018002DFAC2_2_000000018002DFAC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_006C00002_2_006C0000
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0208B6BC2_2_0208B6BC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_020774142_2_02077414
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0207EB082_2_0207EB08
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_02065B182_2_02065B18
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_02078B3C2_2_02078B3C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_02071B882_2_02071B88
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0207A8042_2_0207A804
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0207C8C02_2_0207C8C0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_02087E282_2_02087E28
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0206CCC82_2_0206CCC8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0207BD642_2_0207BD64
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_020732102_2_02073210
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0207F2382_2_0207F238
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0206E2542_2_0206E254
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0207D2542_2_0207D254
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0206F2902_2_0206F290
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0206B2BC2_2_0206B2BC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_020672E02_2_020672E0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_020812FC2_2_020812FC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0206D3002_2_0206D300
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0208A3042_2_0208A304
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_020833042_2_02083304
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0208632C2_2_0208632C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_020843302_2_02084330
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_020613682_2_02061368
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_020743682_2_02074368
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_020693AC2_2_020693AC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0206B3E42_2_0206B3E4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_020793E02_2_020793E0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_020813FC2_2_020813FC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_020610142_2_02061014
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_020840202_2_02084020
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0207B0282_2_0207B028
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0207406C2_2_0207406C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_020640782_2_02064078
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0208A0882_2_0208A088
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_020630BC2_2_020630BC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_020690D42_2_020690D4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0208B0EC2_2_0208B0EC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0206B0F82_2_0206B0F8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_020761102_2_02076110
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0207A1302_2_0207A130
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_020771442_2_02077144
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_020651982_2_02065198
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_020641A82_2_020641A8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0206B1A82_2_0206B1A8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_020631F02_2_020631F0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_020736102_2_02073610
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0207F61C2_2_0207F61C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0207D6202_2_0207D620
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0207762C2_2_0207762C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_020826382_2_02082638
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_020706802_2_02070680
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0208369C2_2_0208369C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0206B6982_2_0206B698
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_020666982_2_02066698
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_020816A82_2_020816A8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_020876A42_2_020876A4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_020746B42_2_020746B4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_020636E02_2_020636E0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_020627082_2_02062708
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_020737242_2_02073724
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_020797202_2_02079720
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0207C7202_2_0207C720
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0207F7642_2_0207F764
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0207E7A42_2_0207E7A4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_020727A42_2_020727A4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_020807D02_2_020807D0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0207A4082_2_0207A408
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_020764182_2_02076418
                      Source: C:\Windows\System32\loaddll64.exeCode function: String function: 0000000180046D38 appears 44 times
                      Source: C:\Windows\System32\regsvr32.exeCode function: String function: 0000000180046D38 appears 44 times
                      Source: C:\Windows\System32\regsvr32.exeSection loaded: sfc.dllJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeSection loaded: sfc.dllJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeSection loaded: sfc.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: xboxlivetitleid.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: cdpsgshims.dllJump to behavior
                      Source: MIpuuSiSZ4.dllVirustotal: Detection: 72%
                      Source: MIpuuSiSZ4.dllMetadefender: Detection: 54%
                      Source: MIpuuSiSZ4.dllReversingLabs: Detection: 88%
                      Source: MIpuuSiSZ4.dllStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      Source: C:\Windows\System32\loaddll64.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                      Source: unknownProcess created: C:\Windows\System32\loaddll64.exe loaddll64.exe "C:\Users\user\Desktop\MIpuuSiSZ4.dll"
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\MIpuuSiSZ4.dll",#1
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\MIpuuSiSZ4.dll
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\MIpuuSiSZ4.dll",#1
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\MIpuuSiSZ4.dll,AddStroke
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\MIpuuSiSZ4.dll,AddWordsToWordList
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\MIpuuSiSZ4.dll,AdviseInkChange
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
                      Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\System32\regsvr32.exe C:\Windows\system32\regsvr32.exe "C:\Windows\system32\GAjjZRZVj\QFdWkQKkPokX.dll"
                      Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 6776 -s 324
                      Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 6792 -s 328
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\regsvr32.exe C:\Windows\system32\regsvr32.exe "C:\Windows\system32\ZcjkHmdxs\qpwRIIkrlFzB.dll"
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe c:\windows\system32\svchost.exe -k localservice -p -s CDPSvc
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe c:\windows\system32\svchost.exe -k networkservice -p -s DoSvc
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k NetworkService -p
                      Source: unknownProcess created: C:\Windows\System32\SgrmBroker.exe C:\Windows\system32\SgrmBroker.exe
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe c:\windows\system32\svchost.exe -k localservicenetworkrestricted -p -s wscsvc
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p
                      Source: C:\Windows\System32\svchost.exeProcess created: C:\Program Files\Windows Defender\MpCmdRun.exe "C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable
                      Source: C:\Program Files\Windows Defender\MpCmdRun.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\MIpuuSiSZ4.dll",#1Jump to behavior
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\MIpuuSiSZ4.dllJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\MIpuuSiSZ4.dll,AddStrokeJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\MIpuuSiSZ4.dll,AddWordsToWordListJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\MIpuuSiSZ4.dll,AdviseInkChangeJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\regsvr32.exe C:\Windows\system32\regsvr32.exe "C:\Windows\system32\ZcjkHmdxs\qpwRIIkrlFzB.dll"Jump to behavior
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\MIpuuSiSZ4.dll",#1Jump to behavior
                      Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\System32\regsvr32.exe C:\Windows\system32\regsvr32.exe "C:\Windows\system32\GAjjZRZVj\QFdWkQKkPokX.dll"Jump to behavior
                      Source: C:\Windows\System32\svchost.exeProcess created: C:\Program Files\Windows Defender\MpCmdRun.exe "C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable
                      Source: C:\Windows\System32\loaddll64.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
                      Source: C:\Windows\System32\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\WER31C2.tmpJump to behavior
                      Source: classification engineClassification label: mal100.troj.evad.winDLL@33/16@0/28
                      Source: C:\Windows\System32\loaddll64.exeFile read: C:\Users\desktop.iniJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000001573998A804 Process32FirstW,CreateToolhelp32Snapshot,Process32NextW,FindCloseChangeNotification,0_2_000001573998A804
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\MIpuuSiSZ4.dll",#1
                      Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess6792
                      Source: C:\Windows\System32\conhost.exeMutant created: \BaseNamedObjects\Local\SM0:6352:120:WilError_01
                      Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess6776
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001800011AC LoadStringW,LoadStringW,FindResourceA,LoadResource,LockResource,0_2_00000001800011AC
                      Source: C:\Windows\System32\svchost.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Windows\System32\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Windows\System32\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Windows\System32\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Windows\System32\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile read: C:\Windows\System32\drivers\etc\hosts
                      Source: C:\Windows\System32\svchost.exeFile read: C:\Windows\System32\drivers\etc\hosts
                      Source: MIpuuSiSZ4.dllStatic PE information: Image base 0x180000000 > 0x60000000
                      Source: MIpuuSiSZ4.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                      Source: MIpuuSiSZ4.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                      Source: MIpuuSiSZ4.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                      Source: MIpuuSiSZ4.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                      Source: MIpuuSiSZ4.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                      Source: MIpuuSiSZ4.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                      Source: MIpuuSiSZ4.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                      Source: MIpuuSiSZ4.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                      Source: MIpuuSiSZ4.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                      Source: MIpuuSiSZ4.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                      Source: MIpuuSiSZ4.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                      Source: MIpuuSiSZ4.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000015739978C72 push ebp; ret 0_2_0000015739978C7D
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_02068C72 push ebp; ret 2_2_02068C7D
                      Source: MIpuuSiSZ4.dllStatic PE information: section name: _RDATA
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\MIpuuSiSZ4.dll
                      Source: C:\Windows\System32\regsvr32.exePE file moved: C:\Windows\System32\GAjjZRZVj\QFdWkQKkPokX.dllJump to behavior

                      Hooking and other Techniques for Hiding and Protection

                      barindex
                      Source: C:\Windows\System32\loaddll64.exeFile opened: C:\Windows\system32\ZcjkHmdxs\qpwRIIkrlFzB.dll:Zone.Identifier read attributes | deleteJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeFile opened: C:\Windows\system32\GAjjZRZVj\QFdWkQKkPokX.dll:Zone.Identifier read attributes | deleteJump to behavior
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\svchost.exe TID: 7016Thread sleep time: -30000s >= -30000sJump to behavior
                      Source: C:\Windows\System32\svchost.exe TID: 7020Thread sleep time: -30000s >= -30000sJump to behavior
                      Source: C:\Windows\System32\svchost.exe TID: 1032Thread sleep time: -30000s >= -30000s
                      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                      Source: C:\Windows\System32\regsvr32.exeCode function: EnumServicesStatusExW,2_2_0207DD40
                      Source: C:\Windows\System32\svchost.exeFile opened: PhysicalDrive0Jump to behavior
                      Source: C:\Windows\System32\loaddll64.exeAPI coverage: 9.0 %
                      Source: C:\Windows\System32\regsvr32.exeAPI coverage: 7.1 %
                      Source: C:\Windows\System32\loaddll64.exeProcess information queried: ProcessInformationJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001800427CC _invalid_parameter_noinfo,_invalid_parameter_noinfo,FindFirstFileExW,FindNextFileW,FindClose,FindClose,0_2_00000001800427CC
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001800427CC _invalid_parameter_noinfo,_invalid_parameter_noinfo,FindFirstFileExW,FindNextFileW,FindClose,FindClose,0_2_00000001800427CC
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180042F88 FindFirstFileExW,0_2_0000000180042F88
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180043464 FindFirstFileExW,FindNextFileW,FindClose,FindClose,0_2_0000000180043464
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800427CC _invalid_parameter_noinfo,_invalid_parameter_noinfo,FindFirstFileExW,FindNextFileW,FindClose,FindClose,2_2_00000001800427CC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800427CC _invalid_parameter_noinfo,_invalid_parameter_noinfo,FindFirstFileExW,FindNextFileW,FindClose,FindClose,2_2_00000001800427CC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180042F88 FindFirstFileExW,2_2_0000000180042F88
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180043464 FindFirstFileExW,FindNextFileW,FindClose,FindClose,2_2_0000000180043464
                      Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_02D2C9F0 FindFirstFileW,FindNextFileW,12_2_02D2C9F0
                      Source: C:\Windows\System32\regsvr32.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                      Source: svchost.exe, 00000009.00000002.626913081.000002413A266000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: "@Hyper-V RAWGlobal\BFE_Notify_Event_{f3c219e5-8073-4743-9b26-35724d75b7c3}LMEM
                      Source: svchost.exe, 00000020.00000002.649906463.00000298A2700000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: @Hyper-V RAW
                      Source: svchost.exe, 00000007.00000002.661391909.0000017603802000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: HvHostWdiSystemHostScDeviceEnumWiaRpctrkwksAudioEndpointBuilderhidservdot3svcDsSvcfhsvcWPDBusEnumsvsvcwlansvcEmbeddedModeirmonSensorServicevmicvssNgcSvcsysmainDevQueryBrokerStorSvcvmickvpexchangevmicshutdownvmicguestinterfacevmicvmsessionNcbServiceNetmanDeviceAssociationServiceTabletInputServicePcaSvcIPxlatCfgSvcCscServiceUmRdpService
                      Source: svchost.exe, 00000009.00000002.626869690.000002413A259000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000009.00000002.625682040.0000024134C29000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000C.00000002.661956267.0000000001301000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000C.00000002.661740445.00000000012D3000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000C.00000003.444163231.00000000012E2000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000C.00000003.444203872.0000000001301000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000020.00000002.649749481.00000298A1EEA000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000020.00000002.649489638.00000298A1E70000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                      Source: regsvr32.exe, 00000002.00000003.338636942.0000000000814000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
                      Source: svchost.exe, 00000007.00000002.661773254.0000017603840000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000010.00000002.661987254.000002D0F6641000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000011.00000002.661749128.000001E262629000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018001360C RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_000000018001360C
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180048198 GetProcessHeap,0_2_0000000180048198
                      Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
                      Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
                      Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
                      Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180002F14 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0000000180002F14
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018001360C RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_000000018001360C
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018000386C IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_000000018000386C
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180003A54 SetUnhandledExceptionFilter,0_2_0000000180003A54
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180002F14 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,2_2_0000000180002F14
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001360C RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_000000018001360C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000386C IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_000000018000386C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180003A54 SetUnhandledExceptionFilter,2_2_0000000180003A54

                      HIPS / PFW / Operating System Protection Evasion

                      barindex
                      Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 174.138.33.49 7080Jump to behavior
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\MIpuuSiSZ4.dll",#1Jump to behavior
                      Source: C:\Windows\System32\regsvr32.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformationJump to behavior
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm VolumeInformationJump to behavior
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformationJump to behavior
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformationJump to behavior
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeCode function: EnumSystemLocalesW,0_2_000000018004C150
                      Source: C:\Windows\System32\loaddll64.exeCode function: EnumSystemLocalesW,0_2_000000018004C1D4
                      Source: C:\Windows\System32\loaddll64.exeCode function: EnumSystemLocalesW,0_2_000000018004C2A4
                      Source: C:\Windows\System32\loaddll64.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,0_2_000000018004C364
                      Source: C:\Windows\System32\loaddll64.exeCode function: GetLocaleInfoW,0_2_000000018004C5B0
                      Source: C:\Windows\System32\loaddll64.exeCode function: EnumSystemLocalesW,0_2_0000000180046664
                      Source: C:\Windows\System32\loaddll64.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,0_2_000000018004C708
                      Source: C:\Windows\System32\loaddll64.exeCode function: EnumSystemLocalesW,0_2_0000000180046788
                      Source: C:\Windows\System32\loaddll64.exeCode function: GetLocaleInfoW,0_2_000000018004C7DC
                      Source: C:\Windows\System32\loaddll64.exeCode function: EnumSystemLocalesW,0_2_0000000180046810
                      Source: C:\Windows\System32\loaddll64.exeCode function: EnumSystemLocalesW,GetUserDefaultLCID,ProcessCodePage,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,0_2_000000018004C908
                      Source: C:\Windows\System32\loaddll64.exeCode function: GetLocaleInfoW,0_2_00000001800475F0
                      Source: C:\Windows\System32\loaddll64.exeCode function: TranslateName,TranslateName,GetACP,IsValidCodePage,GetLocaleInfoW,0_2_000000018004BE04
                      Source: C:\Windows\System32\regsvr32.exeCode function: EnumSystemLocalesW,2_2_000000018004C150
                      Source: C:\Windows\System32\regsvr32.exeCode function: EnumSystemLocalesW,2_2_000000018004C1D4
                      Source: C:\Windows\System32\regsvr32.exeCode function: EnumSystemLocalesW,2_2_000000018004C2A4
                      Source: C:\Windows\System32\regsvr32.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,2_2_000000018004C364
                      Source: C:\Windows\System32\regsvr32.exeCode function: GetLocaleInfoW,2_2_000000018004C5B0
                      Source: C:\Windows\System32\regsvr32.exeCode function: EnumSystemLocalesW,2_2_0000000180046664
                      Source: C:\Windows\System32\regsvr32.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,2_2_000000018004C708
                      Source: C:\Windows\System32\regsvr32.exeCode function: EnumSystemLocalesW,2_2_0000000180046788
                      Source: C:\Windows\System32\regsvr32.exeCode function: GetLocaleInfoW,2_2_000000018004C7DC
                      Source: C:\Windows\System32\regsvr32.exeCode function: EnumSystemLocalesW,2_2_0000000180046810
                      Source: C:\Windows\System32\regsvr32.exeCode function: EnumSystemLocalesW,GetUserDefaultLCID,ProcessCodePage,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,2_2_000000018004C908
                      Source: C:\Windows\System32\regsvr32.exeCode function: GetLocaleInfoW,2_2_00000001800475F0
                      Source: C:\Windows\System32\regsvr32.exeCode function: TranslateName,TranslateName,GetACP,IsValidCodePage,GetLocaleInfoW,2_2_000000018004BE04
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180059100 cpuid 0_2_0000000180059100
                      Source: C:\Windows\System32\regsvr32.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001800032C0 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00000001800032C0

                      Lowering of HIPS / PFW / Operating System Security Settings

                      barindex
                      Source: C:\Windows\System32\svchost.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center cval
                      Source: C:\Windows\System32\svchost.exeWMI Queries: IWbemServices::ExecNotificationQuery - ROOT\SecurityCenter : SELECT * FROM __InstanceOperationEvent WHERE TargetInstance ISA 'AntiVirusProduct' OR TargetInstance ISA 'FirewallProduct' OR TargetInstance ISA 'AntiSpywareProduct'
                      Source: C:\Windows\System32\svchost.exeWMI Queries: IWbemServices::CreateInstanceEnum - ROOT\SecurityCenter2 : FirewallProduct
                      Source: C:\Windows\System32\svchost.exeWMI Queries: IWbemServices::CreateInstanceEnum - ROOT\SecurityCenter2 : AntiVirusProduct
                      Source: C:\Windows\System32\svchost.exeWMI Queries: IWbemServices::CreateInstanceEnum - ROOT\SecurityCenter2 : AntiSpywareProduct
                      Source: svchost.exe, 00000014.00000002.662009877.000001B1E9902000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
                      Source: svchost.exe, 00000014.00000002.661820829.000001B1E983D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: $@V%ProgramFiles%\Windows Defender\MsMpeng.exe

                      Stealing of Sensitive Information

                      barindex
                      Source: Yara matchFile source: 0000000C.00000002.661348004.0000000001298000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 2.2.regsvr32.exe.710000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.0.rundll32.exe.22fc4510000.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 12.2.regsvr32.exe.2cb0000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.0.rundll32.exe.22fc4510000.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.0.rundll32.exe.14980010000.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.0.rundll32.exe.22fc4510000.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.rundll32.exe.20000010000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.rundll32.exe.22fc4510000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.14980010000.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.2.rundll32.exe.1a029ee0000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.0.rundll32.exe.22fc4510000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.2.rundll32.exe.1a029ee0000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.0.rundll32.exe.14980010000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.rundll32.exe.22fc4510000.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.rundll32.exe.20000010000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.0.rundll32.exe.14980010000.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.regsvr32.exe.710000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.0.rundll32.exe.14980010000.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.14980010000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 12.2.regsvr32.exe.2cb0000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.loaddll64.exe.15738060000.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.loaddll64.exe.15738060000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000002.364452628.0000015738060000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.345850399.0000000000710000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.351700174.0000020000071000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000C.00000002.662977936.0000000002D11000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000000.348541554.0000022FC4510000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.351638703.0000020000010000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.377797661.0000022FC4510000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.378702987.0000014980010000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.378747717.0000014980071000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.346021007.0000000002061000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000000.348813253.0000022FC4571000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000006.00000002.358968494.000001A029F41000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000000.338942505.0000022FC4510000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.377880147.0000022FC4571000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000C.00000002.662715077.0000000002CB0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000000.352241442.0000014980010000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000000.338998123.0000022FC4571000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.364805521.0000015739971000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000000.345097590.0000014980010000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000000.349632978.0000014980071000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000000.352325443.0000014980071000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000006.00000002.358868561.000001A029EE0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                      Valid Accounts1
                      Windows Management Instrumentation
                      1
                      DLL Side-Loading
                      111
                      Process Injection
                      2
                      Masquerading
                      OS Credential Dumping1
                      System Time Discovery
                      Remote Services1
                      Archive Collected Data
                      Exfiltration Over Other Network Medium1
                      Encrypted Channel
                      Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                      Default AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
                      DLL Side-Loading
                      1
                      Disable or Modify Tools
                      LSASS Memory61
                      Security Software Discovery
                      Remote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth1
                      Non-Standard Port
                      Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                      Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)3
                      Virtualization/Sandbox Evasion
                      Security Account Manager3
                      Virtualization/Sandbox Evasion
                      SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration1
                      Application Layer Protocol
                      Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                      Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)111
                      Process Injection
                      NTDS2
                      Process Discovery
                      Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
                      Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
                      Deobfuscate/Decode Files or Information
                      LSA Secrets1
                      System Service Discovery
                      SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                      Replication Through Removable MediaLaunchdRc.commonRc.common1
                      Hidden Files and Directories
                      Cached Domain Credentials1
                      Remote System Discovery
                      VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                      External Remote ServicesScheduled TaskStartup ItemsStartup Items2
                      Obfuscated Files or Information
                      DCSync2
                      File and Directory Discovery
                      Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                      Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job1
                      Regsvr32
                      Proc Filesystem44
                      System Information Discovery
                      Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
                      Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)1
                      Rundll32
                      /etc/passwd and /etc/shadowSystem Network Connections DiscoverySoftware Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
                      Supply Chain CompromiseAppleScriptAt (Windows)At (Windows)1
                      DLL Side-Loading
                      Network SniffingProcess DiscoveryTaint Shared ContentLocal Data StagingExfiltration Over Unencrypted/Obfuscated Non-C2 ProtocolFile Transfer ProtocolsData Encrypted for Impact
                      Compromise Software Dependencies and Development ToolsWindows Command ShellCronCron1
                      File Deletion
                      Input CapturePermission Groups DiscoveryReplication Through Removable MediaRemote Data StagingExfiltration Over Physical MediumMail ProtocolsService Stop
                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet
                      behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 671702 Sample: MIpuuSiSZ4.dll Startdate: 22/07/2022 Architecture: WINDOWS Score: 100 42 200.18.0.0 UniversidadeFederaldeSantaCatarinaBR Brazil 2->42 44 100.7.0.0 UUNETUS United States 2->44 46 23 other IPs or domains 2->46 54 Snort IDS alert for network traffic 2->54 56 Antivirus detection for URL or domain 2->56 58 Multi AV Scanner detection for submitted file 2->58 60 3 other signatures 2->60 9 loaddll64.exe 3 2->9         started        12 svchost.exe 2->12         started        14 svchost.exe 9 1 2->14         started        17 9 other processes 2->17 signatures3 process4 dnsIp5 64 Hides that the sample has been downloaded from the Internet (zone.identifier) 9->64 19 regsvr32.exe 5 9->19         started        22 cmd.exe 1 9->22         started        24 rundll32.exe 9->24         started        28 3 other processes 9->28 66 Changes security center settings (notifications, updates, antivirus, firewall) 12->66 26 MpCmdRun.exe 12->26         started        48 127.0.0.1 unknown unknown 14->48 50 192.168.2.1 unknown unknown 17->50 signatures6 process7 signatures8 62 Hides that the sample has been downloaded from the Internet (zone.identifier) 19->62 30 regsvr32.exe 19->30         started        34 rundll32.exe 22->34         started        36 WerFault.exe 9 24->36         started        38 conhost.exe 26->38         started        process9 dnsIp10 52 174.138.33.49, 49761, 7080 DIGITALOCEAN-ASNUS United States 30->52 68 System process connects to network (likely due to code injection or exploit) 30->68 40 WerFault.exe 20 9 34->40         started        signatures11 process12

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.