Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
548IrCt4hj

Overview

General Information

Sample Name:548IrCt4hj (renamed file extension from none to dll)
Analysis ID:672062
MD5:7301880b88f87cd3a593f7106d5743cc
SHA1:c8a2b0ae061b612f4d4a4cfc4ee3e1f7079b4240
SHA256:c409ad4f64a1ad925ffbfdb88f57dd9177123364a1875caf6cbb6f5ba3970cc3
Tags:exeOpenCTIBRSandboxed
Infos:

Detection

Emotet
Score:96
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Yara detected Emotet
System process connects to network (likely due to code injection or exploit)
Antivirus detection for URL or domain
Snort IDS alert for network traffic
C2 URLs / IPs found in malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Queries the volume information (name, serial number etc) of a device
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query locales information (e.g. system language)
Deletes files inside the Windows folder
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Creates files inside the system directory
PE file contains sections with non-standard names
Internet Provider seen in connection with other malware
Detected potential crypto function
Found potential string decryption / allocating functions
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Program does not show much activity (idle)
IP address seen in connection with other malware
PE file contains an invalid checksum
Tries to load missing DLLs
Drops PE files to the windows directory (C:\Windows)
Detected TCP or UDP traffic on non-standard ports
Checks if the current process is being debugged
Connects to several IPs in different countries
Registers a DLL
Queries disk information (often used to detect virtual machines)
Found large amount of non-executed APIs
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • loaddll64.exe (PID: 6432 cmdline: loaddll64.exe "C:\Users\user\Desktop\548IrCt4hj.dll" MD5: 4E8A40CAD6CCC047914E3A7830A2D8AA)
    • cmd.exe (PID: 6488 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\548IrCt4hj.dll",#1 MD5: 4E2ACF4F8A396486AB4268C94A6A245F)
      • rundll32.exe (PID: 6516 cmdline: rundll32.exe "C:\Users\user\Desktop\548IrCt4hj.dll",#1 MD5: 73C519F050C20580F8A62C849D49215A)
    • regsvr32.exe (PID: 6504 cmdline: regsvr32.exe /s C:\Users\user\Desktop\548IrCt4hj.dll MD5: D78B75FC68247E8A63ACBA846182740E)
      • regsvr32.exe (PID: 6692 cmdline: C:\Windows\system32\regsvr32.exe "C:\Windows\system32\ZPLPsNKH\eFntQ.dll" MD5: D78B75FC68247E8A63ACBA846182740E)
    • rundll32.exe (PID: 6536 cmdline: rundll32.exe C:\Users\user\Desktop\548IrCt4hj.dll,DllCanUnloadNow MD5: 73C519F050C20580F8A62C849D49215A)
    • rundll32.exe (PID: 6704 cmdline: rundll32.exe C:\Users\user\Desktop\548IrCt4hj.dll,DllGetClassObject MD5: 73C519F050C20580F8A62C849D49215A)
    • rundll32.exe (PID: 6776 cmdline: rundll32.exe C:\Users\user\Desktop\548IrCt4hj.dll,DllRegisterServer MD5: 73C519F050C20580F8A62C849D49215A)
  • svchost.exe (PID: 7076 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 5072 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 3972 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 6700 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 6636 cmdline: C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 6092 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • cleanup
{"C2 list": ["139.59.80.108:8080", "83.229.80.93:8080", "190.107.19.179:443", "202.134.4.210:7080", "165.232.185.110:8080", "104.244.79.94:443", "198.199.70.22:8080", "37.44.244.177:8080", "195.77.239.39:8080", "103.85.95.4:8080", "85.214.67.203:8080", "103.41.204.169:8080", "78.47.204.80:443", "190.145.8.4:443", "139.196.72.155:8080", "87.106.97.83:7080", "202.29.239.162:443", "202.28.34.99:8080", "54.37.106.167:8080", "103.224.241.74:8080", "103.254.12.236:7080", "188.165.79.151:443", "43.129.209.178:443", "37.187.114.15:8080", "5.253.30.17:7080", "54.37.228.122:443", "157.230.99.206:8080", "103.56.149.105:8080", "157.245.111.0:8080", "128.199.242.164:8080", "104.248.225.227:8080", "88.217.172.165:8080", "175.126.176.79:8080", "85.25.120.45:8080", "178.62.112.199:8080", "178.238.225.252:8080", "93.104.209.107:8080", "210.57.209.142:8080", "128.199.217.206:443", "103.71.99.57:8080", "64.227.55.231:8080"], "Public Key": ["RUNTMSAAAAD0LxqDNhonUYwk8sqo7IWuUllRdUiUBnACc6romsQoe1YJD7wIe4AheqYofpZFucPDXCZ0z9i+ooUffqeoLZU0EZiWsQAQAIg=", "RUNLMSAAAADYNZPXY4tQxd/N4Wn5sTYAm5tUOxY2ol1ELrI4MNhHNi640vSLasjYTHpFRBoG+o84vtr7AJachCzOHjaAJFCW45gAsQAmAIg="]}
SourceRuleDescriptionAuthorStrings
00000007.00000002.424123479.000001E034440000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
    0000000A.00000002.940693332.0000000000C20000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
      00000005.00000002.427012616.0000000001120000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
        00000006.00000002.422757747.000001F33EB00000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
          0000000A.00000002.940812969.00000000024B1000.00000020.00001000.00020000.00000000.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
            Click to see the 4 entries
            SourceRuleDescriptionAuthorStrings
            7.2.rundll32.exe.1e034440000.0.raw.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
              6.2.rundll32.exe.1f33eb00000.0.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
                5.2.regsvr32.exe.1120000.0.raw.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
                  7.2.rundll32.exe.1e034440000.0.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
                    10.2.regsvr32.exe.c20000.0.raw.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
                      Click to see the 3 entries
                      No Sigma rule has matched
                      Timestamp:192.168.2.5174.138.33.494976870802404316 07/23/22-04:56:42.473067
                      SID:2404316
                      Source Port:49768
                      Destination Port:7080
                      Protocol:TCP
                      Classtype:A Network Trojan was detected

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection

                      barindex
                      Source: 548IrCt4hj.dllVirustotal: Detection: 70%Perma Link
                      Source: 548IrCt4hj.dllMetadefender: Detection: 45%Perma Link
                      Source: 548IrCt4hj.dllReversingLabs: Detection: 88%
                      Source: https://174.138.33.49/ZAvira URL Cloud: Label: malware
                      Source: https://174.138.33.49:7080/FAvira URL Cloud: Label: malware
                      Source: https://174.138.33.49:7080/OnlyAvira URL Cloud: Label: malware
                      Source: https://174.138.33.49:7080/rAvira URL Cloud: Label: malware
                      Source: https://174.138.33.49:7080/pAvira URL Cloud: Label: malware
                      Source: 0000000A.00000002.940180760.0000000000AEB000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: Emotet {"C2 list": ["139.59.80.108:8080", "83.229.80.93:8080", "190.107.19.179:443", "202.134.4.210:7080", "165.232.185.110:8080", "104.244.79.94:443", "198.199.70.22:8080", "37.44.244.177:8080", "195.77.239.39:8080", "103.85.95.4:8080", "85.214.67.203:8080", "103.41.204.169:8080", "78.47.204.80:443", "190.145.8.4:443", "139.196.72.155:8080", "87.106.97.83:7080", "202.29.239.162:443", "202.28.34.99:8080", "54.37.106.167:8080", "103.224.241.74:8080", "103.254.12.236:7080", "188.165.79.151:443", "43.129.209.178:443", "37.187.114.15:8080", "5.253.30.17:7080", "54.37.228.122:443", "157.230.99.206:8080", "103.56.149.105:8080", "157.245.111.0:8080", "128.199.242.164:8080", "104.248.225.227:8080", "88.217.172.165:8080", "175.126.176.79:8080", "85.25.120.45:8080", "178.62.112.199:8080", "178.238.225.252:8080", "93.104.209.107:8080", "210.57.209.142:8080", "128.199.217.206:443", "103.71.99.57:8080", "64.227.55.231:8080"], "Public Key": ["RUNTMSAAAAD0LxqDNhonUYwk8sqo7IWuUllRdUiUBnACc6romsQoe1YJD7wIe4AheqYofpZFucPDXCZ0z9i+ooUffqeoLZU0EZiWsQAQAIg=", "RUNLMSAAAADYNZPXY4tQxd/N4Wn5sTYAm5tUOxY2ol1ELrI4MNhHNi640vSLasjYTHpFRBoG+o84vtr7AJachCzOHjaAJFCW45gAsQAmAIg="]}
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_000000018006680C FindFirstFileExW,FindNextFileW,FindClose,FindClose,
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800671B0 FindFirstFileExW,
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800677BC FindFirstFileExW,FindNextFileW,FindClose,FindClose,
                      Source: C:\Windows\System32\regsvr32.exeCode function: 10_2_024CC9F0 FindFirstFileW,FindNextFileW,

                      Networking

                      barindex
                      Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 174.138.33.49 7080
                      Source: TrafficSnort IDS: 2404316 ET CNC Feodo Tracker Reported CnC Server TCP group 9 192.168.2.5:49768 -> 174.138.33.49:7080
                      Source: Malware configuration extractorIPs: 139.59.80.108:8080
                      Source: Malware configuration extractorIPs: 83.229.80.93:8080
                      Source: Malware configuration extractorIPs: 190.107.19.179:443
                      Source: Malware configuration extractorIPs: 202.134.4.210:7080
                      Source: Malware configuration extractorIPs: 165.232.185.110:8080
                      Source: Malware configuration extractorIPs: 104.244.79.94:443
                      Source: Malware configuration extractorIPs: 198.199.70.22:8080
                      Source: Malware configuration extractorIPs: 37.44.244.177:8080
                      Source: Malware configuration extractorIPs: 195.77.239.39:8080
                      Source: Malware configuration extractorIPs: 103.85.95.4:8080
                      Source: Malware configuration extractorIPs: 85.214.67.203:8080
                      Source: Malware configuration extractorIPs: 103.41.204.169:8080
                      Source: Malware configuration extractorIPs: 78.47.204.80:443
                      Source: Malware configuration extractorIPs: 190.145.8.4:443
                      Source: Malware configuration extractorIPs: 139.196.72.155:8080
                      Source: Malware configuration extractorIPs: 87.106.97.83:7080
                      Source: Malware configuration extractorIPs: 202.29.239.162:443
                      Source: Malware configuration extractorIPs: 202.28.34.99:8080
                      Source: Malware configuration extractorIPs: 54.37.106.167:8080
                      Source: Malware configuration extractorIPs: 103.224.241.74:8080
                      Source: Malware configuration extractorIPs: 103.254.12.236:7080
                      Source: Malware configuration extractorIPs: 188.165.79.151:443
                      Source: Malware configuration extractorIPs: 43.129.209.178:443
                      Source: Malware configuration extractorIPs: 37.187.114.15:8080
                      Source: Malware configuration extractorIPs: 5.253.30.17:7080
                      Source: Malware configuration extractorIPs: 54.37.228.122:443
                      Source: Malware configuration extractorIPs: 157.230.99.206:8080
                      Source: Malware configuration extractorIPs: 103.56.149.105:8080
                      Source: Malware configuration extractorIPs: 157.245.111.0:8080
                      Source: Malware configuration extractorIPs: 128.199.242.164:8080
                      Source: Malware configuration extractorIPs: 104.248.225.227:8080
                      Source: Malware configuration extractorIPs: 88.217.172.165:8080
                      Source: Malware configuration extractorIPs: 175.126.176.79:8080
                      Source: Malware configuration extractorIPs: 85.25.120.45:8080
                      Source: Malware configuration extractorIPs: 178.62.112.199:8080
                      Source: Malware configuration extractorIPs: 178.238.225.252:8080
                      Source: Malware configuration extractorIPs: 93.104.209.107:8080
                      Source: Malware configuration extractorIPs: 210.57.209.142:8080
                      Source: Malware configuration extractorIPs: 128.199.217.206:443
                      Source: Malware configuration extractorIPs: 103.71.99.57:8080
                      Source: Malware configuration extractorIPs: 64.227.55.231:8080
                      Source: Joe Sandbox ViewASN Name: DIGITALOCEAN-ASNUS DIGITALOCEAN-ASNUS
                      Source: Joe Sandbox ViewASN Name: DIGITALOCEAN-ASNUS DIGITALOCEAN-ASNUS
                      Source: Joe Sandbox ViewIP Address: 157.230.99.206 157.230.99.206
                      Source: Joe Sandbox ViewIP Address: 157.245.111.0 157.245.111.0
                      Source: global trafficTCP traffic: 192.168.2.5:49768 -> 174.138.33.49:7080
                      Source: unknownNetwork traffic detected: IP country count 17
                      Source: unknownTCP traffic detected without corresponding DNS query: 174.138.33.49
                      Source: unknownTCP traffic detected without corresponding DNS query: 174.138.33.49
                      Source: unknownTCP traffic detected without corresponding DNS query: 174.138.33.49
                      Source: unknownTCP traffic detected without corresponding DNS query: 174.138.33.49
                      Source: unknownTCP traffic detected without corresponding DNS query: 174.138.33.49
                      Source: unknownTCP traffic detected without corresponding DNS query: 174.138.33.49
                      Source: unknownTCP traffic detected without corresponding DNS query: 174.138.33.49
                      Source: unknownTCP traffic detected without corresponding DNS query: 174.138.33.49
                      Source: unknownTCP traffic detected without corresponding DNS query: 174.138.33.49
                      Source: unknownTCP traffic detected without corresponding DNS query: 174.138.33.49
                      Source: unknownTCP traffic detected without corresponding DNS query: 174.138.33.49
                      Source: unknownTCP traffic detected without corresponding DNS query: 174.138.33.49
                      Source: unknownTCP traffic detected without corresponding DNS query: 174.138.33.49
                      Source: svchost.exe, 00000019.00000003.551262839.0000015F2D570000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Try it free for 30 days, no strings attached\r\n\r\nLike us on Facebook: http://www.facebook.com/spotify \r\nFollow us on Twitter: http://twitter.com/spotify","ProductTitle":"Spotify - Music and Podcasts","SearchTitles":[{"SearchTitleString":"Spotify","SearchTitleType":"SearchHint"},{"SearchTitleString":"Music","SearchTitleType":"SearchHint"},{"SearchTitleString":"music apps","SearchTitleType":"SearchHint"},{"SearchTitleString":"free music","SearchTitleType":"SearchHint"},{"SearchTitleString":"podcasts","SearchTitleType":"SearchHint"},{"SearchTitleString":"streaming","SearchTitleType":"SearchHint"},{"SearchTitleString":"soundcloud","SearchTitleType":"SearchHint"}],"Language":"en-us","Markets":["US","DZ","AR","AU","AT","BH","BD","BE","BR","BG","CA","CL","CN","CO","CR","HR","CY","CZ","DK","EG","EE","FI","FR","DE","GR","GT","HK","HU","IS","IN","ID","IQ","IE","IL","IT","JP","JO","KZ","KE","KW","LV","LB","LI","LT","LU","MY","MT","MR","MX","MA","NL","NZ","NG","NO","OM","PK","PE","PH","PL","PT","QA","RO","RU","SA","RS","SG","SK","SI","ZA","KR","ES","SE","CH","TW","TH","TT","TN","TR","UA","AE","GB","VN","YE","LY","LK","UY","VE","AF","AX","AL","AS","AO","AI","AQ","AG","AM","AW","BO","BQ","BA","BW","BV","IO","BN","BF","BI","KH","CM","CV","KY","CF","TD","TL","DJ","DM","DO","EC","SV","GQ","ER","ET","FK","FO","FJ","GF","PF","TF","GA","GM","GE","GH","GI","GL","GD","GP","GU","GG","GN","GW","GY","HT","HM","HN","AZ","BS","BB","BY","BZ","BJ","BM","BT","KM","CG","CD","CK","CX","CC","CI","CW","JM","SJ","JE","KI","KG","LA","LS","LR","MO","MK","MG","MW","IM","MH","MQ","MU","YT","FM","MD","MN","MS","MZ","MM","NA","NR","NP","MV","ML","NC","NI","NE","NU","NF","PW","PS","PA","PG","PY","RE","RW","BL","MF","WS","ST","SN","MP","PN","SX","SB","SO","SC","SL","GS","SH","KN","LC","PM","VC","TJ","TZ","TG","TK","TO","TM","TC","TV","UM","UG", equals www.facebook.com (Facebook)
                      Source: svchost.exe, 00000019.00000003.551262839.0000015F2D570000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Try it free for 30 days, no strings attached\r\n\r\nLike us on Facebook: http://www.facebook.com/spotify \r\nFollow us on Twitter: http://twitter.com/spotify","ProductTitle":"Spotify - Music and Podcasts","SearchTitles":[{"SearchTitleString":"Spotify","SearchTitleType":"SearchHint"},{"SearchTitleString":"Music","SearchTitleType":"SearchHint"},{"SearchTitleString":"music apps","SearchTitleType":"SearchHint"},{"SearchTitleString":"free music","SearchTitleType":"SearchHint"},{"SearchTitleString":"podcasts","SearchTitleType":"SearchHint"},{"SearchTitleString":"streaming","SearchTitleType":"SearchHint"},{"SearchTitleString":"soundcloud","SearchTitleType":"SearchHint"}],"Language":"en-us","Markets":["US","DZ","AR","AU","AT","BH","BD","BE","BR","BG","CA","CL","CN","CO","CR","HR","CY","CZ","DK","EG","EE","FI","FR","DE","GR","GT","HK","HU","IS","IN","ID","IQ","IE","IL","IT","JP","JO","KZ","KE","KW","LV","LB","LI","LT","LU","MY","MT","MR","MX","MA","NL","NZ","NG","NO","OM","PK","PE","PH","PL","PT","QA","RO","RU","SA","RS","SG","SK","SI","ZA","KR","ES","SE","CH","TW","TH","TT","TN","TR","UA","AE","GB","VN","YE","LY","LK","UY","VE","AF","AX","AL","AS","AO","AI","AQ","AG","AM","AW","BO","BQ","BA","BW","BV","IO","BN","BF","BI","KH","CM","CV","KY","CF","TD","TL","DJ","DM","DO","EC","SV","GQ","ER","ET","FK","FO","FJ","GF","PF","TF","GA","GM","GE","GH","GI","GL","GD","GP","GU","GG","GN","GW","GY","HT","HM","HN","AZ","BS","BB","BY","BZ","BJ","BM","BT","KM","CG","CD","CK","CX","CC","CI","CW","JM","SJ","JE","KI","KG","LA","LS","LR","MO","MK","MG","MW","IM","MH","MQ","MU","YT","FM","MD","MN","MS","MZ","MM","NA","NR","NP","MV","ML","NC","NI","NE","NU","NF","PW","PS","PA","PG","PY","RE","RW","BL","MF","WS","ST","SN","MP","PN","SX","SB","SO","SC","SL","GS","SH","KN","LC","PM","VC","TJ","TZ","TG","TK","TO","TM","TC","TV","UM","UG", equals www.twitter.com (Twitter)
                      Source: svchost.exe, 00000019.00000003.551262839.0000015F2D570000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000019.00000003.550189528.0000015F2D582000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Try it free for 30 days, no strings attached\r\n\r\nLike us on Facebook: http://www.facebook.com/spotify \r\nFollow us on Twitter: http://twitter.com/spotify","ProductTitle":"Spotify - Music and Podcasts","SearchTitles":[{"SearchTitleString":"Spotify","SearchTitleType":"SearchHint"},{"SearchTitleString":"Music","SearchTitleType":"SearchHint"},{"SearchTitleString":"music apps","SearchTitleType":"SearchHint"},{"SearchTitleString":"free music","SearchTitleType":"SearchHint"},{"SearchTitleString":"podcasts","SearchTitleType":"SearchHint"},{"SearchTitleString":"streaming","SearchTitleType":"SearchHint"},{"SearchTitleString":"soundcloud","SearchTitleType":"SearchHint"}],"Language":"en-us","Markets":["US","DZ","AR","AU","AT","BH","BD","BE","BR","BG","CA","CL","CN","CO","CR","HR","CY","CZ","DK","EG","EE","FI","FR","DE","GR","GT","HK","HU","IS","IN","ID","IQ","IE","IL","IT","JP","JO","KZ","KE","KW","LV","LB","LI","LT","LU","MY","MT","MR","MX","MA","NL","NZ","NG","NO","OM","PK","PE","PH","PL","PT","QA","RO","RU","SA","RS","SG","SK","SI","ZA","KR","ES","SE","CH","TW","TH","TT","TN","TR","UA","AE","GB","VN","YE","LY","LK","UY","VE","AF","AX","AL","AS","AO","AI","AQ","AG","AM","AW","BO","BQ","BA","BW","BV","IO","BN","BF","BI","KH","CM","CV","KY","CF","TD","TL","DJ","DM","DO","EC","SV","GQ","ER","ET","FK","FO","FJ","GF","PF","TF","GA","GM","GE","GH","GI","GL","GD","GP","GU","GG","GN","GW","GY","HT","HM","HN","AZ","BS","BB","BY","BZ","BJ","BM","BT","KM","CG","CD","CK","CX","CC","CI","CW","JM","SJ","JE","KI","KG","LA","LS","LR","MO","MK","MG","MW","IM","MH","MQ","MU","YT","FM","MD","MN","MS","MZ","MM","NA","NR","NP","MV","ML","NC","NI","NE","NU","NF","PW","PS","PA","PG","PY","RE","RW","BL","MF","WS","ST","SN","MP","PN","SX","SB","SO","SC","SL","GS","SH","KN","LC","PM","VC","TJ","TZ","TG","TK","TO","TM","TC","TV","UM","UG","VI","VG","WF","EH","ZM","ZW","UZ","VU","SR","SZ","AD","MC","SM","ME","VA","NEUTRAL"]}],"MarketProperties":[{"RelatedProducts":[],"Markets":["US"]}],"ProductASchema":"Product;3","ProductBSchema":"ProductUnifiedApp;3","ProductId":"9NCBCSZSJRSB","Properties":{"PackageFamilyName":"SpotifyAB.SpotifyMusic_zpdnekdrzrea0","PackageIdentityName":"SpotifyAB.SpotifyMusic","PublisherCertificateName":"CN=453637B3-4E12-4CDF-B0D3-2A3C863BF6EF","XboxCrossGenSetId":null,"XboxConsoleGenOptimized":null,"XboxConsoleGenCompatible":null},"AlternateIds":[{"IdType":"LegacyWindowsStoreProductId","Value":"ceac5d3f-8a4f-40e1-9a67-76d9108c7cb5"},{"IdType":"LegacyWindowsPhoneProductId","Value":"caac1b9d-621b-4f96-b143-e10e1397740a"},{"IdType":"XboxTitleId","Value":"1681279293"}],"IngestionSource":"DCE","IsMicrosoftProduct":false,"PreferredSkuId":"0010","ProductType":"Application","ValidationData":{"PassedValidation":false,"RevisionId":"2022-07-22T07:55:01.8237416Z||.||b7e2ac48-308b-4ab0-ad70-c01dd95863e0||1152921505695074449||Null||fullrelease","ValidationResultUri":""},"MerchandizingTags":[],"PartD":"","ProductFamily":"Apps","ProductKind":"Application","DisplaySkuAvailab
                      Source: svchost.exe, 00000019.00000003.551262839.0000015F2D570000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000019.00000003.550189528.0000015F2D582000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Try it free for 30 days, no strings attached\r\n\r\nLike us on Facebook: http://www.facebook.com/spotify \r\nFollow us on Twitter: http://twitter.com/spotify","ProductTitle":"Spotify - Music and Podcasts","SearchTitles":[{"SearchTitleString":"Spotify","SearchTitleType":"SearchHint"},{"SearchTitleString":"Music","SearchTitleType":"SearchHint"},{"SearchTitleString":"music apps","SearchTitleType":"SearchHint"},{"SearchTitleString":"free music","SearchTitleType":"SearchHint"},{"SearchTitleString":"podcasts","SearchTitleType":"SearchHint"},{"SearchTitleString":"streaming","SearchTitleType":"SearchHint"},{"SearchTitleString":"soundcloud","SearchTitleType":"SearchHint"}],"Language":"en-us","Markets":["US","DZ","AR","AU","AT","BH","BD","BE","BR","BG","CA","CL","CN","CO","CR","HR","CY","CZ","DK","EG","EE","FI","FR","DE","GR","GT","HK","HU","IS","IN","ID","IQ","IE","IL","IT","JP","JO","KZ","KE","KW","LV","LB","LI","LT","LU","MY","MT","MR","MX","MA","NL","NZ","NG","NO","OM","PK","PE","PH","PL","PT","QA","RO","RU","SA","RS","SG","SK","SI","ZA","KR","ES","SE","CH","TW","TH","TT","TN","TR","UA","AE","GB","VN","YE","LY","LK","UY","VE","AF","AX","AL","AS","AO","AI","AQ","AG","AM","AW","BO","BQ","BA","BW","BV","IO","BN","BF","BI","KH","CM","CV","KY","CF","TD","TL","DJ","DM","DO","EC","SV","GQ","ER","ET","FK","FO","FJ","GF","PF","TF","GA","GM","GE","GH","GI","GL","GD","GP","GU","GG","GN","GW","GY","HT","HM","HN","AZ","BS","BB","BY","BZ","BJ","BM","BT","KM","CG","CD","CK","CX","CC","CI","CW","JM","SJ","JE","KI","KG","LA","LS","LR","MO","MK","MG","MW","IM","MH","MQ","MU","YT","FM","MD","MN","MS","MZ","MM","NA","NR","NP","MV","ML","NC","NI","NE","NU","NF","PW","PS","PA","PG","PY","RE","RW","BL","MF","WS","ST","SN","MP","PN","SX","SB","SO","SC","SL","GS","SH","KN","LC","PM","VC","TJ","TZ","TG","TK","TO","TM","TC","TV","UM","UG","VI","VG","WF","EH","ZM","ZW","UZ","VU","SR","SZ","AD","MC","SM","ME","VA","NEUTRAL"]}],"MarketProperties":[{"RelatedProducts":[],"Markets":["US"]}],"ProductASchema":"Product;3","ProductBSchema":"ProductUnifiedApp;3","ProductId":"9NCBCSZSJRSB","Properties":{"PackageFamilyName":"SpotifyAB.SpotifyMusic_zpdnekdrzrea0","PackageIdentityName":"SpotifyAB.SpotifyMusic","PublisherCertificateName":"CN=453637B3-4E12-4CDF-B0D3-2A3C863BF6EF","XboxCrossGenSetId":null,"XboxConsoleGenOptimized":null,"XboxConsoleGenCompatible":null},"AlternateIds":[{"IdType":"LegacyWindowsStoreProductId","Value":"ceac5d3f-8a4f-40e1-9a67-76d9108c7cb5"},{"IdType":"LegacyWindowsPhoneProductId","Value":"caac1b9d-621b-4f96-b143-e10e1397740a"},{"IdType":"XboxTitleId","Value":"1681279293"}],"IngestionSource":"DCE","IsMicrosoftProduct":false,"PreferredSkuId":"0010","ProductType":"Application","ValidationData":{"PassedValidation":false,"RevisionId":"2022-07-22T07:55:01.8237416Z||.||b7e2ac48-308b-4ab0-ad70-c01dd95863e0||1152921505695074449||Null||fullrelease","ValidationResultUri":""},"MerchandizingTags":[],"PartD":"","ProductFamily":"Apps","ProductKind":"Application","DisplaySkuAvailab
                      Source: regsvr32.exe, 0000000A.00000002.940537855.0000000000B80000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000A.00000003.480115635.0000000000B80000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000013.00000002.836628963.0000018894A9D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000019.00000002.595043128.0000015F2CCE9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
                      Source: svchost.exe, 00000013.00000002.836139820.00000188934BB000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000013.00000003.835512145.00000188934BB000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000019.00000002.595043128.0000015F2CCE9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.ver)
                      Source: regsvr32.exe, 0000000A.00000003.480159823.0000000000BA9000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000A.00000002.940603447.0000000000BA9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cabV&V
                      Source: regsvr32.exe, 0000000A.00000003.480288771.0000000000B4B000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000A.00000003.480216789.0000000000B21000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000A.00000002.940449077.0000000000B4D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/enf
                      Source: svchost.exe, 00000019.00000003.568619378.0000015F2D586000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000019.00000003.568197795.0000015F2D598000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://help.disneyplus.com.
                      Source: regsvr32.exe, 0000000A.00000002.940330437.0000000000B21000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000A.00000003.480216789.0000000000B21000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://174.138.33.49/
                      Source: regsvr32.exe, 0000000A.00000002.940330437.0000000000B21000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000A.00000003.480216789.0000000000B21000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://174.138.33.49/Z
                      Source: regsvr32.exe, 0000000A.00000002.940330437.0000000000B21000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000A.00000003.480216789.0000000000B21000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://174.138.33.49:7080/
                      Source: regsvr32.exe, 0000000A.00000002.940330437.0000000000B21000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000A.00000003.480216789.0000000000B21000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://174.138.33.49:7080/F
                      Source: regsvr32.exe, 0000000A.00000002.940330437.0000000000B21000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000A.00000003.480216789.0000000000B21000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://174.138.33.49:7080/Only
                      Source: regsvr32.exe, 0000000A.00000002.940330437.0000000000B21000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000A.00000003.480216789.0000000000B21000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://174.138.33.49:7080/p
                      Source: regsvr32.exe, 0000000A.00000002.940330437.0000000000B21000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000A.00000003.480216789.0000000000B21000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://174.138.33.49:7080/r
                      Source: svchost.exe, 00000019.00000003.568619378.0000015F2D586000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000019.00000003.568197795.0000015F2D598000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://disneyplus.com/legal.
                      Source: svchost.exe, 00000019.00000003.563618298.0000015F2D599000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000019.00000003.563853374.0000015F2D5A9000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000019.00000003.563634572.0000015F2D5A9000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000019.00000003.563884423.0000015F2DA19000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000019.00000003.563734310.0000015F2D587000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000019.00000003.563691195.0000015F2DA03000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000019.00000003.563660153.0000015F2DA02000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://support.hotspotshield.com/
                      Source: svchost.exe, 00000019.00000003.568619378.0000015F2D586000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000019.00000003.568197795.0000015F2D598000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.disneyplus.com/legal/privacy-policy
                      Source: svchost.exe, 00000019.00000003.568619378.0000015F2D586000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000019.00000003.568197795.0000015F2D598000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.disneyplus.com/legal/your-california-privacy-rights
                      Source: svchost.exe, 00000019.00000003.563618298.0000015F2D599000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000019.00000003.563853374.0000015F2D5A9000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000019.00000003.563634572.0000015F2D5A9000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000019.00000003.563884423.0000015F2DA19000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000019.00000003.563734310.0000015F2D587000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000019.00000003.563691195.0000015F2DA03000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000019.00000003.563660153.0000015F2DA02000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.hotspotshield.com/terms/
                      Source: svchost.exe, 00000019.00000003.563618298.0000015F2D599000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000019.00000003.563853374.0000015F2D5A9000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000019.00000003.563634572.0000015F2D5A9000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000019.00000003.563884423.0000015F2DA19000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000019.00000003.563734310.0000015F2D587000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000019.00000003.563691195.0000015F2DA03000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000019.00000003.563660153.0000015F2DA02000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.pango.co/privacy
                      Source: svchost.exe, 00000019.00000003.572982528.0000015F2D59A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000019.00000003.572906706.0000015F2D5B0000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000019.00000003.572968023.0000015F2D589000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000019.00000003.573008527.0000015F2DA02000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000019.00000003.572949834.0000015F2D5B0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.tiktok.com/legal/report/feedback

                      E-Banking Fraud

                      barindex
                      Source: Yara matchFile source: 0000000A.00000002.940180760.0000000000AEB000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 7.2.rundll32.exe.1e034440000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.2.rundll32.exe.1f33eb00000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.regsvr32.exe.1120000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 7.2.rundll32.exe.1e034440000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.regsvr32.exe.c20000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.regsvr32.exe.c20000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.2.rundll32.exe.1f33eb00000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.regsvr32.exe.1120000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000007.00000002.424123479.000001E034440000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.940693332.0000000000C20000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.427012616.0000000001120000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000006.00000002.422757747.000001F33EB00000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.940812969.00000000024B1000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000006.00000002.422895400.000001F33EC51000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000007.00000002.424307117.000001E034471000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.427064425.0000000001151000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: C:\Windows\System32\regsvr32.exeFile deleted: C:\Windows\System32\ZPLPsNKH\eFntQ.dll:Zone.IdentifierJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeFile created: C:\Windows\system32\ZPLPsNKH\Jump to behavior
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0000000180003026
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0000000180001D57
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800640D0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0000000180034174
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800019B5
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800013F7
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800011D6
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800018B6
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_000000018003442C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0000000180034574
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_000000018000427D
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800346BC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_000000018003C6D4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800013F7
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800013F7
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0000000180034808
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800039EA
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0000000180002C61
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800349B4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0000000180060A88
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_000000018004CAEC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0000000180034AFC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0000000180060A88
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0000000180002F5E
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0000000180001041
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800026CB
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0000000180034D8C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800034EF
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0000000180060F1C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0000000180034F34
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0000000180002C11
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0000000180002FCC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800011DB
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0000000180003C83
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_000000018003507C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_000000018003D0B0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_000000018000285B
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0000000180003C33
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800351C4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0000000180002F72
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_000000018003530C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800019E2
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800021C6
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0000000180001DE3
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800394B0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800354B4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0000000180002103
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_000000018004D588
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0000000180071584
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_000000018003D5C4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800029E1
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0000000180002900
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0000000180039710
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800016AE
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800029AA
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0000000180002BE4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_000000018000321A
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0000000180001AC3
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_000000018000322E
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0000000180001302
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0000000180045B0C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0000000180001721
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800019D8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0000000180002E00
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_000000018003DD48
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0000000180035D6C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0000000180001721
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0000000180003D8C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0000000180002095
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0000000180035EFC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0000000180002AA9
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800025BD
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0000000180001F87
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_000000018005E068
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0000000180036074
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_000000018003A148
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800361BC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_000000018003E218
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0000000180036304
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_000000018003A3B0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800034F9
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0000000180003634
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800464AC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0000000180003459
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_000000018006A5B0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800365F4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_000000018003A618
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800042AF
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_000000018006680C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0000000180002CDE
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0000000180001721
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0000000180002F7C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0000000180046920
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_000000018004E924
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0000000180002D1F
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0000000180003CB0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0000000180036B84
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0000000180036CCC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0000000180003206
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0000000180036E14
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0000000180046E30
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0000000180003297
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0000000180036F5C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0000000180002DE2
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0000000180004142
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800330BC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0000000180037104
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0000000180073160
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800671B0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800631C4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0000000180033204
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_000000018003724C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0000000180001023
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_000000018003334C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0000000180037394
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0000000180033498
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800374DC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_000000018003B510
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0000000180003477
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0000000180033654
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0000000180037684
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0000000180002829
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_000000018003379C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800637A4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0000000180001D2F
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0000000180002C93
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800338E4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0000000180037914
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0000000180004200
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800043DB
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0000000180001280
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800012DF
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_000000018000269E
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0000000180033BDC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800019A6
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0000000180033D24
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0000000180033E6C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800013F7
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0000000180002586
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0000000180033FB8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00E60000
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0116A804
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0116C8C0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0116EB08
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_01168B3C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0115CCC8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_01167414
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0117B6BC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_01155B18
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_01161B88
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0116BD64
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_01177E28
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_01166110
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0116A130
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_011541A8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_01174020
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_01154078
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0116406C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0117A088
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0117A304
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_01174330
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0117632C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_01164368
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0115E254
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_01176520
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_01160578
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_01164594
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_01166594
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0116C5AC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_011525D8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_01166418
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0116A408
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0115C458
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0116E4A8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_011784DC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_011624E4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_01152708
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0116C720
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0116E7A4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_011627A4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_011707D0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_01172638
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_01156698
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_01160680
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_011646B4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_01174918
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0117093C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_01154948
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_01166978
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_01178990
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_011629BC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0116C9F0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_01152820
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0116484C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_01154848
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_01178B28
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_01176B40
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_01160B60
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0115CB6C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0116ABD8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_01170AC4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_01172AFC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_01152AE4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0115ED84
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_01170DBC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_01152DC0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_01172C48
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_01154C64
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_01160C68
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_01170C68
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_01158CE0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0116ACEC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_01172F3C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_01176F3C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_01158F5C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_01162F94
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0116EFAC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0115EFCC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0115AFE4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_01172E04
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0116EE5C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_01174EF4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_01178EE8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_01167144
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_01155198
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0115B1A8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_011531F0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_01151014
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0116B028
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_011530BC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_011590D4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0115B0F8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0117B0EC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_01173304
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0115D300
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_01151368
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_011593AC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_011713FC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0115B3E4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_011693E0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_01163210
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0116F238
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0116D254
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0115F290
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0115B2BC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_011712FC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_011572E0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0117155C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0116B558
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0117B570
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0115F580
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0117344C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_01155484
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_011614A0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0116D4D0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_01163724
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_01169720
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0116F764
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_01163610
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0116F61C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0116D620
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0116762C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0117369C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0115B698
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_011776A4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_011716A8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_011536E0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0115D92C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0117796C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0116D9C4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_011699F4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0115F850
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_01173894
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_011678C4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_01167B24
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0115DB74
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_01157BB4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_01163BB4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_01179A40
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_01153A9C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0115FAD0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_01171AE0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_01163D1C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0115BD24
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0117BD20
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_01171D2C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_01169D5C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_01167DB0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_01179DA8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_01173DD4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0115BC08
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_01167C30
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_01165C50
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0116FC70
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_01157CAC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_01153CE8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_01153F40
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0115DFCC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_01163E18
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_01175E30
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0115FE58
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0117BE90
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_01169EC0
                      Source: C:\Windows\System32\rundll32.exeCode function: 6_2_000001F33EAF0000
                      Source: C:\Windows\System32\rundll32.exeCode function: 7_2_000001E034430000
                      Source: C:\Windows\System32\regsvr32.exeCode function: 10_2_00C10000
                      Source: C:\Windows\System32\regsvr32.exeCode function: 10_2_024CA804
                      Source: C:\Windows\System32\regsvr32.exeCode function: 10_2_024D7E28
                      Source: C:\Windows\System32\regsvr32.exeCode function: 10_2_024CC8C0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 10_2_024D3894
                      Source: C:\Windows\System32\regsvr32.exeCode function: 10_2_024B7CAC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 10_2_024DB6BC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 10_2_024B1368
                      Source: C:\Windows\System32\regsvr32.exeCode function: 10_2_024C4368
                      Source: C:\Windows\System32\regsvr32.exeCode function: 10_2_024CBD64
                      Source: C:\Windows\System32\regsvr32.exeCode function: 10_2_024DA304
                      Source: C:\Windows\System32\regsvr32.exeCode function: 10_2_024B5B18
                      Source: C:\Windows\System32\regsvr32.exeCode function: 10_2_024C8B3C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 10_2_024D2F3C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 10_2_024C7FEC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 10_2_024CC9F0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 10_2_024B41A8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 10_2_024C484C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 10_2_024D344C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 10_2_024B4848
                      Source: C:\Windows\System32\regsvr32.exeCode function: 10_2_024D2C48
                      Source: C:\Windows\System32\regsvr32.exeCode function: 10_2_024D9A40
                      Source: C:\Windows\System32\regsvr32.exeCode function: 10_2_024CEE5C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 10_2_024BFE58
                      Source: C:\Windows\System32\regsvr32.exeCode function: 10_2_024BC458
                      Source: C:\Windows\System32\regsvr32.exeCode function: 10_2_024CD254
                      Source: C:\Windows\System32\regsvr32.exeCode function: 10_2_024BF850
                      Source: C:\Windows\System32\regsvr32.exeCode function: 10_2_024C5C50
                      Source: C:\Windows\System32\regsvr32.exeCode function: 10_2_024BE254
                      Source: C:\Windows\System32\regsvr32.exeCode function: 10_2_024C406C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 10_2_024C0C68
                      Source: C:\Windows\System32\regsvr32.exeCode function: 10_2_024D0C68
                      Source: C:\Windows\System32\regsvr32.exeCode function: 10_2_024B4C64
                      Source: C:\Windows\System32\regsvr32.exeCode function: 10_2_024B4078
                      Source: C:\Windows\System32\regsvr32.exeCode function: 10_2_024CFC70
                      Source: C:\Windows\System32\regsvr32.exeCode function: 10_2_024BBC08
                      Source: C:\Windows\System32\regsvr32.exeCode function: 10_2_024CA408
                      Source: C:\Windows\System32\regsvr32.exeCode function: 10_2_024D2E04
                      Source: C:\Windows\System32\regsvr32.exeCode function: 10_2_024CF61C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 10_2_024C6418
                      Source: C:\Windows\System32\regsvr32.exeCode function: 10_2_024C3E18
                      Source: C:\Windows\System32\regsvr32.exeCode function: 10_2_024C7414
                      Source: C:\Windows\System32\regsvr32.exeCode function: 10_2_024C3210
                      Source: C:\Windows\System32\regsvr32.exeCode function: 10_2_024C3610
                      Source: C:\Windows\System32\regsvr32.exeCode function: 10_2_024B1014
                      Source: C:\Windows\System32\regsvr32.exeCode function: 10_2_024C762C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 10_2_024CB028
                      Source: C:\Windows\System32\regsvr32.exeCode function: 10_2_024B2820
                      Source: C:\Windows\System32\regsvr32.exeCode function: 10_2_024CD620
                      Source: C:\Windows\System32\regsvr32.exeCode function: 10_2_024D4020
                      Source: C:\Windows\System32\regsvr32.exeCode function: 10_2_024CF238
                      Source: C:\Windows\System32\regsvr32.exeCode function: 10_2_024D2638
                      Source: C:\Windows\System32\regsvr32.exeCode function: 10_2_024C7C30
                      Source: C:\Windows\System32\regsvr32.exeCode function: 10_2_024D5E30
                      Source: C:\Windows\System32\regsvr32.exeCode function: 10_2_024BCCC8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 10_2_024C78C4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 10_2_024D0AC4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 10_2_024C9EC0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 10_2_024D84DC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 10_2_024BFAD0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 10_2_024CD4D0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 10_2_024B90D4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 10_2_024CACEC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 10_2_024DB0EC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 10_2_024B3CE8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 10_2_024D8EE8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 10_2_024C24E4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 10_2_024B36E0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 10_2_024B72E0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 10_2_024B8CE0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 10_2_024D1AE0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 10_2_024B2AE4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 10_2_024D12FC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 10_2_024D2AFC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 10_2_024BB0F8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 10_2_024D4EF4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 10_2_024DA088
                      Source: C:\Windows\System32\regsvr32.exeCode function: 10_2_024C0680
                      Source: C:\Windows\System32\regsvr32.exeCode function: 10_2_024B5484
                      Source: C:\Windows\System32\regsvr32.exeCode function: 10_2_024D369C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 10_2_024B6698
                      Source: C:\Windows\System32\regsvr32.exeCode function: 10_2_024BB698
                      Source: C:\Windows\System32\regsvr32.exeCode function: 10_2_024B3A9C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 10_2_024BF290
                      Source: C:\Windows\System32\regsvr32.exeCode function: 10_2_024DBE90
                      Source: C:\Windows\System32\regsvr32.exeCode function: 10_2_024CE4A8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 10_2_024D16A8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 10_2_024D76A4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 10_2_024C14A0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 10_2_024B30BC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 10_2_024BB2BC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 10_2_024C46B4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 10_2_024B4948
                      Source: C:\Windows\System32\regsvr32.exeCode function: 10_2_024C7144
                      Source: C:\Windows\System32\regsvr32.exeCode function: 10_2_024B3F40
                      Source: C:\Windows\System32\regsvr32.exeCode function: 10_2_024D6B40
                      Source: C:\Windows\System32\regsvr32.exeCode function: 10_2_024C9D5C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 10_2_024D155C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 10_2_024CB558
                      Source: C:\Windows\System32\regsvr32.exeCode function: 10_2_024B8F5C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 10_2_024D796C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 10_2_024BCB6C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 10_2_024CF764
                      Source: C:\Windows\System32\regsvr32.exeCode function: 10_2_024C0B60
                      Source: C:\Windows\System32\regsvr32.exeCode function: 10_2_024C6978
                      Source: C:\Windows\System32\regsvr32.exeCode function: 10_2_024C0578
                      Source: C:\Windows\System32\regsvr32.exeCode function: 10_2_024DB570
                      Source: C:\Windows\System32\regsvr32.exeCode function: 10_2_024BDB74
                      Source: C:\Windows\System32\regsvr32.exeCode function: 10_2_024B2708
                      Source: C:\Windows\System32\regsvr32.exeCode function: 10_2_024CEB08
                      Source: C:\Windows\System32\regsvr32.exeCode function: 10_2_024D3304
                      Source: C:\Windows\System32\regsvr32.exeCode function: 10_2_024BD300
                      Source: C:\Windows\System32\regsvr32.exeCode function: 10_2_024C3D1C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 10_2_024D4918
                      Source: C:\Windows\System32\regsvr32.exeCode function: 10_2_024C6110
                      Source: C:\Windows\System32\regsvr32.exeCode function: 10_2_024D1D2C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 10_2_024D632C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 10_2_024D8B28
                      Source: C:\Windows\System32\regsvr32.exeCode function: 10_2_024BD92C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 10_2_024C3724
                      Source: C:\Windows\System32\regsvr32.exeCode function: 10_2_024C7B24
                      Source: C:\Windows\System32\regsvr32.exeCode function: 10_2_024CC720
                      Source: C:\Windows\System32\regsvr32.exeCode function: 10_2_024C9720
                      Source: C:\Windows\System32\regsvr32.exeCode function: 10_2_024DBD20
                      Source: C:\Windows\System32\regsvr32.exeCode function: 10_2_024D6520
                      Source: C:\Windows\System32\regsvr32.exeCode function: 10_2_024BBD24
                      Source: C:\Windows\System32\regsvr32.exeCode function: 10_2_024D093C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 10_2_024D6F3C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 10_2_024CA130
                      Source: C:\Windows\System32\regsvr32.exeCode function: 10_2_024D4330
                      Source: C:\Windows\System32\regsvr32.exeCode function: 10_2_024BDFCC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 10_2_024BEFCC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 10_2_024CD9C4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 10_2_024B2DC0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 10_2_024B25D8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 10_2_024CABD8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 10_2_024D3DD4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 10_2_024D07D0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 10_2_024C93E0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 10_2_024BAFE4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 10_2_024BB3E4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 10_2_024D13FC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 10_2_024C99F4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 10_2_024B31F0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 10_2_024C1B88
                      Source: C:\Windows\System32\regsvr32.exeCode function: 10_2_024BF580
                      Source: C:\Windows\System32\regsvr32.exeCode function: 10_2_024BED84
                      Source: C:\Windows\System32\regsvr32.exeCode function: 10_2_024B5198
                      Source: C:\Windows\System32\regsvr32.exeCode function: 10_2_024C2F94
                      Source: C:\Windows\System32\regsvr32.exeCode function: 10_2_024C4594
                      Source: C:\Windows\System32\regsvr32.exeCode function: 10_2_024C6594
                      Source: C:\Windows\System32\regsvr32.exeCode function: 10_2_024D8990
                      Source: C:\Windows\System32\regsvr32.exeCode function: 10_2_024CC5AC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 10_2_024CEFAC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 10_2_024BB1A8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 10_2_024D9DA8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 10_2_024B93AC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 10_2_024CE7A4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 10_2_024C27A4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 10_2_024C29BC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 10_2_024D0DBC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 10_2_024C3BB4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 10_2_024C7DB0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 10_2_024B7BB4
                      Source: C:\Windows\System32\regsvr32.exeCode function: String function: 000000018006BC48 appears 58 times
                      Source: C:\Windows\System32\regsvr32.exeCode function: String function: 00000001800019CE appears 79 times
                      Source: C:\Windows\System32\regsvr32.exeSection loaded: sfc.dll
                      Source: C:\Windows\System32\regsvr32.exeSection loaded: sfc.dll
                      Source: 548IrCt4hj.dllVirustotal: Detection: 70%
                      Source: 548IrCt4hj.dllMetadefender: Detection: 45%
                      Source: 548IrCt4hj.dllReversingLabs: Detection: 88%
                      Source: 548IrCt4hj.dllStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      Source: C:\Windows\System32\loaddll64.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                      Source: unknownProcess created: C:\Windows\System32\loaddll64.exe loaddll64.exe "C:\Users\user\Desktop\548IrCt4hj.dll"
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\548IrCt4hj.dll",#1
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\548IrCt4hj.dll
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\548IrCt4hj.dll",#1
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\548IrCt4hj.dll,DllCanUnloadNow
                      Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\System32\regsvr32.exe C:\Windows\system32\regsvr32.exe "C:\Windows\system32\ZPLPsNKH\eFntQ.dll"
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\548IrCt4hj.dll,DllGetClassObject
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\548IrCt4hj.dll,DllRegisterServer
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\548IrCt4hj.dll",#1
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\548IrCt4hj.dll
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\548IrCt4hj.dll,DllCanUnloadNow
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\548IrCt4hj.dll,DllGetClassObject
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\548IrCt4hj.dll,DllRegisterServer
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\548IrCt4hj.dll",#1
                      Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\System32\regsvr32.exe C:\Windows\system32\regsvr32.exe "C:\Windows\system32\ZPLPsNKH\eFntQ.dll"
                      Source: C:\Windows\System32\regsvr32.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{D105A4D4-344C-48EB-9866-EE378D90658B}\InProcServer32
                      Source: classification engineClassification label: mal96.troj.evad.winDLL@21/5@0/44
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800013F7 GetModuleFileNameW,CharNextW,LoadTypeLib,LoadTypeLib,SysAllocString,CoCreateInstance,StringFromGUID2,RegOpenKeyExW,RegQueryInfoKeyW,RegCloseKey,RegDeleteKeyW,RegOpenKeyExW,RegCloseKey,RegQueryInfoKeyW,RegCloseKey,RegDeleteKeyW,RegCloseKey,RegCloseKey,GetModuleHandleW,GetProcAddress,UnRegisterTypeLib,UnRegisterTypeLib,SysFreeString,
                      Source: C:\Windows\System32\regsvr32.exeFile read: C:\Users\desktop.iniJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0116A804 Process32FirstW,CreateToolhelp32Snapshot,Process32NextW,FindCloseChangeNotification,
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\548IrCt4hj.dll",#1
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0000000180001721 LoadLibraryExW,LoadLibraryExW,FindResourceW,LoadResource,SizeofResource,MultiByteToWideChar,FreeLibrary,lstrcmpiW,lstrcmpiW,CharNextW,lstrcmpiW,lstrcmpiW,lstrcmpiW,RegOpenKeyExW,RegDeleteValueW,RegCloseKey,CharNextW,RegOpenKeyExW,RegCloseKey,RegOpenKeyExW,RegCloseKey,RegCreateKeyExW,RegCloseKey,RegCloseKey,RegOpenKeyExW,RegCloseKey,RegQueryInfoKeyW,lstrcmpiW,RegQueryInfoKeyW,RegCloseKey,RegDeleteKeyW,RegCloseKey,RegSetValueExW,
                      Source: C:\Windows\System32\svchost.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Windows\System32\rundll32.exeAutomated click: OK
                      Source: C:\Windows\System32\rundll32.exeAutomated click: OK
                      Source: 548IrCt4hj.dllStatic PE information: Image base 0x180000000 > 0x60000000
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_01158C72 push ebp; ret
                      Source: 548IrCt4hj.dllStatic PE information: section name: .00cfg
                      Source: 548IrCt4hj.dllStatic PE information: section name: _RDATA
                      Source: 548IrCt4hj.dllStatic PE information: real checksum: 0xf69e3 should be: 0xf8045
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\548IrCt4hj.dll
                      Source: C:\Windows\System32\regsvr32.exePE file moved: C:\Windows\System32\ZPLPsNKH\eFntQ.dllJump to behavior

                      Hooking and other Techniques for Hiding and Protection

                      barindex
                      Source: C:\Windows\System32\regsvr32.exeFile opened: C:\Windows\system32\ZPLPsNKH\eFntQ.dll:Zone.Identifier read attributes | delete
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\svchost.exe TID: 5220Thread sleep time: -30000s >= -30000s
                      Source: C:\Windows\System32\svchost.exe TID: 6620Thread sleep time: -30000s >= -30000s
                      Source: C:\Windows\System32\svchost.exe TID: 6012Thread sleep time: -90000s >= -30000s
                      Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
                      Source: C:\Windows\System32\svchost.exeFile opened: PhysicalDrive0
                      Source: C:\Windows\System32\regsvr32.exeAPI coverage: 2.9 %
                      Source: C:\Windows\System32\regsvr32.exeProcess information queried: ProcessInformation
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_000000018006680C FindFirstFileExW,FindNextFileW,FindClose,FindClose,
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800671B0 FindFirstFileExW,
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800677BC FindFirstFileExW,FindNextFileW,FindClose,FindClose,
                      Source: C:\Windows\System32\regsvr32.exeCode function: 10_2_024CC9F0 FindFirstFileW,FindNextFileW,
                      Source: C:\Windows\System32\regsvr32.exeFile Volume queried: C:\ FullSizeInformation
                      Source: svchost.exe, 00000013.00000002.836485099.0000018894A65000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000019.00000002.595056654.0000015F2CCF8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: @Hyper-V RAW
                      Source: regsvr32.exe, 0000000A.00000003.480288771.0000000000B4B000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000A.00000003.480216789.0000000000B21000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000A.00000002.940449077.0000000000B4D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000013.00000002.835848057.000001889342A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000013.00000002.836463528.0000018894A54000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000019.00000002.595043128.0000015F2CCE9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                      Source: svchost.exe, 00000015.00000002.940237565.000001D31EA02000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: HvHostWdiSystemHostScDeviceEnumWiaRpctrkwksAudioEndpointBuilderhidservdot3svcDsSvcfhsvcWPDBusEnumsvsvcwlansvcEmbeddedModeirmonSensorServicevmicvssNgcSvcsysmainDevQueryBrokerStorSvcvmickvpexchangevmicshutdownvmicguestinterfacevmicvmsessionNcbServiceNetmanDeviceAssociationServiceTabletInputServicePcaSvcIPxlatCfgSvcCscServiceUmRdpService
                      Source: regsvr32.exe, 0000000A.00000002.940330437.0000000000B21000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000A.00000003.480216789.0000000000B21000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000019.00000002.594594939.0000015F2CC71000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW`
                      Source: svchost.exe, 00000015.00000002.940346278.000001D31EA28000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800041E7 GetLastError,IsDebuggerPresent,OutputDebugStringW,
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800041E7 GetLastError,IsDebuggerPresent,OutputDebugStringW,
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0000000180002CD9 GetProcessHeap,
                      Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
                      Source: C:\Windows\System32\loaddll64.exeProcess queried: DebugPort
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_000000018002BAEC RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0000000180003841 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,

                      HIPS / PFW / Operating System Protection Evasion

                      barindex
                      Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 174.138.33.49 7080
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\548IrCt4hj.dll",#1
                      Source: C:\Windows\System32\regsvr32.exeQueries volume information: C:\ VolumeInformation
                      Source: C:\Windows\System32\regsvr32.exeQueries volume information: C:\ VolumeInformation
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformation
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm VolumeInformation
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformation
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformation
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformation
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformation
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation
                      Source: C:\Windows\System32\regsvr32.exeCode function: GetLocaleInfoW,
                      Source: C:\Windows\System32\regsvr32.exeCode function: TranslateName,TranslateName,GetACP,IsValidCodePage,GetLocaleInfoW,
                      Source: C:\Windows\System32\regsvr32.exeCode function: EnumSystemLocalesW,
                      Source: C:\Windows\System32\regsvr32.exeCode function: EnumSystemLocalesW,
                      Source: C:\Windows\System32\regsvr32.exeCode function: EnumSystemLocalesW,
                      Source: C:\Windows\System32\regsvr32.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,
                      Source: C:\Windows\System32\regsvr32.exeCode function: GetLocaleInfoW,
                      Source: C:\Windows\System32\regsvr32.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,
                      Source: C:\Windows\System32\regsvr32.exeCode function: GetLocaleInfoW,
                      Source: C:\Windows\System32\regsvr32.exeCode function: EnumSystemLocalesW,GetUserDefaultLCID,ProcessCodePage,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,
                      Source: C:\Windows\System32\regsvr32.exeCode function: EnumSystemLocalesW,
                      Source: C:\Windows\System32\regsvr32.exeCode function: EnumSystemLocalesW,
                      Source: C:\Windows\System32\regsvr32.exeCode function: EnumSystemLocalesW,
                      Source: C:\Windows\System32\regsvr32.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00000001800031CA __security_init_cookie,GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,

                      Stealing of Sensitive Information

                      barindex
                      Source: Yara matchFile source: 0000000A.00000002.940180760.0000000000AEB000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 7.2.rundll32.exe.1e034440000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.2.rundll32.exe.1f33eb00000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.regsvr32.exe.1120000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 7.2.rundll32.exe.1e034440000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.regsvr32.exe.c20000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.regsvr32.exe.c20000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.2.rundll32.exe.1f33eb00000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.regsvr32.exe.1120000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000007.00000002.424123479.000001E034440000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.940693332.0000000000C20000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.427012616.0000000001120000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000006.00000002.422757747.000001F33EB00000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.940812969.00000000024B1000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000006.00000002.422895400.000001F33EC51000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000007.00000002.424307117.000001E034471000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.427064425.0000000001151000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                      Valid AccountsWindows Management Instrumentation1
                      DLL Side-Loading
                      111
                      Process Injection
                      2
                      Masquerading
                      OS Credential Dumping1
                      System Time Discovery
                      Remote Services1
                      Archive Collected Data
                      Exfiltration Over Other Network Medium1
                      Encrypted Channel
                      Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                      Default AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
                      DLL Side-Loading
                      3
                      Virtualization/Sandbox Evasion
                      LSASS Memory51
                      Security Software Discovery
                      Remote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth1
                      Non-Standard Port
                      Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                      Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)111
                      Process Injection
                      Security Account Manager3
                      Virtualization/Sandbox Evasion
                      SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration1
                      Application Layer Protocol
                      Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                      Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)1
                      Deobfuscate/Decode Files or Information
                      NTDS2
                      Process Discovery
                      Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
                      Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
                      Hidden Files and Directories
                      LSA Secrets1
                      Remote System Discovery
                      SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                      Replication Through Removable MediaLaunchdRc.commonRc.common2
                      Obfuscated Files or Information
                      Cached Domain Credentials2
                      File and Directory Discovery
                      VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                      External Remote ServicesScheduled TaskStartup ItemsStartup Items1
                      Regsvr32
                      DCSync34
                      System Information Discovery
                      Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                      Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job1
                      Rundll32
                      Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
                      Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)1
                      DLL Side-Loading
                      /etc/passwd and /etc/shadowSystem Network Connections DiscoverySoftware Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
                      Supply Chain CompromiseAppleScriptAt (Windows)At (Windows)1
                      File Deletion
                      Network SniffingProcess DiscoveryTaint Shared ContentLocal Data StagingExfiltration Over Unencrypted/Obfuscated Non-C2 ProtocolFile Transfer ProtocolsData Encrypted for Impact
                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet
                      behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 672062 Sample: 548IrCt4hj Startdate: 23/07/2022 Architecture: WINDOWS Score: 96 32 103.224.241.74 WEBWERKS-AS-INWebWerksIndiaPvtLtdIN India 2->32 34 202.29.239.162 UNINET-AS-APUNINET-TH Thailand 2->34 36 39 other IPs or domains 2->36 46 Snort IDS alert for network traffic 2->46 48 Antivirus detection for URL or domain 2->48 50 Multi AV Scanner detection for submitted file 2->50 52 3 other signatures 2->52 8 loaddll64.exe 1 2->8         started        10 svchost.exe 9 1 2->10         started        13 svchost.exe 2->13         started        15 4 other processes 2->15 signatures3 process4 dnsIp5 17 regsvr32.exe 5 8->17         started        20 cmd.exe 1 8->20         started        22 rundll32.exe 8->22         started        24 2 other processes 8->24 38 127.0.0.1 unknown unknown 10->38 40 192.168.2.1 unknown unknown 13->40 process6 signatures7 44 Hides that the sample has been downloaded from the Internet (zone.identifier) 17->44 26 regsvr32.exe 17->26         started        30 rundll32.exe 20->30         started        process8 dnsIp9 42 174.138.33.49, 49768, 7080 DIGITALOCEAN-ASNUS United States 26->42 54 System process connects to network (likely due to code injection or exploit) 26->54 signatures10

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                      windows-stand
                      SourceDetectionScannerLabelLink
                      548IrCt4hj.dll70%VirustotalBrowse
                      548IrCt4hj.dll46%MetadefenderBrowse
                      548IrCt4hj.dll88%ReversingLabsWin64.Trojan.Emotet
                      No Antivirus matches
                      SourceDetectionScannerLabelLinkDownload
                      5.2.regsvr32.exe.1120000.0.unpack100%AviraHEUR/AGEN.1215461Download File
                      10.2.regsvr32.exe.c20000.0.unpack100%AviraHEUR/AGEN.1215461Download File
                      6.2.rundll32.exe.1f33eb00000.0.unpack100%AviraHEUR/AGEN.1215461Download File
                      7.2.rundll32.exe.1e034440000.0.unpack100%AviraHEUR/AGEN.1215461Download File
                      No Antivirus matches
                      SourceDetectionScannerLabelLink
                      https://www.disneyplus.com/legal/your-california-privacy-rights0%URL Reputationsafe
                      https://www.disneyplus.com/legal/privacy-policy0%URL Reputationsafe
                      https://174.138.33.49/Z100%Avira URL Cloudmalware
                      https://174.138.33.49:7080/F100%Avira URL Cloudmalware
                      https://174.138.33.49:7080/0%URL Reputationsafe
                      https://174.138.33.49:7080/Only100%Avira URL Cloudmalware
                      https://www.pango.co/privacy0%URL Reputationsafe
                      https://disneyplus.com/legal.0%URL Reputationsafe
                      https://174.138.33.49:7080/r100%Avira URL Cloudmalware
                      http://crl.ver)0%Avira URL Cloudsafe
                      https://174.138.33.49:7080/p100%Avira URL Cloudmalware
                      https://www.tiktok.com/legal/report/feedback0%URL Reputationsafe
                      http://help.disneyplus.com.0%URL Reputationsafe
                      https://174.138.33.49/0%URL Reputationsafe
                      No contacted domains info
                      NameSourceMaliciousAntivirus DetectionReputation
                      https://www.disneyplus.com/legal/your-california-privacy-rightssvchost.exe, 00000019.00000003.568619378.0000015F2D586000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000019.00000003.568197795.0000015F2D598000.00000004.00000020.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      https://www.disneyplus.com/legal/privacy-policysvchost.exe, 00000019.00000003.568619378.0000015F2D586000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000019.00000003.568197795.0000015F2D598000.00000004.00000020.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      https://174.138.33.49/Zregsvr32.exe, 0000000A.00000002.940330437.0000000000B21000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000A.00000003.480216789.0000000000B21000.00000004.00000020.00020000.00000000.sdmptrue
                      • Avira URL Cloud: malware
                      unknown
                      https://174.138.33.49:7080/Fregsvr32.exe, 0000000A.00000002.940330437.0000000000B21000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000A.00000003.480216789.0000000000B21000.00000004.00000020.00020000.00000000.sdmptrue
                      • Avira URL Cloud: malware
                      unknown
                      https://174.138.33.49:7080/regsvr32.exe, 0000000A.00000002.940330437.0000000000B21000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000A.00000003.480216789.0000000000B21000.00000004.00000020.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      https://www.hotspotshield.com/terms/svchost.exe, 00000019.00000003.563618298.0000015F2D599000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000019.00000003.563853374.0000015F2D5A9000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000019.00000003.563634572.0000015F2D5A9000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000019.00000003.563884423.0000015F2DA19000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000019.00000003.563734310.0000015F2D587000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000019.00000003.563691195.0000015F2DA03000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000019.00000003.563660153.0000015F2DA02000.00000004.00000020.00020000.00000000.sdmpfalse
                        high
                        https://174.138.33.49:7080/Onlyregsvr32.exe, 0000000A.00000002.940330437.0000000000B21000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000A.00000003.480216789.0000000000B21000.00000004.00000020.00020000.00000000.sdmptrue
                        • Avira URL Cloud: malware
                        unknown
                        https://www.pango.co/privacysvchost.exe, 00000019.00000003.563618298.0000015F2D599000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000019.00000003.563853374.0000015F2D5A9000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000019.00000003.563634572.0000015F2D5A9000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000019.00000003.563884423.0000015F2DA19000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000019.00000003.563734310.0000015F2D587000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000019.00000003.563691195.0000015F2DA03000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000019.00000003.563660153.0000015F2DA02000.00000004.00000020.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        https://disneyplus.com/legal.svchost.exe, 00000019.00000003.568619378.0000015F2D586000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000019.00000003.568197795.0000015F2D598000.00000004.00000020.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        https://174.138.33.49:7080/rregsvr32.exe, 0000000A.00000002.940330437.0000000000B21000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000A.00000003.480216789.0000000000B21000.00000004.00000020.00020000.00000000.sdmptrue
                        • Avira URL Cloud: malware
                        unknown
                        http://crl.ver)svchost.exe, 00000013.00000002.836139820.00000188934BB000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000013.00000003.835512145.00000188934BB000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000019.00000002.595043128.0000015F2CCE9000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        low
                        https://174.138.33.49:7080/pregsvr32.exe, 0000000A.00000002.940330437.0000000000B21000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000A.00000003.480216789.0000000000B21000.00000004.00000020.00020000.00000000.sdmptrue
                        • Avira URL Cloud: malware
                        unknown
                        https://www.tiktok.com/legal/report/feedbacksvchost.exe, 00000019.00000003.572982528.0000015F2D59A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000019.00000003.572906706.0000015F2D5B0000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000019.00000003.572968023.0000015F2D589000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000019.00000003.573008527.0000015F2DA02000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000019.00000003.572949834.0000015F2D5B0000.00000004.00000020.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://help.disneyplus.com.svchost.exe, 00000019.00000003.568619378.0000015F2D586000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000019.00000003.568197795.0000015F2D598000.00000004.00000020.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        https://support.hotspotshield.com/svchost.exe, 00000019.00000003.563618298.0000015F2D599000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000019.00000003.563853374.0000015F2D5A9000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000019.00000003.563634572.0000015F2D5A9000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000019.00000003.563884423.0000015F2DA19000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000019.00000003.563734310.0000015F2D587000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000019.00000003.563691195.0000015F2DA03000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000019.00000003.563660153.0000015F2DA02000.00000004.00000020.00020000.00000000.sdmpfalse
                          high
                          https://174.138.33.49/regsvr32.exe, 0000000A.00000002.940330437.0000000000B21000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000A.00000003.480216789.0000000000B21000.00000004.00000020.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          • No. of IPs < 25%
                          • 25% < No. of IPs < 50%
                          • 50% < No. of IPs < 75%
                          • 75% < No. of IPs
                          IPDomainCountryFlagASNASN NameMalicious
                          157.230.99.206
                          unknownUnited States
                          14061DIGITALOCEAN-ASNUStrue
                          157.245.111.0
                          unknownUnited States
                          14061DIGITALOCEAN-ASNUStrue
                          54.37.106.167
                          unknownFrance
                          16276OVHFRtrue
                          188.165.79.151
                          unknownFrance
                          16276OVHFRtrue
                          202.29.239.162
                          unknownThailand
                          4621UNINET-AS-APUNINET-THtrue
                          174.138.33.49
                          unknownUnited States
                          14061DIGITALOCEAN-ASNUStrue
                          43.129.209.178
                          unknownJapan4249LILLY-ASUStrue
                          103.41.204.169
                          unknownIndonesia
                          58397INFINYS-AS-IDPTInfinysSystemIndonesiaIDtrue
                          5.253.30.17
                          unknownLatvia
                          18978ENZUINC-UStrue
                          85.214.67.203
                          unknownGermany
                          6724STRATOSTRATOAGDEtrue
                          103.56.149.105
                          unknownIndonesia
                          55688BEON-AS-IDPTBeonIntermediaIDtrue
                          83.229.80.93
                          unknownUnited Kingdom
                          8513SKYVISIONGBtrue
                          85.25.120.45
                          unknownGermany
                          8972GD-EMEA-DC-SXB1DEtrue
                          198.199.70.22
                          unknownUnited States
                          14061DIGITALOCEAN-ASNUStrue
                          37.187.114.15
                          unknownFrance
                          16276OVHFRtrue
                          93.104.209.107
                          unknownGermany
                          8767MNET-ASGermanyDEtrue
                          175.126.176.79
                          unknownKorea Republic of
                          9523MOKWON-AS-KRMokwonUniversityKRtrue
                          139.196.72.155
                          unknownChina
                          37963CNNIC-ALIBABA-CN-NET-APHangzhouAlibabaAdvertisingCoLtdtrue
                          128.199.242.164
                          unknownUnited Kingdom
                          14061DIGITALOCEAN-ASNUStrue
                          165.232.185.110
                          unknownUnited States
                          22255ALLEGHENYHEALTHNETWORKUStrue
                          104.248.225.227
                          unknownUnited States
                          14061DIGITALOCEAN-ASNUStrue
                          178.238.225.252
                          unknownGermany
                          51167CONTABODEtrue
                          128.199.217.206
                          unknownUnited Kingdom
                          14061DIGITALOCEAN-ASNUStrue
                          190.145.8.4
                          unknownColombia
                          14080TelmexColombiaSACOtrue
                          103.224.241.74
                          unknownIndia
                          133296WEBWERKS-AS-INWebWerksIndiaPvtLtdINtrue
                          103.71.99.57
                          unknownIndia
                          135682AWDHPL-AS-INAdvikaWebDevelopmentsHostingPvtLtdINtrue
                          190.107.19.179
                          unknownColombia
                          27951MediaCommercePartnersSACOtrue
                          210.57.209.142
                          unknownIndonesia
                          38142UNAIR-AS-IDUniversitasAirlanggaIDtrue
                          202.28.34.99
                          unknownThailand
                          9562MSU-TH-APMahasarakhamUniversityTHtrue
                          87.106.97.83
                          unknownGermany
                          8560ONEANDONE-ASBrauerstrasse48DEtrue
                          103.254.12.236
                          unknownViet Nam
                          56151DIGISTAR-VNDigiStarCompanyLimitedVNtrue
                          103.85.95.4
                          unknownIndonesia
                          136077IDNIC-UNSRAT-AS-IDUniversitasIslamNegeriMataramIDtrue
                          54.37.228.122
                          unknownFrance
                          16276OVHFRtrue
                          202.134.4.210
                          unknownIndonesia
                          7713TELKOMNET-AS-APPTTelekomunikasiIndonesiaIDtrue
                          88.217.172.165
                          unknownGermany
                          8767MNET-ASGermanyDEtrue
                          195.77.239.39
                          unknownSpain
                          60493FICOSA-ASEStrue
                          78.47.204.80
                          unknownGermany
                          24940HETZNER-ASDEtrue
                          139.59.80.108
                          unknownSingapore
                          14061DIGITALOCEAN-ASNUStrue
                          104.244.79.94
                          unknownUnited States
                          53667PONYNETUStrue
                          37.44.244.177
                          unknownGermany
                          47583AS-HOSTINGERLTtrue
                          178.62.112.199
                          unknownEuropean Union
                          14061DIGITALOCEAN-ASNUStrue
                          64.227.55.231
                          unknownUnited States
                          14061DIGITALOCEAN-ASNUStrue
                          IP
                          192.168.2.1
                          127.0.0.1
                          Joe Sandbox Version:35.0.0 Citrine
                          Analysis ID:672062
                          Start date and time: 23/07/202204:55:072022-07-23 04:55:07 +02:00
                          Joe Sandbox Product:CloudBasic
                          Overall analysis duration:0h 9m 55s
                          Hypervisor based Inspection enabled:false
                          Report type:light
                          Sample file name:548IrCt4hj (renamed file extension from none to dll)
                          Cookbook file name:default.jbs
                          Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                          Number of analysed new started processes analysed:31
                          Number of new started drivers analysed:0
                          Number of existing processes analysed:0
                          Number of existing drivers analysed:0
                          Number of injected processes analysed:0
                          Technologies:
                          • HCA enabled
                          • EGA enabled
                          • HDC enabled
                          • AMSI enabled
                          Analysis Mode:default
                          Analysis stop reason:Timeout
                          Detection:MAL
                          Classification:mal96.troj.evad.winDLL@21/5@0/44
                          EGA Information:
                          • Successful, ratio: 100%
                          HDC Information:Failed
                          HCA Information:
                          • Successful, ratio: 98%
                          • Number of executed functions: 0
                          • Number of non-executed functions: 0
                          Cookbook Comments:
                          • Adjust boot time
                          • Enable AMSI
                          • Override analysis time to 240s for rundll32
                          • Exclude process from analysis (whitelisted): taskhostw.exe, MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, UpdateNotificationMgr.exe, WMIADAP.exe, conhost.exe, backgroundTaskHost.exe, UsoClient.exe, wuapihost.exe
                          • Excluded IPs from analysis (whitelisted): 23.211.4.86, 20.223.24.244
                          • Excluded domains from analysis (whitelisted): www.bing.com, client.wns.windows.com, fs.microsoft.com, neu-displaycatalogrp.frontdoor.bigcatalog.commerce.microsoft.com, settings-win.data.microsoft.com, ctldl.windowsupdate.com, e1723.g.akamaiedge.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, arc.msn.com, ris.api.iris.microsoft.com, licensing.mp.microsoft.com, rp-consumer-prod-displaycatalog-geomap.trafficmanager.net, go.microsoft.com, store-images.s-microsoft.com, login.live.com, sls.update.microsoft.com, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, prod.fs.microsoft.com.akadns.net, displaycatalog-rp.md.mp.microsoft.com.akadns.net
                          • Not all processes where analyzed, report is missing behavior information
                          • Report size exceeded maximum capacity and may have missing behavior information.
                          • Report size exceeded maximum capacity and may have missing disassembly code.
                          • Report size getting too big, too many NtOpenKeyEx calls found.
                          • Report size getting too big, too many NtProtectVirtualMemory calls found.
                          • Report size getting too big, too many NtQueryValueKey calls found.
                          TimeTypeDescription
                          04:56:49API Interceptor11x Sleep call for process: svchost.exe modified
                          No context
                          No context
                          No context
                          No context
                          No context
                          Process:C:\Windows\System32\svchost.exe
                          File Type:data
                          Category:dropped
                          Size (bytes):8192
                          Entropy (8bit):0.3593198815979092
                          Encrypted:false
                          SSDEEP:12:SnaaD0JcaaD0JwQQU2naaD0JcaaD0JwQQU:4tgJctgJw/tgJctgJw
                          MD5:BF1DC7D5D8DAD7478F426DF8B3F8BAA6
                          SHA1:C6B0BDE788F553F865D65F773D8F6A3546887E42
                          SHA-256:BE47C764C38CA7A90A345BE183F5261E89B98743B5E35989E9A8BE0DA498C0F2
                          SHA-512:00F2412AA04E09EA19A8315D80BE66D2727C713FC0F5AE6A9334BABA539817F568A98CA3A45B2673282BDD325B8B0E2840A393A4DCFADCB16473F5EAF2AF3180
                          Malicious:false
                          Preview:.............*..........3...w..................C:\ProgramData\Microsoft\Network\Downloader\.........................................................................................................................................................................................................................C:\ProgramData\Microsoft\Network\Downloader\..........................................................................................................................................................................................................................0u..................@...@......................................................*.............................................................................................................................................................................................................................................................................................................................................................
                          Process:C:\Windows\System32\svchost.exe
                          File Type:MPEG-4 LOAS
                          Category:dropped
                          Size (bytes):1310720
                          Entropy (8bit):0.24948615150342127
                          Encrypted:false
                          SSDEEP:1536:BJiRdfVzkZm3lyf49uyc0ga04PdHS9LrM/oVMUdSRU4X:BJiRdwfu2SRU4X
                          MD5:8302100D8C0781AFFA569599554A747D
                          SHA1:2AD4A77D9A42C5905F5B8FBAAACCFAB60CA60CD3
                          SHA-256:8F307CAB2013948ADA4DFE98A26132AC3BDF98B917EB84BBA843DE5977A18C05
                          SHA-512:66FECADDA311CE2AF81A7F4875E4F775581373BD23C1F2AA5C2136A174B6814EAB09A98DA9A98CA6834B1123A1740D2FF1524C5A643A6D16B6A4945BCE9DA0F2
                          Malicious:false
                          Preview:V.d.........@..@.3...w...........................3...w..................C:\ProgramData\Microsoft\Network\Downloader\.........................................................................................................................................................................................................................C:\ProgramData\Microsoft\Network\Downloader\..........................................................................................................................................................................................................................0u..................@...@.........................................d#.................................................................................................................................................................................................................................................................................................................................................
                          Process:C:\Windows\System32\svchost.exe
                          File Type:Extensible storage engine DataBase, version 0x620, checksum 0x9292e26a, page size 16384, Windows version 10.0
                          Category:dropped
                          Size (bytes):786432
                          Entropy (8bit):0.2507291590936865
                          Encrypted:false
                          SSDEEP:384:L7U+W0StseCJ48EApW0StseCJ48E2rTSjlK/ebmLerYSRSY1J2:L7rSB2nSB2RSjlK/+mLesOj1J2
                          MD5:C50F19CC34E36AE9D8945ECDF6CABAD5
                          SHA1:15A5137868B1A5D0B8BC5E506A12052CE5CB0AA1
                          SHA-256:C9A0DFC6BC8086E76E08B4237104495011053AFF5F8DC0D99735BD3A55563327
                          SHA-512:E660C4EE50CD6F3DE9CF6C3F790B464CC5EE03173DF58DFF1F1D7C11D454DA880F6B85BCB5C54FCA4032D8AE62420E175CDFB8E80112EA32388DFD1DECE1202E
                          Malicious:false
                          Preview:...j... ................e.f.3...w........................).....:;...z..18...z..h.(.....:;...z....)..............3...w...........................................................................................................B...........@...................................................................................................... ...................................................................................................................................................................................................................................................E...:;...z....................\:;...z..........................................................................................................................................................................................................................................................................................................................................................................................
                          Process:C:\Windows\System32\svchost.exe
                          File Type:data
                          Category:dropped
                          Size (bytes):16384
                          Entropy (8bit):0.07701426796525257
                          Encrypted:false
                          SSDEEP:3:kmtR7vUduyi0f2l/of7CnEe9irtlNyfeuZCl/ill3Vkttlmlnl:vtRrUDf2lwf2ntI6Ole3
                          MD5:3356637935306EB31EC34EF8F4F51FDE
                          SHA1:C1F3106EFAB78E6B7AD03FEBEDBA313849D71462
                          SHA-256:01E4C7BAED15BB1CBCB4358951970B0080D9F3CE5652A3076424C5C6F767903B
                          SHA-512:F639059B00AB53B6F6473F054E9CF1540FC52EA55940320A2E960583B5E2409C89F4739AB75B03C26085FC114EC99AB35137FE0690B8E3F3A2EEB9B818102EBA
                          Malicious:false
                          Preview:..4......................................3...w..18...z..:;...z..........:;...z..:;...z.....:;...z.g..................\:;...z..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                          Process:C:\Windows\System32\svchost.exe
                          File Type:ASCII text, with no line terminators
                          Category:dropped
                          Size (bytes):55
                          Entropy (8bit):4.306461250274409
                          Encrypted:false
                          SSDEEP:3:YDQRWu83XfAw2fHbY:YMRl83Xt2f7Y
                          MD5:DCA83F08D448911A14C22EBCACC5AD57
                          SHA1:91270525521B7FE0D986DB19747F47D34B6318AD
                          SHA-256:2B4B2D4A06044AD0BD2AE3287CFCBECD90B959FEB2F503AC258D7C0A235D6FE9
                          SHA-512:96F3A02DC4AE302A30A376FC7082002065C7A35ECB74573DE66254EFD701E8FD9E9D867A2C8ABEB4C482738291B715D4965A0D2412663FDF1EE6CBC0BA9FBACA
                          Malicious:false
                          Preview:{"fontSetUri":"fontset-2017-04.json","baseUri":"fonts"}
                          File type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                          Entropy (8bit):6.301831913358297
                          TrID:
                          • Win64 Dynamic Link Library (generic) (102004/3) 86.43%
                          • Win64 Executable (generic) (12005/4) 10.17%
                          • Generic Win/DOS Executable (2004/3) 1.70%
                          • DOS Executable Generic (2002/1) 1.70%
                          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.01%
                          File name:548IrCt4hj.dll
                          File size:962048
                          MD5:7301880b88f87cd3a593f7106d5743cc
                          SHA1:c8a2b0ae061b612f4d4a4cfc4ee3e1f7079b4240
                          SHA256:c409ad4f64a1ad925ffbfdb88f57dd9177123364a1875caf6cbb6f5ba3970cc3
                          SHA512:3abf4d6b0725cae5fd05edccdac75e5061ebcc033e24fbd73482fabe53bd1f914490f3bfda638bd623e642200e8499539b0541bb95d5c7040410d2ff209a640a
                          SSDEEP:12288:kvyPTUfrN+lSDLV9dRCYFdVlv6jVBv4w8N6zTlvdEywUshhxmIssuqvY/J9ujv7X:k6Ufgl15qhxm1qvY2leXA
                          TLSH:0515BF6677E81291D0B7D13F8AA78B49EAF2BC041734A7CB0184525D2F23BD85A3F725
                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........71x.V_+.V_+.V_+p$\*.V_+p$Z*&V_+.#[*.V_+.#\*.V_+.#Z*.V_+p$[*.V_+p$^*.V_+.V^+ V_+b#Z*.V_+b#_*.V_+b#.+.V_+.V.+.V_+b#]*.V_+Rich.V_
                          Icon Hash:74f0e4ecccdce0e4
                          Entrypoint:0x18000110e
                          Entrypoint Section:.text
                          Digitally signed:false
                          Imagebase:0x180000000
                          Subsystem:windows gui
                          Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, DLL
                          DLL Characteristics:HIGH_ENTROPY_VA, NX_COMPAT
                          Time Stamp:0x62C329A8 [Mon Jul 4 17:55:52 2022 UTC]
                          TLS Callbacks:
                          CLR (.Net) Version:
                          OS Version Major:6
                          OS Version Minor:0
                          File Version Major:6
                          File Version Minor:0
                          Subsystem Version Major:6
                          Subsystem Version Minor:0
                          Import Hash:c8e804de36681c3fb89b2f7688123f2b
                          Instruction
                          jmp 00007F2F1CD86BDEh
                          jmp 00007F2F1CDDD9C5h
                          jmp 00007F2F1CD9B3ECh
                          jmp 00007F2F1CDC6AABh
                          jmp 00007F2F1CDBA522h
                          jmp 00007F2F1CD9E8E1h
                          jmp 00007F2F1CD85270h
                          jmp 00007F2F1CD99933h
                          jmp 00007F2F1CD79DEAh
                          jmp 00007F2F1CDA7131h
                          jmp 00007F2F1CDA4F6Ch
                          jmp 00007F2F1CDA720Bh
                          jmp 00007F2F1CDC9686h
                          jmp 00007F2F1CD7F4E1h
                          jmp 00007F2F1CD87294h
                          jmp 00007F2F1CD99937h
                          jmp 00007F2F1CDE83DEh
                          jmp 00007F2F1CDA0781h
                          jmp 00007F2F1CDC4B98h
                          jmp 00007F2F1CDB7D13h
                          jmp 00007F2F1CDD8B16h
                          jmp 00007F2F1CDD23B5h
                          jmp 00007F2F1CDB1E44h
                          jmp 00007F2F1CDC3DC3h
                          jmp 00007F2F1CDC41A6h
                          jmp 00007F2F1CDE8485h
                          jmp 00007F2F1CDD1DE0h
                          jmp 00007F2F1CD8A2FFh
                          jmp 00007F2F1CD88E16h
                          jmp 00007F2F1CDC5A9Dh
                          jmp 00007F2F1CD8A7A4h
                          jmp 00007F2F1CDCF6C3h
                          jmp 00007F2F1CDCDBE6h
                          jmp 00007F2F1CD9A6FDh
                          jmp 00007F2F1CD8EE28h
                          jmp 00007F2F1CDC7E33h
                          jmp 00007F2F1CD9A902h
                          jmp 00007F2F1CDDB649h
                          jmp 00007F2F1CDB7C9Ch
                          jmp 00007F2F1CD99A3Fh
                          NameVirtual AddressVirtual Size Is in Section
                          IMAGE_DIRECTORY_ENTRY_EXPORT0xb07c00x1c9.rdata
                          IMAGE_DIRECTORY_ENTRY_IMPORT0xbb6e80x8c.idata
                          IMAGE_DIRECTORY_ENTRY_RESOURCE0xbf0000x30ebd.rsrc
                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0xb50000x4ea8.pdata
                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                          IMAGE_DIRECTORY_ENTRY_BASERELOC0xf00000xd78.reloc
                          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xa63200x138.rdata
                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_IAT0xbb0000x6e8.idata
                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                          NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                          .text0x10000x8a5ca0x8a600False0.3069634993224932data5.641927945052085IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                          .rdata0x8c0000x249890x24a00False0.2668981975255973data4.201809080615527IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                          .data0xb10000x39600x1800False0.13834635416666666data2.2672137141142894IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                          .pdata0xb50000x57a80x5800False0.5007990056818182data5.516669615542349IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                          .idata0xbb0000x18d10x1a00False0.2459435096153846data3.49134963905175IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                          .00cfg0xbd0000x1510x200False0.05859375data0.3458273094223054IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                          _RDATA0xbe0000x2220x400False0.16796875data1.4491445801684228IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                          .rsrc0xbf0000x30ebd0x31000False0.8592952806122449data7.7601261539979545IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                          .reloc0xf00000x194d0x1a00False0.21875data3.637638102515201IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                          NameRVASizeTypeLanguageCountry
                          REGISTRY0xbf19c0x1d4ASCII textEnglishUnited States
                          TYPELIB0xbf3700x3398dataEnglishUnited States
                          RT_STRING0xc27080x36dataEnglishUnited States
                          RT_HTML0xc27400x2d600dataEnglishUnited States
                          RT_MANIFEST0xefd400x17dXML 1.0 document textEnglishUnited States
                          DLLImport
                          ODBC32.dll
                          KERNEL32.dllFlushFileBuffers, SetStdHandle, SetFilePointerEx, EncodePointer, DecodePointer, RaiseException, GetLastError, QueryPerformanceFrequency, EnterCriticalSection, LeaveCriticalSection, InitializeCriticalSectionAndSpinCount, DeleteCriticalSection, VirtualAlloc, DisableThreadLibraryCalls, WriteFile, GetModuleFileNameW, GetModuleHandleW, GetProcAddress, LoadLibraryExW, LoadResource, SizeofResource, FindResourceW, lstrcmpiW, MultiByteToWideChar, GetFileSizeEx, GetStringTypeW, SetConsoleCtrlHandler, GetProcessHeap, EnumSystemLocalesW, GetUserDefaultLCID, GetConsoleOutputCP, GetConsoleMode, ReadFile, ReadConsoleW, CloseHandle, CreateFileW, WriteConsoleW, FreeLibrary, SetUnhandledExceptionFilter, IsValidLocale, GetLocaleInfoW, LCMapStringW, CompareStringW, GetTimeFormatW, GetDateFormatW, FlsFree, FlsSetValue, FlsGetValue, FlsAlloc, SetEnvironmentVariableW, FreeEnvironmentStringsW, GetEnvironmentStringsW, WideCharToMultiByte, IsDebuggerPresent, OutputDebugStringW, RtlCaptureContext, RtlLookupFunctionEntry, RtlVirtualUnwind, UnhandledExceptionFilter, RtlUnwind, GetCurrentProcess, TerminateProcess, IsProcessorFeaturePresent, GetStartupInfoW, QueryPerformanceCounter, GetCurrentProcessId, GetCurrentThreadId, GetSystemTimeAsFileTime, InitializeSListHead, RtlPcToFileHeader, RtlUnwindEx, InterlockedPushEntrySList, InterlockedFlushSList, SetLastError, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, ExitProcess, GetModuleHandleExW, GetCurrentThread, HeapFree, HeapAlloc, HeapSize, HeapReAlloc, GetStdHandle, GetFileType, FindClose, FindFirstFileExW, FindNextFileW, IsValidCodePage, GetACP, GetOEMCP, GetCPInfo, GetCommandLineA, GetCommandLineW
                          USER32.dllShowWindow, CharNextW, UnregisterClassW, MessageBoxA
                          ADVAPI32.dllRegQueryInfoKeyW, RegOpenKeyExW, RegEnumKeyExW, RegDeleteValueW, RegDeleteKeyW, RegCreateKeyExW, RegCloseKey, RegSetValueExW
                          ole32.dllCoCreateInstance, CoCreateFreeThreadedMarshaler, CoTaskMemAlloc, CoTaskMemRealloc, CoTaskMemFree, CoInitialize, StringFromGUID2
                          OLEAUT32.dllLoadTypeLib, UnRegisterTypeLib, VarUI4FromStr, SysFreeString, SysAllocString
                          NameOrdinalAddress
                          DllCanUnloadNow10x180003102
                          DllGetClassObject20x180003be3
                          DllRegisterServer30x1800013fc
                          DllUnregisterServer40x180003521
                          Language of compilation systemCountry where language is spokenMap
                          EnglishUnited States
                          TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                          192.168.2.5174.138.33.494976870802404316 07/23/22-04:56:42.473067TCP2404316ET CNC Feodo Tracker Reported CnC Server TCP group 9497687080192.168.2.5174.138.33.49
                          TimestampSource PortDest PortSource IPDest IP
                          Jul 23, 2022 04:56:42.473067045 CEST497687080192.168.2.5174.138.33.49
                          Jul 23, 2022 04:56:42.574515104 CEST708049768174.138.33.49192.168.2.5
                          Jul 23, 2022 04:56:42.574670076 CEST497687080192.168.2.5174.138.33.49
                          Jul 23, 2022 04:56:42.607347012 CEST497687080192.168.2.5174.138.33.49
                          Jul 23, 2022 04:56:42.713720083 CEST708049768174.138.33.49192.168.2.5
                          Jul 23, 2022 04:56:42.744929075 CEST708049768174.138.33.49192.168.2.5
                          Jul 23, 2022 04:56:42.744982958 CEST708049768174.138.33.49192.168.2.5
                          Jul 23, 2022 04:56:42.745028019 CEST497687080192.168.2.5174.138.33.49
                          Jul 23, 2022 04:56:42.745078087 CEST497687080192.168.2.5174.138.33.49
                          Jul 23, 2022 04:56:43.195605040 CEST497687080192.168.2.5174.138.33.49
                          Jul 23, 2022 04:56:43.300020933 CEST708049768174.138.33.49192.168.2.5
                          Jul 23, 2022 04:56:43.300179005 CEST497687080192.168.2.5174.138.33.49
                          Jul 23, 2022 04:56:43.303195000 CEST497687080192.168.2.5174.138.33.49
                          Jul 23, 2022 04:56:43.444097042 CEST708049768174.138.33.49192.168.2.5
                          Jul 23, 2022 04:56:43.895623922 CEST708049768174.138.33.49192.168.2.5
                          Jul 23, 2022 04:56:43.896034956 CEST497687080192.168.2.5174.138.33.49
                          Jul 23, 2022 04:56:46.909363031 CEST708049768174.138.33.49192.168.2.5
                          Jul 23, 2022 04:56:46.909475088 CEST497687080192.168.2.5174.138.33.49
                          Jul 23, 2022 04:56:46.909478903 CEST708049768174.138.33.49192.168.2.5
                          Jul 23, 2022 04:56:46.909584045 CEST497687080192.168.2.5174.138.33.49
                          Jul 23, 2022 04:58:32.400583029 CEST497687080192.168.2.5174.138.33.49
                          Jul 23, 2022 04:58:32.400631905 CEST497687080192.168.2.5174.138.33.49

                          Click to jump to process

                          Target ID:3
                          Start time:04:56:13
                          Start date:23/07/2022
                          Path:C:\Windows\System32\loaddll64.exe
                          Wow64 process (32bit):false
                          Commandline:loaddll64.exe "C:\Users\user\Desktop\548IrCt4hj.dll"
                          Imagebase:0x7ff6044c0000
                          File size:140288 bytes
                          MD5 hash:4E8A40CAD6CCC047914E3A7830A2D8AA
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:high

                          Target ID:4
                          Start time:04:56:14
                          Start date:23/07/2022
                          Path:C:\Windows\System32\cmd.exe
                          Wow64 process (32bit):false
                          Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\548IrCt4hj.dll",#1
                          Imagebase:0x7ff602050000
                          File size:273920 bytes
                          MD5 hash:4E2ACF4F8A396486AB4268C94A6A245F
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:high

                          Target ID:5
                          Start time:04:56:14
                          Start date:23/07/2022
                          Path:C:\Windows\System32\regsvr32.exe
                          Wow64 process (32bit):false
                          Commandline:regsvr32.exe /s C:\Users\user\Desktop\548IrCt4hj.dll
                          Imagebase:0x7ff776530000
                          File size:24064 bytes
                          MD5 hash:D78B75FC68247E8A63ACBA846182740E
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Yara matches:
                          • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000005.00000002.427012616.0000000001120000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000005.00000002.427064425.0000000001151000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
                          Reputation:high

                          Target ID:6
                          Start time:04:56:14
                          Start date:23/07/2022
                          Path:C:\Windows\System32\rundll32.exe
                          Wow64 process (32bit):false
                          Commandline:rundll32.exe "C:\Users\user\Desktop\548IrCt4hj.dll",#1
                          Imagebase:0x7ff79d320000
                          File size:69632 bytes
                          MD5 hash:73C519F050C20580F8A62C849D49215A
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Yara matches:
                          • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000006.00000002.422757747.000001F33EB00000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000006.00000002.422895400.000001F33EC51000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
                          Reputation:high

                          Target ID:7
                          Start time:04:56:14
                          Start date:23/07/2022
                          Path:C:\Windows\System32\rundll32.exe
                          Wow64 process (32bit):false
                          Commandline:rundll32.exe C:\Users\user\Desktop\548IrCt4hj.dll,DllCanUnloadNow
                          Imagebase:0x7ff79d320000
                          File size:69632 bytes
                          MD5 hash:73C519F050C20580F8A62C849D49215A
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Yara matches:
                          • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000007.00000002.424123479.000001E034440000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000007.00000002.424307117.000001E034471000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
                          Reputation:high

                          Target ID:10
                          Start time:04:56:17
                          Start date:23/07/2022
                          Path:C:\Windows\System32\regsvr32.exe
                          Wow64 process (32bit):false
                          Commandline:C:\Windows\system32\regsvr32.exe "C:\Windows\system32\ZPLPsNKH\eFntQ.dll"
                          Imagebase:0x7ff776530000
                          File size:24064 bytes
                          MD5 hash:D78B75FC68247E8A63ACBA846182740E
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Yara matches:
                          • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000A.00000002.940693332.0000000000C20000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000A.00000002.940812969.00000000024B1000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_Emotet_3, Description: , Source: 0000000A.00000002.940180760.0000000000AEB000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                          Reputation:high

                          Target ID:11
                          Start time:04:56:18
                          Start date:23/07/2022
                          Path:C:\Windows\System32\rundll32.exe
                          Wow64 process (32bit):false
                          Commandline:rundll32.exe C:\Users\user\Desktop\548IrCt4hj.dll,DllGetClassObject
                          Imagebase:0x7ff79d320000
                          File size:69632 bytes
                          MD5 hash:73C519F050C20580F8A62C849D49215A
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:high

                          Target ID:12
                          Start time:04:56:21
                          Start date:23/07/2022
                          Path:C:\Windows\System32\rundll32.exe
                          Wow64 process (32bit):false
                          Commandline:rundll32.exe C:\Users\user\Desktop\548IrCt4hj.dll,DllRegisterServer
                          Imagebase:0x7ff79d320000
                          File size:69632 bytes
                          MD5 hash:73C519F050C20580F8A62C849D49215A
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:high

                          Target ID:16
                          Start time:04:56:35
                          Start date:23/07/2022
                          Path:C:\Windows\System32\svchost.exe
                          Wow64 process (32bit):false
                          Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p
                          Imagebase:0x7ff78ca80000
                          File size:51288 bytes
                          MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:high

                          Target ID:18
                          Start time:04:56:42
                          Start date:23/07/2022
                          Path:C:\Windows\System32\svchost.exe
                          Wow64 process (32bit):false
                          Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p
                          Imagebase:0x7ff78ca80000
                          File size:51288 bytes
                          MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language

                          Target ID:19
                          Start time:04:56:49
                          Start date:23/07/2022
                          Path:C:\Windows\System32\svchost.exe
                          Wow64 process (32bit):false
                          Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
                          Imagebase:0x7ff78ca80000
                          File size:51288 bytes
                          MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language

                          Target ID:20
                          Start time:04:56:58
                          Start date:23/07/2022
                          Path:C:\Windows\System32\svchost.exe
                          Wow64 process (32bit):false
                          Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p
                          Imagebase:0x7ff78ca80000
                          File size:51288 bytes
                          MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language

                          Target ID:21
                          Start time:04:56:59
                          Start date:23/07/2022
                          Path:C:\Windows\System32\svchost.exe
                          Wow64 process (32bit):false
                          Commandline:C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
                          Imagebase:0x7ff78ca80000
                          File size:51288 bytes
                          MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language

                          Target ID:25
                          Start time:04:57:11
                          Start date:23/07/2022
                          Path:C:\Windows\System32\svchost.exe
                          Wow64 process (32bit):false
                          Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p
                          Imagebase:0x7ff78ca80000
                          File size:51288 bytes
                          MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language

                          No disassembly