Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
UC2DFXQIBiE2kQ.dll

Overview

General Information

Sample Name:UC2DFXQIBiE2kQ.dll
Analysis ID:747450
MD5:e2ec88ae31e147d1976368c6a8988d3c
SHA1:937a21ced7f2663c923c9c614cbe06d95def511a
SHA256:ae7e655db35a71a3b2df96051d722d7995ec94feea3cbd59bec501042ab40847
Infos:

Detection

Emotet
Score:84
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Yara detected Emotet
System process connects to network (likely due to code injection or exploit)
Snort IDS alert for network traffic
Creates an autostart registry key pointing to binary in C:\Windows
C2 URLs / IPs found in malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Queries the volume information (name, serial number etc) of a device
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query locales information (e.g. system language)
Deletes files inside the Windows folder
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Creates files inside the system directory
PE file contains sections with non-standard names
Internet Provider seen in connection with other malware
Detected potential crypto function
Contains functionality to query CPU information (cpuid)
Found potential string decryption / allocating functions
Sample execution stops while process was sleeping (likely an evasion)
Contains functionality which may be used to detect a debugger (GetProcessHeap)
IP address seen in connection with other malware
Tries to load missing DLLs
Drops PE files to the windows directory (C:\Windows)
Checks if the current process is being debugged
Connects to several IPs in different countries
Registers a DLL
Found large amount of non-executed APIs
Uses Microsoft's Enhanced Cryptographic Provider
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • loaddll64.exe (PID: 4348 cmdline: loaddll64.exe "C:\Users\user\Desktop\UC2DFXQIBiE2kQ.dll" MD5: C676FC0263EDD17D4CE7D644B8F3FCD6)
    • conhost.exe (PID: 2260 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • cmd.exe (PID: 812 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\UC2DFXQIBiE2kQ.dll",#1 MD5: 4E2ACF4F8A396486AB4268C94A6A245F)
      • rundll32.exe (PID: 1516 cmdline: rundll32.exe "C:\Users\user\Desktop\UC2DFXQIBiE2kQ.dll",#1 MD5: 73C519F050C20580F8A62C849D49215A)
    • regsvr32.exe (PID: 4640 cmdline: regsvr32.exe /s C:\Users\user\Desktop\UC2DFXQIBiE2kQ.dll MD5: D78B75FC68247E8A63ACBA846182740E)
      • regsvr32.exe (PID: 5316 cmdline: C:\Windows\system32\regsvr32.exe "C:\Windows\system32\NzmNpNPvo\tzEWj.dll" MD5: D78B75FC68247E8A63ACBA846182740E)
    • rundll32.exe (PID: 4360 cmdline: rundll32.exe C:\Users\user\Desktop\UC2DFXQIBiE2kQ.dll,ACeujVZMknFDjv MD5: 73C519F050C20580F8A62C849D49215A)
    • rundll32.exe (PID: 1092 cmdline: rundll32.exe C:\Users\user\Desktop\UC2DFXQIBiE2kQ.dll,AHuDGMflBfPryOEYjuTfbzJdEM MD5: 73C519F050C20580F8A62C849D49215A)
    • rundll32.exe (PID: 1916 cmdline: rundll32.exe C:\Users\user\Desktop\UC2DFXQIBiE2kQ.dll,ATjQPkInxPUGuUu MD5: 73C519F050C20580F8A62C849D49215A)
  • regsvr32.exe (PID: 1960 cmdline: C:\Windows\system32\regsvr32.exe" "C:\Windows\system32\NzmNpNPvo\tzEWj.dll MD5: D78B75FC68247E8A63ACBA846182740E)
    • regsvr32.exe (PID: 5628 cmdline: C:\Windows\system32\regsvr32.exe "C:\Users\user\AppData\Local\VfjAKsbRVDLoO\aeuwPIzDFvIwK.dll" MD5: D78B75FC68247E8A63ACBA846182740E)
  • cleanup
{"C2 list": ["172.105.115.71:8080", "218.38.121.17:443", "186.250.48.5:443", "103.71.99.57:8080", "85.214.67.203:8080", "85.25.120.45:8080", "139.196.72.155:8080", "103.85.95.4:8080", "198.199.70.22:8080", "209.239.112.82:8080", "78.47.204.80:443", "36.67.23.59:443", "104.244.79.94:443", "62.171.178.147:8080", "195.77.239.39:8080", "103.56.149.105:8080", "80.211.107.116:8080", "93.104.209.107:8080", "174.138.33.49:7080", "202.28.34.99:8080", "178.62.112.199:8080", "114.79.130.68:443", "118.98.72.86:443", "103.41.204.169:8080", "178.238.225.252:8080", "83.229.80.93:8080", "46.101.98.60:8080", "82.98.180.154:7080", "87.106.97.83:7080", "196.44.98.190:8080", "139.59.80.108:8080", "103.224.241.74:8080", "103.254.12.236:7080", "185.148.169.10:8080", "165.22.254.236:8080", "37.44.244.177:8080", "54.37.228.122:443", "51.75.33.122:443", "128.199.217.206:443", "188.165.79.151:443", "210.57.209.142:8080", "160.16.143.191:8080", "175.126.176.79:8080", "202.134.4.210:7080", "103.126.216.86:443", "190.145.8.4:443", "128.199.242.164:8080", "64.227.55.231:8080"], "Public Key": ["RUNTMSAAAAD0LxqDNhonUYwk8sqo7IWuUllRdUiUBnACc6romsQoe1YJD7wIe4AheqYofpZFucPDXCZ0z9i+ooUffqeoLZU0mhn6vQAbAJA=", "RUNLMSAAAADYNZPXY4tQxd/N4Wn5sTYAm5tUOxY2ol1ELrI4MNhHNi640vSLasjYTHpFRBoG+o84vtr7AJachCzOHjaAJFCWaBkovQARAJA="]}
SourceRuleDescriptionAuthorStrings
00000005.00000002.309988911.000002A2C5F01000.00000020.00001000.00020000.00000000.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
    00000006.00000002.315862116.000001EEA9950000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
      0000000B.00000002.463359188.0000000001350000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
        00000007.00000002.825157778.00000000004D0000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
          00000005.00000002.309304798.000002A2C4510000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
            Click to see the 7 entries
            SourceRuleDescriptionAuthorStrings
            4.2.rundll32.exe.1e000100000.0.raw.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
              3.2.regsvr32.exe.c90000.0.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
                11.2.regsvr32.exe.1350000.0.raw.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
                  5.2.rundll32.exe.2a2c4510000.0.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
                    7.2.regsvr32.exe.4d0000.0.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
                      Click to see the 7 entries
                      No Sigma rule has matched
                      Timestamp:192.168.2.5115.178.55.2249702802404304 11/16/22-11:48:03.539047
                      SID:2404304
                      Source Port:49702
                      Destination Port:80
                      Protocol:TCP
                      Classtype:A Network Trojan was detected

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection

                      barindex
                      Source: UC2DFXQIBiE2kQ.dllReversingLabs: Detection: 80%
                      Source: UC2DFXQIBiE2kQ.dllVirustotal: Detection: 65%Perma Link
                      Source: 00000007.00000002.825271099.00000000005B8000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: Emotet {"C2 list": ["172.105.115.71:8080", "218.38.121.17:443", "186.250.48.5:443", "103.71.99.57:8080", "85.214.67.203:8080", "85.25.120.45:8080", "139.196.72.155:8080", "103.85.95.4:8080", "198.199.70.22:8080", "209.239.112.82:8080", "78.47.204.80:443", "36.67.23.59:443", "104.244.79.94:443", "62.171.178.147:8080", "195.77.239.39:8080", "103.56.149.105:8080", "80.211.107.116:8080", "93.104.209.107:8080", "174.138.33.49:7080", "202.28.34.99:8080", "178.62.112.199:8080", "114.79.130.68:443", "118.98.72.86:443", "103.41.204.169:8080", "178.238.225.252:8080", "83.229.80.93:8080", "46.101.98.60:8080", "82.98.180.154:7080", "87.106.97.83:7080", "196.44.98.190:8080", "139.59.80.108:8080", "103.224.241.74:8080", "103.254.12.236:7080", "185.148.169.10:8080", "165.22.254.236:8080", "37.44.244.177:8080", "54.37.228.122:443", "51.75.33.122:443", "128.199.217.206:443", "188.165.79.151:443", "210.57.209.142:8080", "160.16.143.191:8080", "175.126.176.79:8080", "202.134.4.210:7080", "103.126.216.86:443", "190.145.8.4:443", "128.199.242.164:8080", "64.227.55.231:8080"], "Public Key": ["RUNTMSAAAAD0LxqDNhonUYwk8sqo7IWuUllRdUiUBnACc6romsQoe1YJD7wIe4AheqYofpZFucPDXCZ0z9i+ooUffqeoLZU0mhn6vQAbAJA=", "RUNLMSAAAADYNZPXY4tQxd/N4Wn5sTYAm5tUOxY2ol1ELrI4MNhHNi640vSLasjYTHpFRBoG+o84vtr7AJachCzOHjaAJFCWaBkovQARAJA="]}
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018004A020 CryptStringToBinaryA,CryptStringToBinaryA,
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180029290 FindFirstFileExW,
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018002972C FindFirstFileExW,FindNextFileW,FindClose,
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180028B30 _invalid_parameter_noinfo,_invalid_parameter_noinfo,FindFirstFileExW,FindNextFileW,FindClose,FindClose,FindClose,
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180028B30 _invalid_parameter_noinfo,_invalid_parameter_noinfo,FindFirstFileExW,FindNextFileW,FindClose,FindClose,FindClose,

                      Networking

                      barindex
                      Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 115.178.55.22 80
                      Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 172.105.115.71 8080
                      Source: TrafficSnort IDS: 2404304 ET CNC Feodo Tracker Reported CnC Server TCP group 3 192.168.2.5:49702 -> 115.178.55.22:80
                      Source: Malware configuration extractorIPs: 172.105.115.71:8080
                      Source: Malware configuration extractorIPs: 218.38.121.17:443
                      Source: Malware configuration extractorIPs: 186.250.48.5:443
                      Source: Malware configuration extractorIPs: 103.71.99.57:8080
                      Source: Malware configuration extractorIPs: 85.214.67.203:8080
                      Source: Malware configuration extractorIPs: 85.25.120.45:8080
                      Source: Malware configuration extractorIPs: 139.196.72.155:8080
                      Source: Malware configuration extractorIPs: 103.85.95.4:8080
                      Source: Malware configuration extractorIPs: 198.199.70.22:8080
                      Source: Malware configuration extractorIPs: 209.239.112.82:8080
                      Source: Malware configuration extractorIPs: 78.47.204.80:443
                      Source: Malware configuration extractorIPs: 36.67.23.59:443
                      Source: Malware configuration extractorIPs: 104.244.79.94:443
                      Source: Malware configuration extractorIPs: 62.171.178.147:8080
                      Source: Malware configuration extractorIPs: 195.77.239.39:8080
                      Source: Malware configuration extractorIPs: 103.56.149.105:8080
                      Source: Malware configuration extractorIPs: 80.211.107.116:8080
                      Source: Malware configuration extractorIPs: 93.104.209.107:8080
                      Source: Malware configuration extractorIPs: 174.138.33.49:7080
                      Source: Malware configuration extractorIPs: 202.28.34.99:8080
                      Source: Malware configuration extractorIPs: 178.62.112.199:8080
                      Source: Malware configuration extractorIPs: 114.79.130.68:443
                      Source: Malware configuration extractorIPs: 118.98.72.86:443
                      Source: Malware configuration extractorIPs: 103.41.204.169:8080
                      Source: Malware configuration extractorIPs: 178.238.225.252:8080
                      Source: Malware configuration extractorIPs: 83.229.80.93:8080
                      Source: Malware configuration extractorIPs: 46.101.98.60:8080
                      Source: Malware configuration extractorIPs: 82.98.180.154:7080
                      Source: Malware configuration extractorIPs: 87.106.97.83:7080
                      Source: Malware configuration extractorIPs: 196.44.98.190:8080
                      Source: Malware configuration extractorIPs: 139.59.80.108:8080
                      Source: Malware configuration extractorIPs: 103.224.241.74:8080
                      Source: Malware configuration extractorIPs: 103.254.12.236:7080
                      Source: Malware configuration extractorIPs: 185.148.169.10:8080
                      Source: Malware configuration extractorIPs: 165.22.254.236:8080
                      Source: Malware configuration extractorIPs: 37.44.244.177:8080
                      Source: Malware configuration extractorIPs: 54.37.228.122:443
                      Source: Malware configuration extractorIPs: 51.75.33.122:443
                      Source: Malware configuration extractorIPs: 128.199.217.206:443
                      Source: Malware configuration extractorIPs: 188.165.79.151:443
                      Source: Malware configuration extractorIPs: 210.57.209.142:8080
                      Source: Malware configuration extractorIPs: 160.16.143.191:8080
                      Source: Malware configuration extractorIPs: 175.126.176.79:8080
                      Source: Malware configuration extractorIPs: 202.134.4.210:7080
                      Source: Malware configuration extractorIPs: 103.126.216.86:443
                      Source: Malware configuration extractorIPs: 190.145.8.4:443
                      Source: Malware configuration extractorIPs: 128.199.242.164:8080
                      Source: Malware configuration extractorIPs: 64.227.55.231:8080
                      Source: Joe Sandbox ViewASN Name: LINODE-APLinodeLLCUS LINODE-APLinodeLLCUS
                      Source: Joe Sandbox ViewASN Name: OVHFR OVHFR
                      Source: Joe Sandbox ViewIP Address: 172.105.115.71 172.105.115.71
                      Source: Joe Sandbox ViewIP Address: 188.165.79.151 188.165.79.151
                      Source: unknownNetwork traffic detected: IP country count 20
                      Source: unknownTCP traffic detected without corresponding DNS query: 115.178.55.22
                      Source: unknownTCP traffic detected without corresponding DNS query: 115.178.55.22
                      Source: unknownTCP traffic detected without corresponding DNS query: 115.178.55.22
                      Source: unknownTCP traffic detected without corresponding DNS query: 172.105.115.71
                      Source: unknownTCP traffic detected without corresponding DNS query: 172.105.115.71
                      Source: unknownTCP traffic detected without corresponding DNS query: 172.105.115.71
                      Source: unknownTCP traffic detected without corresponding DNS query: 172.105.115.71
                      Source: unknownTCP traffic detected without corresponding DNS query: 172.105.115.71
                      Source: unknownTCP traffic detected without corresponding DNS query: 172.105.115.71
                      Source: unknownTCP traffic detected without corresponding DNS query: 172.105.115.71
                      Source: unknownTCP traffic detected without corresponding DNS query: 172.105.115.71
                      Source: unknownTCP traffic detected without corresponding DNS query: 172.105.115.71
                      Source: unknownTCP traffic detected without corresponding DNS query: 172.105.115.71
                      Source: unknownTCP traffic detected without corresponding DNS query: 172.105.115.71
                      Source: unknownTCP traffic detected without corresponding DNS query: 172.105.115.71
                      Source: regsvr32.exe, 00000007.00000002.825572065.0000000000648000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000003.557007338.0000000000635000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000003.558194793.0000000000647000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
                      Source: regsvr32.exe, 00000007.00000003.423458103.000000000069A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/
                      Source: regsvr32.exe, 00000007.00000002.825572065.0000000000648000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000003.557007338.0000000000635000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000003.558194793.0000000000647000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/U
                      Source: regsvr32.exe, 00000007.00000003.558194793.0000000000647000.00000004.00000020.00020000.00000000.sdmp, 77EC63BDA74BD0D0E0426DC8F80085060.7.drString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
                      Source: regsvr32.exe, 00000007.00000002.825572065.0000000000648000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000003.557007338.0000000000635000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000003.558194793.0000000000647000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000003.423458103.000000000069A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab?f88184c2e0311
                      Source: regsvr32.exe, 00000007.00000002.825452249.0000000000609000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000003.558130605.0000000000608000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000003.557978959.00000000005FE000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000003.556670848.00000000005FE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en7
                      Source: regsvr32.exe, 00000007.00000002.825452249.0000000000609000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000003.558149444.000000000060F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://172.105.115.71:8080/
                      Source: regsvr32.exe, 00000007.00000002.825452249.0000000000609000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000003.558149444.000000000060F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://172.105.115.71:8080/xkripgcuqclmh/pzukcvmjdrcsjp/ovittxpu/
                      Source: regsvr32.exe, 00000007.00000003.556869652.0000000000623000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000002.825513789.0000000000623000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000003.558725504.0000000000623000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://172.105.115.71:8080/xkripgcuqclmh/pzukcvmjdrcsjp/ovittxpu/d

                      E-Banking Fraud

                      barindex
                      Source: Yara matchFile source: 4.2.rundll32.exe.1e000100000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.regsvr32.exe.c90000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 11.2.regsvr32.exe.1350000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.rundll32.exe.2a2c4510000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 7.2.regsvr32.exe.4d0000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.2.rundll32.exe.1eea9950000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.regsvr32.exe.c90000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 11.2.regsvr32.exe.1350000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.2.rundll32.exe.1eea9950000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.rundll32.exe.2a2c4510000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 7.2.regsvr32.exe.4d0000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.1e000100000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000005.00000002.309988911.000002A2C5F01000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000006.00000002.315862116.000001EEA9950000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000B.00000002.463359188.0000000001350000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000007.00000002.825157778.00000000004D0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.309304798.000002A2C4510000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000007.00000002.825690145.0000000000731000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.307121322.000001E000100000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.314073232.0000000000C90000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.307321524.000001E000141000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000B.00000002.463986640.0000000002C41000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.314301645.0000000002731000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000006.00000002.315937172.000001EEA9991000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: C:\Windows\System32\regsvr32.exeFile deleted: C:\Windows\System32\NzmNpNPvo\tzEWj.dll:Zone.IdentifierJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeFile created: C:\Windows\system32\NzmNpNPvo\Jump to behavior
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180044C30
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180031018
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800391F8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180020204
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018001F22C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018003D23C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180029290
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180024460
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018001F4B0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800204D0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018003459C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018003B5A0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800305F8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180017604
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018001F74C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180032824
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180037854
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018002B890
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018000A93C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018003A9A0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018001F9B4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180026A0C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180028B30
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018002B890
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018001FC30
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180031C3C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180028B30
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018003AE50
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018001FF10
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180032F94
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00C70000
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_027548E0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_027338A5
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0273B1E0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02739E38
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02750454
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02758C94
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02734DDC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02735DB4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0274827C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02742244
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02749230
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0273BA24
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02751A2C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02731A1C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02758A04
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0274FA08
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02737AF0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0274B2F0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0273EAC4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0274629C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0275629C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02739298
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02752A84
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02731364
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0273C364
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0273E368
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02731B5C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02736B5C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02757348
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02734B4C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02745334
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0274D32C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02740310
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02745B18
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_027473F8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02747BF8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0273F3E0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02733BE8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02739BEC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02752B8C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0274FB88
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02743B88
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0273CB8D
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0275005C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02732834
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0273E828
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02731000
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0273B8D0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_027498DC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_027338DC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_027448B0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_027378B6
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_027410AC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0274B898
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02754098
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02736880
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0274308C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0274C974
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0273F174
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02740954
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02739144
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02750930
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02759124
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02732128
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02742110
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0273D1E0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_027499E8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_027399EC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0273A1D4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0274C1DC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_027379D8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_027369C0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_027459A0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0273D1AC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02747198
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02741664
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02731660
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02736650
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0273BE34
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0274E614
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02748ECC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_027396B8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02757EA4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02745694
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02758690
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02737694
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02743698
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0273569C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02754680
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0273AE84
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02748778
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0273FF64
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0274E76C
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000001E000130000
                      Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000002A2C4540000
                      Source: C:\Windows\System32\rundll32.exeCode function: 6_2_000001EEA9980000
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00500000
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_007548E0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_007338DC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00752CBC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00739144
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0073B1E0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00734DDC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00735DB4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00732A7C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00739E38
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0074FA08
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0074E76C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0074D718
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_007473F8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00733BE8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00735478
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00746464
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00750454
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0075005C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00744C48
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00732834
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0073E828
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0073741C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00731000
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00745400
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0073CC06
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00753C0C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_007384F8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_007564F8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0073B8D0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_007498DC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00731CCC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_007448B0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_007378B6
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00734CA0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_007410AC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00758C94
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0073C498
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0074B898
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00754098
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00736880
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0074308C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0075748C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0074C974
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0073E570
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0073F174
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00748560
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00759568
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00740954
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00750D54
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0074F550
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00750930
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00743524
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00759124
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0074B520
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00739D24
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00732128
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00753D28
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00742110
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0073BD00
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00748D0C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00745508
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0073D1E0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_007499E8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_007399EC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0073A1D4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0074C1DC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_007379D8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_007369C0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_007459A0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00741DAC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0073D1AC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00735590
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00747198
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00755D84
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0074827C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00741664
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00731660
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00736650
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00742244
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00749230
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0073BE34
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0073BA24
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00751A2C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0074E614
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00731A1C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00758A04
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00737AF0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0074B2F0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0073EAC4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00748ECC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_007396B8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00757EA4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0073C6A2
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00745694
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00758690
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00737694
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0074629C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0075629C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00739298
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00743698
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0073569C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00752A84
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00754680
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0073AE84
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00748778
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00731364
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0073FF64
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0073C364
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0073E368
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00736B5C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00731B5C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00757348
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00734B4C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00745334
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0074CF30
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0073A734
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0074D32C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00751728
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00755B28
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00740310
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00745B18
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0073871C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0073E708
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00747BF8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0073F3E0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00743FE0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00739BEC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_007557B4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_007547B0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00744FA4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00738FA0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_007497AC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00742780
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00752B8C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00743B88
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0074FB88
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02C30000
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02C49E38
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02C55B18
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02C648E0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02C68C94
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02C438A5
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02C60454
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02C44DDC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02C4B1E0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02C45DB4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02C4EAC4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02C58ECC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02C47AF0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02C5B2F0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02C4AE84
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02C62A84
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02C64680
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02C47694
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02C55694
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02C68690
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02C4569C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02C5629C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02C6629C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02C49298
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02C53698
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02C67EA4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02C496B8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02C52244
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02C46650
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02C51664
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02C41660
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02C5827C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02C68A04
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02C5FA08
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02C5E614
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02C41A1C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02C4BA24
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02C61A2C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02C4BE34
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02C59230
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02C4F3E0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02C53FE0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02C49BEC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02C43BE8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02C573F8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02C57BF8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02C52780
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02C4CB8D
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02C62B8C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02C5FB88
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02C53B88
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02C54FA4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02C48FA0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02C597AC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02C657B4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02C647B0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02C44B4C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02C67348
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02C46B5C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02C41B5C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02C41364
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02C4FF64
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02C4C364
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02C5E76C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02C4E368
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02C58778
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02C4E708
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02C50310
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02C4871C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02C5D32C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02C61728
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02C65B28
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02C4A734
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02C55334
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02C5CF30
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02C41CCC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02C4B8D0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02C438DC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02C598DC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02C484F8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02C664F8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02C46880
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02C5308C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02C6748C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02C4C498
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02C5B898
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02C64098
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02C44CA0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02C510AC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02C478B6
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02C548B0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02C54C48
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02C6005C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02C4D864
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02C56464
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02C45478
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02C41000
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02C55400
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02C63C0C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02C4741C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02C4E828
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02C42834
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02C469C0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02C4D1CA
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02C4A1D4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02C5C1DC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02C479D8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02C499EC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02C599E8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02C65D84
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02C45590
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02C57198
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02C559A0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02C4D1AC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02C51DAC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02C49144
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02C50954
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02C60D54
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02C5F550
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02C58560
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02C69568
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02C4F174
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02C5C974
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02C4E570
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02C4BD00
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02C58D0C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02C55508
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02C52110
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02C49D24
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02C53524
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02C69124
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02C5B520
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02C42128
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02C63D28
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02C60930
                      Source: C:\Windows\System32\regsvr32.exeCode function: String function: 000000018002CA30 appears 48 times
                      Source: C:\Windows\System32\regsvr32.exeSection loaded: sfc.dll
                      Source: C:\Windows\System32\regsvr32.exeSection loaded: sfc.dll
                      Source: C:\Windows\System32\regsvr32.exeSection loaded: sfc.dll
                      Source: C:\Windows\System32\regsvr32.exeSection loaded: sfc.dll
                      Source: UC2DFXQIBiE2kQ.dllReversingLabs: Detection: 80%
                      Source: UC2DFXQIBiE2kQ.dllVirustotal: Detection: 65%
                      Source: UC2DFXQIBiE2kQ.dllStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      Source: C:\Windows\System32\loaddll64.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                      Source: unknownProcess created: C:\Windows\System32\loaddll64.exe loaddll64.exe "C:\Users\user\Desktop\UC2DFXQIBiE2kQ.dll"
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\UC2DFXQIBiE2kQ.dll",#1
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\UC2DFXQIBiE2kQ.dll
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\UC2DFXQIBiE2kQ.dll",#1
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\UC2DFXQIBiE2kQ.dll,ACeujVZMknFDjv
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\UC2DFXQIBiE2kQ.dll,AHuDGMflBfPryOEYjuTfbzJdEM
                      Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\System32\regsvr32.exe C:\Windows\system32\regsvr32.exe "C:\Windows\system32\NzmNpNPvo\tzEWj.dll"
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\UC2DFXQIBiE2kQ.dll,ATjQPkInxPUGuUu
                      Source: unknownProcess created: C:\Windows\System32\regsvr32.exe C:\Windows\system32\regsvr32.exe" "C:\Windows\system32\NzmNpNPvo\tzEWj.dll
                      Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\System32\regsvr32.exe C:\Windows\system32\regsvr32.exe "C:\Users\user\AppData\Local\VfjAKsbRVDLoO\aeuwPIzDFvIwK.dll"
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\UC2DFXQIBiE2kQ.dll",#1
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\UC2DFXQIBiE2kQ.dll
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\UC2DFXQIBiE2kQ.dll,ACeujVZMknFDjv
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\UC2DFXQIBiE2kQ.dll,AHuDGMflBfPryOEYjuTfbzJdEM
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\UC2DFXQIBiE2kQ.dll,ATjQPkInxPUGuUu
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\UC2DFXQIBiE2kQ.dll",#1
                      Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\System32\regsvr32.exe C:\Windows\system32\regsvr32.exe "C:\Windows\system32\NzmNpNPvo\tzEWj.dll"
                      Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\System32\regsvr32.exe C:\Windows\system32\regsvr32.exe "C:\Users\user\AppData\Local\VfjAKsbRVDLoO\aeuwPIzDFvIwK.dll"
                      Source: C:\Windows\System32\regsvr32.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32
                      Source: C:\Windows\System32\regsvr32.exeFile created: C:\Users\user\AppData\Local\VfjAKsbRVDLoO\Jump to behavior
                      Source: classification engineClassification label: mal84.troj.evad.winDLL@19/2@0/49
                      Source: C:\Windows\System32\regsvr32.exeFile read: C:\Users\desktop.iniJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02735DB4 FindCloseChangeNotification,CreateToolhelp32Snapshot,Process32FirstW,
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\UC2DFXQIBiE2kQ.dll",#1
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2260:120:WilError_01
                      Source: C:\Windows\System32\regsvr32.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Windows\System32\rundll32.exeAutomated click: OK
                      Source: C:\Windows\System32\regsvr32.exeAutomated click: OK
                      Source: Window RecorderWindow detected: More than 3 window changes detected
                      Source: UC2DFXQIBiE2kQ.dllStatic PE information: More than 250 > 100 exports found
                      Source: UC2DFXQIBiE2kQ.dllStatic PE information: Image base 0x180000000 > 0x60000000
                      Source: UC2DFXQIBiE2kQ.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                      Source: UC2DFXQIBiE2kQ.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                      Source: UC2DFXQIBiE2kQ.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                      Source: UC2DFXQIBiE2kQ.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                      Source: UC2DFXQIBiE2kQ.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                      Source: UC2DFXQIBiE2kQ.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                      Source: UC2DFXQIBiE2kQ.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                      Source: UC2DFXQIBiE2kQ.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                      Source: UC2DFXQIBiE2kQ.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                      Source: UC2DFXQIBiE2kQ.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                      Source: UC2DFXQIBiE2kQ.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                      Source: UC2DFXQIBiE2kQ.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800131BD push rdi; ret
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180013749 push rdi; ret
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02753A7E push ebp; ret
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0273838C push eax; ret
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0274E0E9 push 8B48E1F7h; retf
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0274E0D3 push 09B8E1F7h; retf
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02753127 push ebp; ret
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02752E55 push ebp; retf
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0073838C push eax; ret
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02C62E55 push ebp; retf
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02C63A7E push ebp; ret
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02C63BE1 push ebp; ret
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02C4838C push eax; ret
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02C62F5E push ebp; ret
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02C5E0D3 push 09B8E1F7h; retf
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02C5E0E9 push 8B48E1F7h; retf
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02C5E5C5 pushad ; ret
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02C63127 push ebp; ret
                      Source: UC2DFXQIBiE2kQ.dllStatic PE information: section name: _RDATA
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\UC2DFXQIBiE2kQ.dll
                      Source: C:\Windows\System32\regsvr32.exePE file moved: C:\Windows\System32\NzmNpNPvo\tzEWj.dllJump to behavior

                      Boot Survival

                      barindex
                      Source: C:\Windows\System32\regsvr32.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run tzEWj.dllJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run tzEWj.dllJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run tzEWj.dllJump to behavior

                      Hooking and other Techniques for Hiding and Protection

                      barindex
                      Source: C:\Windows\System32\regsvr32.exeFile opened: C:\Windows\system32\NzmNpNPvo\tzEWj.dll:Zone.Identifier read attributes | delete
                      Source: C:\Windows\System32\regsvr32.exeFile opened: C:\Users\user\AppData\Local\VfjAKsbRVDLoO\aeuwPIzDFvIwK.dll:Zone.Identifier read attributes | delete
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\regsvr32.exe TID: 4500Thread sleep time: -60000s >= -30000s
                      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                      Source: C:\Windows\System32\regsvr32.exeAPI coverage: 7.5 %
                      Source: C:\Windows\System32\regsvr32.exeProcess information queried: ProcessInformation
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180029290 FindFirstFileExW,
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018002972C FindFirstFileExW,FindNextFileW,FindClose,
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180028B30 _invalid_parameter_noinfo,_invalid_parameter_noinfo,FindFirstFileExW,FindNextFileW,FindClose,FindClose,FindClose,
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180028B30 _invalid_parameter_noinfo,_invalid_parameter_noinfo,FindFirstFileExW,FindNextFileW,FindClose,FindClose,FindClose,
                      Source: C:\Windows\System32\regsvr32.exeFile Volume queried: C:\ FullSizeInformation
                      Source: C:\Windows\System32\regsvr32.exeFile Volume queried: C:\ FullSizeInformation
                      Source: regsvr32.exe, 00000007.00000002.825398466.00000000005EF000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000003.556613536.00000000005EF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW0
                      Source: regsvr32.exe, 00000007.00000002.825546472.000000000063C000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000003.557007338.0000000000635000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000003.558412431.0000000000635000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180003460 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018002DE88 GetProcessHeap,
                      Source: C:\Windows\System32\loaddll64.exeProcess queried: DebugPort
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180003460 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180003648 SetUnhandledExceptionFilter,
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800156F8 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180002E94 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,

                      HIPS / PFW / Operating System Protection Evasion

                      barindex
                      Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 115.178.55.22 80
                      Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 172.105.115.71 8080
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\UC2DFXQIBiE2kQ.dll",#1
                      Source: C:\Windows\System32\regsvr32.exeQueries volume information: C:\ VolumeInformation
                      Source: C:\Windows\System32\regsvr32.exeCode function: EnumSystemLocalesW,
                      Source: C:\Windows\System32\regsvr32.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,
                      Source: C:\Windows\System32\regsvr32.exeCode function: EnumSystemLocalesW,
                      Source: C:\Windows\System32\regsvr32.exeCode function: GetLocaleInfoW,
                      Source: C:\Windows\System32\regsvr32.exeCode function: try_get_function,GetLocaleInfoW,
                      Source: C:\Windows\System32\regsvr32.exeCode function: EnumSystemLocalesW,
                      Source: C:\Windows\System32\regsvr32.exeCode function: EnumSystemLocalesW,
                      Source: C:\Windows\System32\regsvr32.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,
                      Source: C:\Windows\System32\regsvr32.exeCode function: GetLocaleInfoW,
                      Source: C:\Windows\System32\regsvr32.exeCode function: EnumSystemLocalesW,GetUserDefaultLCID,ProcessCodePage,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,
                      Source: C:\Windows\System32\regsvr32.exeCode function: TranslateName,TranslateName,GetACP,IsValidCodePage,GetLocaleInfoW,
                      Source: C:\Windows\System32\regsvr32.exeCode function: EnumSystemLocalesW,
                      Source: C:\Windows\System32\regsvr32.exeCode function: EnumSystemLocalesW,
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800243D0 cpuid
                      Source: C:\Windows\System32\regsvr32.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018002D450 try_get_function,GetSystemTimeAsFileTime,

                      Stealing of Sensitive Information

                      barindex
                      Source: Yara matchFile source: 4.2.rundll32.exe.1e000100000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.regsvr32.exe.c90000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 11.2.regsvr32.exe.1350000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.rundll32.exe.2a2c4510000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 7.2.regsvr32.exe.4d0000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.2.rundll32.exe.1eea9950000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.regsvr32.exe.c90000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 11.2.regsvr32.exe.1350000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.2.rundll32.exe.1eea9950000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.rundll32.exe.2a2c4510000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 7.2.regsvr32.exe.4d0000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.1e000100000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000005.00000002.309988911.000002A2C5F01000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000006.00000002.315862116.000001EEA9950000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000B.00000002.463359188.0000000001350000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000007.00000002.825157778.00000000004D0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.309304798.000002A2C4510000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000007.00000002.825690145.0000000000731000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.307121322.000001E000100000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.314073232.0000000000C90000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.307321524.000001E000141000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000B.00000002.463986640.0000000002C41000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.314301645.0000000002731000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000006.00000002.315937172.000001EEA9991000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                      Valid AccountsWindows Management Instrumentation11
                      Registry Run Keys / Startup Folder
                      111
                      Process Injection
                      21
                      Masquerading
                      OS Credential Dumping1
                      System Time Discovery
                      Remote Services1
                      Archive Collected Data
                      Exfiltration Over Other Network Medium2
                      Encrypted Channel
                      Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                      Default AccountsScheduled Task/Job1
                      DLL Side-Loading
                      11
                      Registry Run Keys / Startup Folder
                      2
                      Virtualization/Sandbox Evasion
                      LSASS Memory31
                      Security Software Discovery
                      Remote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth1
                      Application Layer Protocol
                      Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                      Domain AccountsAt (Linux)Logon Script (Windows)1
                      DLL Side-Loading
                      111
                      Process Injection
                      Security Account Manager2
                      Virtualization/Sandbox Evasion
                      SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                      Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)1
                      Deobfuscate/Decode Files or Information
                      NTDS2
                      Process Discovery
                      Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
                      Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
                      Hidden Files and Directories
                      LSA Secrets1
                      Remote System Discovery
                      SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                      Replication Through Removable MediaLaunchdRc.commonRc.common2
                      Obfuscated Files or Information
                      Cached Domain Credentials2
                      File and Directory Discovery
                      VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                      External Remote ServicesScheduled TaskStartup ItemsStartup Items1
                      Regsvr32
                      DCSync34
                      System Information Discovery
                      Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                      Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job1
                      Rundll32
                      Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
                      Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)1
                      DLL Side-Loading
                      /etc/passwd and /etc/shadowSystem Network Connections DiscoverySoftware Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
                      Supply Chain CompromiseAppleScriptAt (Windows)At (Windows)1
                      File Deletion
                      Network SniffingProcess DiscoveryTaint Shared ContentLocal Data StagingExfiltration Over Unencrypted/Obfuscated Non-C2 ProtocolFile Transfer ProtocolsData Encrypted for Impact
                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet
                      behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 747450 Sample: UC2DFXQIBiE2kQ.dll Startdate: 16/11/2022 Architecture: WINDOWS Score: 84 30 103.224.241.74 WEBWERKS-AS-INWebWerksIndiaPvtLtdIN India 2->30 32 210.57.209.142 UNAIR-AS-IDUniversitasAirlanggaID Indonesia 2->32 34 45 other IPs or domains 2->34 40 Snort IDS alert for network traffic 2->40 42 Multi AV Scanner detection for submitted file 2->42 44 Yara detected Emotet 2->44 46 C2 URLs / IPs found in malware configuration 2->46 8 loaddll64.exe 1 2->8         started        10 regsvr32.exe 2 2->10         started        signatures3 process4 signatures5 13 regsvr32.exe 2 8->13         started        16 cmd.exe 1 8->16         started        18 rundll32.exe 8->18         started        22 3 other processes 8->22 52 Hides that the sample has been downloaded from the Internet (zone.identifier) 10->52 20 regsvr32.exe 10->20         started        process6 signatures7 54 Hides that the sample has been downloaded from the Internet (zone.identifier) 13->54 24 regsvr32.exe 1 13->24         started        28 rundll32.exe 16->28         started        process8 dnsIp9 36 115.178.55.22, 49702, 80 SIMAYA-AS-IDPTSimayaJejaringMandiriID Indonesia 24->36 38 172.105.115.71, 49704, 8080 LINODE-APLinodeLLCUS United States 24->38 48 System process connects to network (likely due to code injection or exploit) 24->48 50 Creates an autostart registry key pointing to binary in C:\Windows 24->50 signatures10

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                      windows-stand
                      SourceDetectionScannerLabelLink
                      UC2DFXQIBiE2kQ.dll81%ReversingLabsWin64.Trojan.Emotet
                      UC2DFXQIBiE2kQ.dll65%VirustotalBrowse
                      No Antivirus matches
                      SourceDetectionScannerLabelLinkDownload
                      11.2.regsvr32.exe.1350000.0.unpack100%AviraHEUR/AGEN.1215461Download File
                      4.2.rundll32.exe.1e000100000.0.unpack100%AviraHEUR/AGEN.1215461Download File
                      6.2.rundll32.exe.1eea9950000.0.unpack100%AviraHEUR/AGEN.1215461Download File
                      5.2.rundll32.exe.2a2c4510000.0.unpack100%AviraHEUR/AGEN.1215461Download File
                      7.2.regsvr32.exe.4d0000.0.unpack100%AviraHEUR/AGEN.1215461Download File
                      3.2.regsvr32.exe.c90000.0.unpack100%AviraHEUR/AGEN.1215461Download File
                      No Antivirus matches
                      SourceDetectionScannerLabelLink
                      https://172.105.115.71:8080/0%Avira URL Cloudsafe
                      No contacted domains info
                      NameSourceMaliciousAntivirus DetectionReputation
                      https://172.105.115.71:8080/regsvr32.exe, 00000007.00000002.825452249.0000000000609000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000003.558149444.000000000060F000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      • No. of IPs < 25%
                      • 25% < No. of IPs < 50%
                      • 50% < No. of IPs < 75%
                      • 75% < No. of IPs
                      IPDomainCountryFlagASNASN NameMalicious
                      172.105.115.71
                      unknownUnited States
                      63949LINODE-APLinodeLLCUStrue
                      188.165.79.151
                      unknownFrance
                      16276OVHFRtrue
                      196.44.98.190
                      unknownGhana
                      327814EcobandGHtrue
                      174.138.33.49
                      unknownUnited States
                      14061DIGITALOCEAN-ASNUStrue
                      36.67.23.59
                      unknownIndonesia
                      17974TELKOMNET-AS2-APPTTelekomunikasiIndonesiaIDtrue
                      103.41.204.169
                      unknownIndonesia
                      58397INFINYS-AS-IDPTInfinysSystemIndonesiaIDtrue
                      85.214.67.203
                      unknownGermany
                      6724STRATOSTRATOAGDEtrue
                      83.229.80.93
                      unknownUnited Kingdom
                      8513SKYVISIONGBtrue
                      198.199.70.22
                      unknownUnited States
                      14061DIGITALOCEAN-ASNUStrue
                      93.104.209.107
                      unknownGermany
                      8767MNET-ASGermanyDEtrue
                      186.250.48.5
                      unknownBrazil
                      262807RedfoxTelecomunicacoesLtdaBRtrue
                      209.239.112.82
                      unknownUnited States
                      30083AS-30083-GO-DADDY-COM-LLCUStrue
                      175.126.176.79
                      unknownKorea Republic of
                      9523MOKWON-AS-KRMokwonUniversityKRtrue
                      128.199.242.164
                      unknownUnited Kingdom
                      14061DIGITALOCEAN-ASNUStrue
                      178.238.225.252
                      unknownGermany
                      51167CONTABODEtrue
                      46.101.98.60
                      unknownNetherlands
                      14061DIGITALOCEAN-ASNUStrue
                      190.145.8.4
                      unknownColombia
                      14080TelmexColombiaSACOtrue
                      82.98.180.154
                      unknownSpain
                      42612DINAHOSTING-ASEStrue
                      103.71.99.57
                      unknownIndia
                      135682AWDHPL-AS-INAdvikaWebDevelopmentsHostingPvtLtdINtrue
                      87.106.97.83
                      unknownGermany
                      8560ONEANDONE-ASBrauerstrasse48DEtrue
                      103.254.12.236
                      unknownViet Nam
                      56151DIGISTAR-VNDigiStarCompanyLimitedVNtrue
                      103.85.95.4
                      unknownIndonesia
                      136077IDNIC-UNSRAT-AS-IDUniversitasIslamNegeriMataramIDtrue
                      202.134.4.210
                      unknownIndonesia
                      7713TELKOMNET-AS-APPTTelekomunikasiIndonesiaIDtrue
                      165.22.254.236
                      unknownUnited States
                      14061DIGITALOCEAN-ASNUStrue
                      78.47.204.80
                      unknownGermany
                      24940HETZNER-ASDEtrue
                      118.98.72.86
                      unknownIndonesia
                      7713TELKOMNET-AS-APPTTelekomunikasiIndonesiaIDtrue
                      139.59.80.108
                      unknownSingapore
                      14061DIGITALOCEAN-ASNUStrue
                      104.244.79.94
                      unknownUnited States
                      53667PONYNETUStrue
                      37.44.244.177
                      unknownGermany
                      47583AS-HOSTINGERLTtrue
                      51.75.33.122
                      unknownFrance
                      16276OVHFRtrue
                      160.16.143.191
                      unknownJapan9370SAKURA-BSAKURAInternetIncJPtrue
                      103.56.149.105
                      unknownIndonesia
                      55688BEON-AS-IDPTBeonIntermediaIDtrue
                      85.25.120.45
                      unknownGermany
                      8972GD-EMEA-DC-SXB1DEtrue
                      139.196.72.155
                      unknownChina
                      37963CNNIC-ALIBABA-CN-NET-APHangzhouAlibabaAdvertisingCoLtdtrue
                      115.178.55.22
                      unknownIndonesia
                      38783SIMAYA-AS-IDPTSimayaJejaringMandiriIDtrue
                      103.126.216.86
                      unknownBangladesh
                      138482SKYVIEW-AS-APSKYVIEWONLINELTDBDtrue
                      128.199.217.206
                      unknownUnited Kingdom
                      14061DIGITALOCEAN-ASNUStrue
                      114.79.130.68
                      unknownIndia
                      45769DVOIS-IND-VoisBroadbandPvtLtdINtrue
                      103.224.241.74
                      unknownIndia
                      133296WEBWERKS-AS-INWebWerksIndiaPvtLtdINtrue
                      210.57.209.142
                      unknownIndonesia
                      38142UNAIR-AS-IDUniversitasAirlanggaIDtrue
                      202.28.34.99
                      unknownThailand
                      9562MSU-TH-APMahasarakhamUniversityTHtrue
                      80.211.107.116
                      unknownItaly
                      31034ARUBA-ASNITtrue
                      54.37.228.122
                      unknownFrance
                      16276OVHFRtrue
                      218.38.121.17
                      unknownKorea Republic of
                      9318SKB-ASSKBroadbandCoLtdKRtrue
                      185.148.169.10
                      unknownGermany
                      44780EVERSCALE-ASDEtrue
                      195.77.239.39
                      unknownSpain
                      60493FICOSA-ASEStrue
                      178.62.112.199
                      unknownEuropean Union
                      14061DIGITALOCEAN-ASNUStrue
                      62.171.178.147
                      unknownUnited Kingdom
                      51167CONTABODEtrue
                      64.227.55.231
                      unknownUnited States
                      14061DIGITALOCEAN-ASNUStrue
                      Joe Sandbox Version:36.0.0 Rainbow Opal
                      Analysis ID:747450
                      Start date and time:2022-11-16 11:46:21 +01:00
                      Joe Sandbox Product:CloudBasic
                      Overall analysis duration:0h 10m 40s
                      Hypervisor based Inspection enabled:false
                      Report type:light
                      Sample file name:UC2DFXQIBiE2kQ.dll
                      Cookbook file name:default.jbs
                      Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
                      Number of analysed new started processes analysed:14
                      Number of new started drivers analysed:0
                      Number of existing processes analysed:0
                      Number of existing drivers analysed:0
                      Number of injected processes analysed:0
                      Technologies:
                      • HCA enabled
                      • EGA enabled
                      • HDC enabled
                      • AMSI enabled
                      Analysis Mode:default
                      Analysis stop reason:Timeout
                      Detection:MAL
                      Classification:mal84.troj.evad.winDLL@19/2@0/49
                      EGA Information:
                      • Successful, ratio: 100%
                      HDC Information:
                      • Successful, ratio: 86.4% (good quality ratio 78.8%)
                      • Quality average: 72.8%
                      • Quality standard deviation: 32.3%
                      HCA Information:
                      • Successful, ratio: 99%
                      • Number of executed functions: 0
                      • Number of non-executed functions: 0
                      Cookbook Comments:
                      • Found application associated with file extension: .dll
                      • Override analysis time to 240s for rundll32
                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, conhost.exe
                      • Excluded IPs from analysis (whitelisted): 173.222.108.210, 173.222.108.226, 8.248.119.254, 67.26.81.254, 8.253.207.121, 8.248.143.254, 8.238.88.254
                      • Excluded domains from analysis (whitelisted): client.wns.windows.com, fg.download.windowsupdate.com.c.footprint.net, ctldl.windowsupdate.com, a767.dspw65.akamai.net, wu-bg-shim.trafficmanager.net, download.windowsupdate.com.edgesuite.net
                      • Not all processes where analyzed, report is missing behavior information
                      • Report size exceeded maximum capacity and may have missing behavior information.
                      • Report size getting too big, too many NtOpenKeyEx calls found.
                      • Report size getting too big, too many NtProtectVirtualMemory calls found.
                      • Report size getting too big, too many NtQueryValueKey calls found.
                      TimeTypeDescription
                      11:48:05API Interceptor2x Sleep call for process: regsvr32.exe modified
                      11:48:18AutostartRun: HKLM64\Software\Microsoft\Windows\CurrentVersion\Run tzEWj.dll C:\Windows\system32\regsvr32.exe "C:\Windows\system32\NzmNpNPvo\tzEWj.dll"
                      No context
                      No context
                      No context
                      No context
                      No context
                      Process:C:\Windows\System32\regsvr32.exe
                      File Type:Microsoft Cabinet archive data, Windows 2000/XP setup, 62919 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks, 0x1 compression
                      Category:dropped
                      Size (bytes):62919
                      Entropy (8bit):7.995280921994772
                      Encrypted:true
                      SSDEEP:1536:d+OfVxHl7Wyf11lYom3xQcRVOtPHwQV4rP6Ji7:d+OxHxJlZcuPt4b6q
                      MD5:3DCF580A93972319E82CAFBC047D34D5
                      SHA1:8528D2A1363E5DE77DC3B1142850E51EAD0F4B6B
                      SHA-256:40810E31F1B69075C727E6D557F9614D5880112895FF6F4DF1767E87AE5640D1
                      SHA-512:98384BE7218340F95DAE88D1CB865F23A0B4E12855BEB6E74A3752274C9B4C601E493864DB777BCA677A370D0A9DBFFD68D94898A82014537F3A801CCE839C42
                      Malicious:false
                      Preview:MSCF............,...................I.......Q.........GU.\ .authroot.stl..O..5..CK..<Tk...c_.d....A.K...+.d.-;%.BJII!.QIR..$t)Kd.-QQ*...g......^..~|N=...y....{. .4{...W....b.i...j.I.......1:..b\.0.....Ait.2t......w.%.&.",tL_...4.8L[G..;.57....AT.k.......V..K......(....mzS...G....r.".=H.?>.........x&...S%....X.M^..j...A..x.9`.9...A../.s..#.4#.....Id.w..B....s.8..(...dj....=L.)..s.d.]NxQX8....stV#.K.'7.tH..9u~.2..!..2./.....!..9C../...mP $..../y.....@p.6.}.`...5. 0r.w...@(.. .Q....)g.........m..z*.8rR..).].T9r<.L....0..`.........c.....;-.g..;.wk.)......i..c5.....{v.u...AS..=.....&.:.........+..P.N..9..EAQ.V.$s.......B.`.Mfe..8.......$...y-.q9J........W...2.Q8...O.......i..@\^.=X..dG$.M..#=....m.h..{9.'...-.v..Z...!....z.....N....i..^..,........d...%Xa~q.@D|0...Y.m...........&d.4..A..{t=...../.t.3._.....?-.....uroP?.d.Z..S..{...$.i....X..$.O..4..N.)....U.Z..P....X,.... ...Lg..35..W..s.!c...Ap.].P..8..M..W.......U..,...m.u..|=.m1..~..!..b...._.
                      Process:C:\Windows\System32\regsvr32.exe
                      File Type:data
                      Category:modified
                      Size (bytes):328
                      Entropy (8bit):3.092112755947965
                      Encrypted:false
                      SSDEEP:6:kKpETN1HlNiN+SkQlPlEGYRMY9z+4KlDA3RUeKlTAlWRyf1:S/kPlE99SNxAhUexYo1
                      MD5:760EE71179EEB7B5C19A8E3816C2E6C6
                      SHA1:31689771FDE60D01CB02D0161FFBC1088D689453
                      SHA-256:8D621A2E4544796F20578A036D0583BEB94B994B0DEEA92BE3AA39A1059C3EFE
                      SHA-512:C2CD5E9CD08C46E5EB290AE2EEDCFF0E30B16D063F2BF23E4C2FB53B8EEAD2DE83D9E65B75A1F7FC69C307950E626BE144FF09569D70FBAAE597B1125CBB6BDD
                      Malicious:false
                      Preview:p...... ..........Po....(....................................................... ..................&...............h.t.t.p.:././.c.t.l.d.l...w.i.n.d.o.w.s.u.p.d.a.t.e...c.o.m./.m.s.d.o.w.n.l.o.a.d./.u.p.d.a.t.e./.v.3./.s.t.a.t.i.c./.t.r.u.s.t.e.d.r./.e.n./.a.u.t.h.r.o.o.t.s.t.l...c.a.b...".0.e.d.e.4.d.3.9.b.e.8.d.8.1.:.0."...
                      File type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                      Entropy (8bit):6.82554843363977
                      TrID:
                      • Win64 Dynamic Link Library (generic) (102004/3) 86.43%
                      • Win64 Executable (generic) (12005/4) 10.17%
                      • Generic Win/DOS Executable (2004/3) 1.70%
                      • DOS Executable Generic (2002/1) 1.70%
                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.01%
                      File name:UC2DFXQIBiE2kQ.dll
                      File size:636416
                      MD5:e2ec88ae31e147d1976368c6a8988d3c
                      SHA1:937a21ced7f2663c923c9c614cbe06d95def511a
                      SHA256:ae7e655db35a71a3b2df96051d722d7995ec94feea3cbd59bec501042ab40847
                      SHA512:ce9c95d721ee389dbbe3d7758d51bdde38f608675c7123d61fa6e0fde500e677651c043be3ef1d52d424b4a1d80d7191cb180887a8944059634ca55042bfa278
                      SSDEEP:6144:S6/ptuaN+qWUILr1HRf/9Mu1vHLI7U9XWi9gQ30/bP/09Xls9HV6MExbnyDAzlsH:S6/ptu/qerXtU7U9XUZWYobyDAzl+
                      TLSH:A7D4BE04B2AC40B5D5BBC17AC8A3592AE2B27C524764D7CB13A107BA1F2B7E11D3FB51
                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......................................................................................\.......\.......\.r.............\.......Rich...
                      Icon Hash:74f0e4ecccdce0e4
                      Entrypoint:0x180002e54
                      Entrypoint Section:.text
                      Digitally signed:false
                      Imagebase:0x180000000
                      Subsystem:windows gui
                      Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, DLL
                      DLL Characteristics:HIGH_ENTROPY_VA, NX_COMPAT
                      Time Stamp:0x636C09DF [Wed Nov 9 20:13:19 2022 UTC]
                      TLS Callbacks:
                      CLR (.Net) Version:
                      OS Version Major:6
                      OS Version Minor:0
                      File Version Major:6
                      File Version Minor:0
                      Subsystem Version Major:6
                      Subsystem Version Minor:0
                      Import Hash:bf309f28e2e75a572eb2f2244be62b26
                      Instruction
                      dec eax
                      mov dword ptr [esp+08h], ebx
                      dec eax
                      mov dword ptr [esp+10h], esi
                      push edi
                      dec eax
                      sub esp, 20h
                      dec ecx
                      mov edi, eax
                      mov ebx, edx
                      dec eax
                      mov esi, ecx
                      cmp edx, 01h
                      jne 00007F8A689EBF77h
                      call 00007F8A689EC9CCh
                      dec esp
                      mov eax, edi
                      mov edx, ebx
                      dec eax
                      mov ecx, esi
                      dec eax
                      mov ebx, dword ptr [esp+30h]
                      dec eax
                      mov esi, dword ptr [esp+38h]
                      dec eax
                      add esp, 20h
                      pop edi
                      jmp 00007F8A689EBDE0h
                      int3
                      int3
                      int3
                      inc eax
                      push ebx
                      dec eax
                      sub esp, 20h
                      dec eax
                      mov ebx, ecx
                      xor ecx, ecx
                      call dword ptr [00049283h]
                      dec eax
                      mov ecx, ebx
                      call dword ptr [00049272h]
                      call dword ptr [0004927Ch]
                      dec eax
                      mov ecx, eax
                      mov edx, C0000409h
                      dec eax
                      add esp, 20h
                      pop ebx
                      dec eax
                      jmp dword ptr [00049270h]
                      dec eax
                      mov dword ptr [esp+08h], ecx
                      dec eax
                      sub esp, 38h
                      mov ecx, 00000017h
                      call dword ptr [00049264h]
                      test eax, eax
                      je 00007F8A689EBF79h
                      mov ecx, 00000002h
                      int 29h
                      dec eax
                      lea ecx, dword ptr [00095FC2h]
                      call 00007F8A689EC24Eh
                      dec eax
                      mov eax, dword ptr [esp+38h]
                      dec eax
                      mov dword ptr [000960A9h], eax
                      dec eax
                      lea eax, dword ptr [esp+38h]
                      dec eax
                      add eax, 08h
                      dec eax
                      mov dword ptr [00096039h], eax
                      dec eax
                      mov eax, dword ptr [00096092h]
                      dec eax
                      mov dword ptr [00095F03h], eax
                      NameVirtual AddressVirtual Size Is in Section
                      IMAGE_DIRECTORY_ENTRY_EXPORT0x94ef00x1a30.rdata
                      IMAGE_DIRECTORY_ENTRY_IMPORT0x969200x78.rdata
                      IMAGE_DIRECTORY_ENTRY_RESOURCE0xa00000x268.rsrc
                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x9b0000x3b34.pdata
                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                      IMAGE_DIRECTORY_ENTRY_BASERELOC0xa10000x860.reloc
                      IMAGE_DIRECTORY_ENTRY_DEBUG0x916a80x1c.rdata
                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x916d00x138.rdata
                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_IAT0x4c0000x3b0.rdata
                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                      NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                      .text0x10000x4a1e50x4a200False0.48174009274873525data6.479787977595784IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      .rdata0x4c0000x4b5920x4b600False0.611217998548922data6.281987992518068IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .data0x980000x2a440xe00False0.18052455357142858DOS executable (block device driver \322f\324\377\3772)2.7637122521836313IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                      .pdata0x9b0000x3b340x3c00False0.46953125data5.536843174034769IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      _RDATA0x9f0000xf40x200False0.30078125data1.982153456785509IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .rsrc0xa00000x2680x400False0.3173828125data3.200437559634333IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .reloc0xa10000x8600xa00False0.46796875data5.031424688639632IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                      NameRVASizeTypeLanguageCountry
                      RT_STRING0xa00a00x48dataEnglishUnited States
                      RT_MANIFEST0xa00e80x17dXML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States
                      DLLImport
                      USER32.dllMessageBoxA, InvalidateRect, GetMessageW, DefWindowProcW, DestroyWindow, CreateWindowExW, RegisterClassExW, LoadStringW, ShowWindow, DispatchMessageW, SetGestureConfig, GetGestureInfo, TranslateAcceleratorW, TranslateMessage, LoadCursorW, PostQuitMessage, UpdateWindow, BeginPaint, EndPaint, CloseGestureInfoHandle, ScreenToClient
                      GDI32.dllPolyline, LineTo, CreatePen, MoveToEx, DeleteObject, SelectObject
                      ole32.dllCoLoadLibrary
                      CRYPT32.dllCryptStringToBinaryA
                      KERNEL32.dllGetConsoleMode, GetConsoleCP, WriteFile, FlushFileBuffers, SetStdHandle, HeapReAlloc, GetFileSizeEx, WriteConsoleW, SetConsoleCtrlHandler, GetFileType, GetStdHandle, GetProcessHeap, EnumSystemLocalesW, SetFilePointerEx, ReadFile, ReadConsoleW, OutputDebugStringW, CreateFileW, HeapSize, CloseHandle, GetUserDefaultLCID, IsValidLocale, GetStringTypeW, DeleteCriticalSection, RtlCaptureContext, RtlLookupFunctionEntry, RtlVirtualUnwind, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetCurrentProcess, TerminateProcess, IsProcessorFeaturePresent, IsDebuggerPresent, GetStartupInfoW, GetModuleHandleW, QueryPerformanceCounter, GetCurrentProcessId, GetCurrentThreadId, GetSystemTimeAsFileTime, InitializeSListHead, RtlUnwindEx, RtlPcToFileHeader, RaiseException, InterlockedPushEntrySList, InterlockedFlushSList, GetLastError, SetLastError, EncodePointer, EnterCriticalSection, LeaveCriticalSection, RtlUnwind, InitializeCriticalSectionAndSpinCount, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, FreeLibrary, GetProcAddress, LoadLibraryExW, ExitProcess, GetModuleHandleExW, GetModuleFileNameW, GetCurrentThread, HeapFree, HeapAlloc, FindClose, FindFirstFileExW, FindNextFileW, IsValidCodePage, GetACP, GetOEMCP, GetCPInfo, GetCommandLineA, GetCommandLineW, MultiByteToWideChar, WideCharToMultiByte, GetEnvironmentStringsW, FreeEnvironmentStringsW, SetEnvironmentVariableW, GetDateFormatW, GetTimeFormatW, CompareStringW, LCMapStringW, GetLocaleInfoW
                      NameOrdinalAddress
                      ACeujVZMknFDjv10x180043600
                      AHuDGMflBfPryOEYjuTfbzJdEM20x180043f30
                      ATjQPkInxPUGuUu30x180043890
                      AmbryhtjKWGeCnsRXR40x180043690
                      AukYzjkZpQjlyb50x180043e80
                      BEHGKvjtYm60x1800438c0
                      BRUFxz70x180043b50
                      BUZBRSzPLxRhY80x180043ba0
                      BZCzGXtURmWdIZoaE90x180043a50
                      BZqjzJIejob100x1800439a0
                      BmZYhYQxzCQQ110x180043810
                      BubGPfVJvMw120x180043420
                      CBkyPEXjXbRUHKXJo130x180043330
                      CEsNfdgPgd140x180044070
                      CVPqxJEtookkvK150x180043e70
                      CaJBhuFKGDiSQoojdQF160x180044120
                      CcKlmw170x1800434f0
                      CfrkXlNpYveSkH180x180043730
                      CtcUKaNM190x180043d60
                      CtmIxtaSEWrJoeKFHYsQVRF200x180043f20
                      DCcTBPjgUmKACiowmtURUFfgN210x180043290
                      DRpUgpG220x1800432d0
                      DYDsOtWxMUufQk230x1800434c0
                      DacmPRKwn240x180043ca0
                      DdBIgVVvJpDDYojhSveGWyVC250x1800440d0
                      DllRegisterServer260x180044a60
                      EDkUTFetsWTlyEplV270x180043bd0
                      EZveIcVQbxXQvHAc280x180043960
                      EetKwkljiiO290x1800440e0
                      EiwSmYwuw300x180043410
                      EjKZnNkyirwOPcLJfvNShOHV310x180043250
                      ElumsVBNoiVQFecpcx320x1800438f0
                      FVCmCSsewcOgpmVCPhNN330x180043e90
                      FeniiccJDJZQOquCQEDZFbp340x180043490
                      GhuZhUSaPqDNPQyLmKmMs350x180043530
                      GidoxoYzkYTZBUKjTczrNz360x180043240
                      GmOuZYJiGNspxqOxoBCu370x180043af0
                      GoueteXAa380x180043de0
                      HZyUwOgdhWiacaSFvYDsgUbdhh390x180043370
                      HtmqUvH400x1800437f0
                      HvKfMTiGc410x180043ad0
                      HwiGZdXrkhPSBdQhcNF420x180043d80
                      IOKBBQdlpeQCrqGhE430x180043f80
                      IftUczqAOEEpksLc440x1800440b0
                      IujIKjACwijLXf450x180043a80
                      JPOlfklrHwimOYpdWU460x180043980
                      JldHyQJYHPfgwSota470x180043f70
                      KHRcAfeWiWXczrzetcsf480x1800435c0
                      KSBSWsMPLKrvLpLuQEVBQaA490x1800437b0
                      KXPHHrx500x180043cc0
                      KqKYPtMNYPZwVVbFgnJskTDgXZ510x180044080
                      KrLeibTbke520x180043da0
                      KtNQbfYVcdlRzCxJLbItSH530x180043fc0
                      KtZFnRWCN540x180043c50
                      KyUDQzimOqrGaUdqnpHCadI550x180043950
                      LNVXKJhSBOeqiQPpxZuBrf560x180043770
                      LbOnTCPkjmOOEdhEeyEy570x180043cf0
                      LlFIOHcteRaL580x180043990
                      MAmiSwkyFlQMDaCByXR590x1800438d0
                      MHyRvOCLFO600x180043c00
                      MbZnllsXkfnyOmtthLrL610x180043640
                      MbsuSbHtpeltWArBKaXuf620x180043eb0
                      MltZiwCXSxF630x180043440
                      NFzpzSbcGrv640x180043e20
                      NXasCwwz650x180043310
                      NfwIIEvnLCKXIrpxWtDCbXx660x180043bf0
                      NgkonMKeLNPfNxT670x180043b30
                      NlplQAUkkIZ680x1800437e0
                      OQruapyPUnukiDhEvANkgElZqh690x180043700
                      ORBMTIE700x180043e50
                      OdtvuFxrrpfsY710x180043d00
                      OoZePWcMAAdh720x1800432a0
                      PbgMOKpkqAeEgOBtpecKal730x180043a90
                      PhHcvOzcWKVEzqGUAuH740x180044020
                      PqcNviu750x1800439b0
                      PxhniQgzegWvoSCaIPorRhqOEt760x180043200
                      PzcLCLdBlIdqBxBTbNiI770x180043ab0
                      RFSoSJnzzPHjPzvZCOvWT780x180043f90
                      RSrAlLsSbnJmicoYtpKsPYkwFn790x180044040
                      ReujwDwTrVxLhVwaWvQS800x180044100
                      RqzpZDiLuFMWsJ810x180043630
                      SUemGjmeVuPs820x180043a70
                      ScnrskpiicPdg830x180043840
                      SeCKWgTgmmtDUvFC840x180043be0
                      SjnxUxHKGlth850x180043cd0
                      StNIEkqRHMtB860x180043ae0
                      StepECvENJONrwlynYAOx870x180043550
                      SyluAQQc880x180043800
                      SyvpWCmyZbMrEFnfTmyrBRH890x1800436d0
                      TLTUEROtrtYd900x1800434d0
                      TdNJCbJiInjtCOpp910x180043d20
                      TndRvx920x180043fe0
                      TpEywJZSeYXzmbHgod930x180043c70
                      TrziFVlHgMVVONOLNIfRem940x180043d90
                      TzKueUFolaHBJPFhx950x180043b40
                      UClTVsmfYtgzIL960x1800437c0
                      URuQMqrUPMSAGVyWQTqN970x180044010
                      UbLvGEZfkFcvnnw980x180044170
                      VXfdoDKAoHiAA990x180043390
                      VeRxloJdVvetDztDxLQT1000x180043dd0
                      VkIbTCoknzceJuPcnCXzzPj1010x180043e30
                      VqNxpzS1020x180043e00
                      WPumZrRRafooNh1030x1800435a0
                      WQIBBQj1040x1800431e0
                      WUVuwTliAyCBAOHuSOD1050x180043e40
                      WsADtJekvYjSfChaZ1060x1800434e0
                      XBRWcmDQWuUdmmFxx1070x180043570
                      XDLVzSefOKneeAsytcH1080x180043b60
                      XDecZDvu1090x180043ec0
                      XNmJlnrJjgZEjPQQeoOIT1100x180043860
                      XWdPewUOSEaHKCHnynymDhLttF1110x180044000
                      XmEMSisfXGvwdcnUI1120x180044130
                      XxYbsglQgKXTYWUmlX1130x1800433d0
                      YOqqPZdimbNEuvMaM1140x1800439d0
                      YXgNyXKelZfQK1150x180043220
                      YrlEvikMuwUvtjDbAASCV1160x180043b70
                      YrpQLSvKN1170x180043320
                      YtyiKWITImQlOTP1180x1800439f0
                      ZMAtbEQuVEpze1190x180043db0
                      ZOTjVFL1200x180043b20
                      ZXigMFrErZGCgnGQdpTo1210x180043790
                      ZcqfXQvmSIhHXuDEPmA1220x180043610
                      ZmNbZwqyJPRHpqmUZOmpJexK1230x1800436c0
                      aOxloUcrMaTBrKRkXkvrKaAy1240x180044050
                      aXDBQtKlOSCf1250x180043340
                      azZsnWvbQULjBuaCVG1260x180043650
                      bCHMpZKuNDwxXrs1270x180043f00
                      bFyNFHBUflbBAfRZV1280x180043560
                      bGaVPXQawxz1290x180043910
                      bVRtqQ1300x180043d40
                      bWXHfJrBjrdcVRLbuT1310x180043780
                      blakCcJabYayatiII1320x180043c40
                      bsEGIgCVUNZeSRsr1330x1800431f0
                      btMHyPMu1340x180043380
                      bteqpXpGuaIzWJWPXQj1350x1800433e0
                      buvNCuoglefZoipISdUp1360x1800433a0
                      bvumZozkETqFchaDGgv1370x180044150
                      cKgbFcy1380x180043260
                      chPwzpRWTYf1390x180043400
                      cliUpMkAyvnx1400x180043460
                      cpEBzofbApJInexgeY1410x180043520
                      cpNZFVzZSKe1420x180043c20
                      cpmbLfWGBjxaaZNR1430x1800437a0
                      csebqY1440x1800433c0
                      czlJGyv1450x180043430
                      dOrUqBBEUz1460x1800440f0
                      disvxAJjTCcpofcItH1470x180043850
                      djhGwwWdNkNOGnSMVhO1480x180043f50
                      drTNkYg1490x1800435d0
                      elaOoLpqFiyIbnyvaU1500x180043500
                      fAKHjGkpTjHcAAfMvshh1510x180043bc0
                      fBFgQesCsDDEqolwHzSbbSIs1520x180043f40
                      fDZRRfyfwlYoeFo1530x180043b00
                      fLcYUVhVDDHHRUryudAO1540x180043720
                      fWkhxqQSpEMsqhItVIr1550x1800432b0
                      fZQaoqMpByybzlfgG1560x180043a20
                      fadaIHaPgvjpA1570x180044160
                      fodVsUcqiRZtLe1580x1800434b0
                      fwWFiWowsdju1590x180043a00
                      gQiEYElmfk1600x180043480
                      gexCIfMSOkWBVEs1610x180044060
                      gnKyXNiVXhIQQVNkxutn1620x180043350
                      hHoSVYFgUoRXoGwPBdTY1630x1800436f0
                      hKiUTWNKTCBHARIejKtitX1640x180043970
                      hTcXrfT1650x180043b10
                      hdpzQLMeXdHLAXI1660x180043ef0
                      hqmMcxlMowrqdmwCD1670x1800432f0
                      huwZDnzyRrUuSv1680x180044110
                      hwwioGqcSiONSnnoqSgGGlYG1690x1800437d0
                      hwxiWyDPZ1700x180043300
                      iIMUBUcxlPgIoCou1710x180043ce0
                      iXVpeLZjxHYfZy1720x180043ed0
                      ickoyirauzuqSYooWRxIBKP1730x1800433b0
                      ixEhmcgYbORYTvwI1740x180043940
                      jXSCkxhrXSnIiziUsUkSa1750x1800438a0
                      jhMrQlkZnbNzE1760x1800435e0
                      jnmtHhyvcXOtUsFySuhzSRFwZ1770x180043c80
                      jqfPKICr1780x180043210
                      kFVNBreOaZSGgseVYXfZAQSt1790x180043e60
                      kLMzjQJrPZFPf1800x180043470
                      kONtiEAEi1810x180043510
                      kUNUwtZ1820x180043cb0
                      lIEZQCqZKko1830x180043ee0
                      lZiHnzEuXoXZIzRd1840x180043df0
                      larnkUFYFI1850x180043620
                      lfFBdv1860x180043e10
                      mJFTxuzjmKwZE1870x1800438e0
                      mJPUafqK1880x1800436b0
                      mRinbRZ1890x1800435b0
                      miGqUGeEk1900x180043f10
                      muHYTksHDRccMJtbMIVY1910x180043bb0
                      nEWvJUznqPuIORIkmbdcWjKd1920x180043fb0
                      nXCjDafayJLQ1930x180043fa0
                      nfPVFCecEC1940x180043fd0
                      ntSsSyvUegFeD1950x180043590
                      nttFqgw1960x180043f60
                      nuflNZYxVuFptSebTKUXxH1970x180043dc0
                      oFyUMrjmgKtGCEsn1980x180043d70
                      oJhfaaiLZFHiBCXJlPO1990x180043d30
                      oPpitKCbVriCZu2000x180043280
                      oTMlKNA2010x180043d10
                      pOQozXdpf2020x180043710
                      pqXsDgFAKqxqyeZwyCjZ2030x180043230
                      qhBjRUFjPgGnZCYf2040x180043a60
                      qnqswBvEbONoReovLIKnVYuSA2050x1800439c0
                      qpggbjTvfN2060x1800432c0
                      rGJIMlvpqBhxViL2070x180043880
                      rUmobKc2080x180043a10
                      rfqEeKHAx2090x180044140
                      rsgxCEvQpI2100x1800436e0
                      rstbQmhTSxcrhUlcaxRFhGIXK2110x180043c10
                      rxpoWUmUrHlSIHeznkyrivE2120x180043d50
                      rzgTPjoxRh2130x180044090
                      sFmMISJDeOoy2140x180043a40
                      sGzvLqVdsbQ2150x180043930
                      sRyuPhAwDlOgUlGVpIfduYySp2160x1800440a0
                      sTHzpfVYU2170x180043820
                      sUKvQIa2180x180043680
                      sVMFsGCCfvDfoTh2190x180043450
                      sfAGqCcFJlYOMkqZahTjTiAX2200x1800439e0
                      stMogsRXrfH2210x180043c30
                      tBAtJGzOlooKPbZ2220x1800438b0
                      tTdsornziSGMnYRGtlv2230x180043870
                      taVJVqMCMlkFIDWVCcDLV2240x180043ea0
                      twRKUF2250x180043a30
                      uTtYPS2260x180043920
                      ujLBGDEExK2270x1800435f0
                      ujfIFiuxQFuoWpBYlfPja2280x1800436a0
                      unVwakRZhbHEVJWGGZDyCZP2290x1800434a0
                      utlgNYXohozxx2300x180043aa0
                      uvBxDGCDNqLbDaufFb2310x180043740
                      vycQUvI2320x180043830
                      vzdSRyxeERBiXlOkqVUB2330x180043ff0
                      wAHuFSGPWcgVtPzRzoUTnbwo2340x180043660
                      wiIXJqSWsUXvPbq2350x180043360
                      wjeHVSTrDxCzMVNUFEQoz2360x180043b90
                      xPjfyQjUovqeohLapv2370x1800440c0
                      xeyyJZUMQlYiCHikxXoEko2380x180043670
                      xmDlQKqSmhiJfARRXzslVED2390x1800433f0
                      xzJluXH2400x180043580
                      yAYxFjbdwTSooJJzoq2410x180043b80
                      yBpkXiNAKugdWlxIPQKL2420x180043540
                      yIApLlDSJNmmOc2430x180043270
                      yMokeHArDgIyDvmsuwd2440x180044030
                      yVLTygbNjHTxXaOuZBkHmpajxq2450x180043ac0
                      yhCymcBLApUWyPqapsEDJtfjMV2460x180043760
                      yjGXMXnz2470x180043c90
                      yprPVXLUkdnzWv2480x1800432e0
                      yzkENTmBV2490x180043750
                      zQnFkEsglvSmYtKlkFDTme2500x180043900
                      zdMhYw2510x180043c60
                      Language of compilation systemCountry where language is spokenMap
                      EnglishUnited States
                      TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                      192.168.2.5115.178.55.2249702802404304 11/16/22-11:48:03.539047TCP2404304ET CNC Feodo Tracker Reported CnC Server TCP group 34970280192.168.2.5115.178.55.22
                      TimestampSource PortDest PortSource IPDest IP
                      Nov 16, 2022 11:48:03.539047003 CET4970280192.168.2.5115.178.55.22
                      Nov 16, 2022 11:48:03.831744909 CET8049702115.178.55.22192.168.2.5
                      Nov 16, 2022 11:48:04.340646982 CET4970280192.168.2.5115.178.55.22
                      Nov 16, 2022 11:48:04.632900953 CET8049702115.178.55.22192.168.2.5
                      Nov 16, 2022 11:48:05.137665987 CET4970280192.168.2.5115.178.55.22
                      Nov 16, 2022 11:48:05.429980040 CET8049702115.178.55.22192.168.2.5
                      Nov 16, 2022 11:48:10.744023085 CET497048080192.168.2.5172.105.115.71
                      Nov 16, 2022 11:48:10.909348011 CET808049704172.105.115.71192.168.2.5
                      Nov 16, 2022 11:48:10.913110018 CET497048080192.168.2.5172.105.115.71
                      Nov 16, 2022 11:48:11.236078024 CET497048080192.168.2.5172.105.115.71
                      Nov 16, 2022 11:48:11.401309013 CET808049704172.105.115.71192.168.2.5
                      Nov 16, 2022 11:48:11.415730000 CET808049704172.105.115.71192.168.2.5
                      Nov 16, 2022 11:48:11.415769100 CET808049704172.105.115.71192.168.2.5
                      Nov 16, 2022 11:48:11.415819883 CET497048080192.168.2.5172.105.115.71
                      Nov 16, 2022 11:48:11.424375057 CET497048080192.168.2.5172.105.115.71
                      Nov 16, 2022 11:48:11.589539051 CET808049704172.105.115.71192.168.2.5
                      Nov 16, 2022 11:48:11.590243101 CET808049704172.105.115.71192.168.2.5
                      Nov 16, 2022 11:48:11.640842915 CET497048080192.168.2.5172.105.115.71
                      Nov 16, 2022 11:48:15.085757971 CET497048080192.168.2.5172.105.115.71
                      Nov 16, 2022 11:48:15.085810900 CET497048080192.168.2.5172.105.115.71
                      Nov 16, 2022 11:48:15.255290031 CET808049704172.105.115.71192.168.2.5
                      Nov 16, 2022 11:48:15.255345106 CET808049704172.105.115.71192.168.2.5
                      Nov 16, 2022 11:48:16.747538090 CET808049704172.105.115.71192.168.2.5
                      Nov 16, 2022 11:48:16.794964075 CET497048080192.168.2.5172.105.115.71
                      Nov 16, 2022 11:48:19.749259949 CET808049704172.105.115.71192.168.2.5
                      Nov 16, 2022 11:48:19.749299049 CET808049704172.105.115.71192.168.2.5
                      Nov 16, 2022 11:48:19.749550104 CET497048080192.168.2.5172.105.115.71
                      Nov 16, 2022 11:48:19.749550104 CET497048080192.168.2.5172.105.115.71
                      Nov 16, 2022 11:48:19.751241922 CET497048080192.168.2.5172.105.115.71
                      Nov 16, 2022 11:48:19.914858103 CET808049704172.105.115.71192.168.2.5
                      Nov 16, 2022 11:48:19.916285992 CET808049704172.105.115.71192.168.2.5

                      Click to jump to process

                      Target ID:0
                      Start time:11:47:17
                      Start date:16/11/2022
                      Path:C:\Windows\System32\loaddll64.exe
                      Wow64 process (32bit):false
                      Commandline:loaddll64.exe "C:\Users\user\Desktop\UC2DFXQIBiE2kQ.dll"
                      Imagebase:0x7ff68b940000
                      File size:139776 bytes
                      MD5 hash:C676FC0263EDD17D4CE7D644B8F3FCD6
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high

                      Target ID:1
                      Start time:11:47:17
                      Start date:16/11/2022
                      Path:C:\Windows\System32\conhost.exe
                      Wow64 process (32bit):false
                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Imagebase:0x7ff7fcd70000
                      File size:625664 bytes
                      MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high

                      Target ID:2
                      Start time:11:47:17
                      Start date:16/11/2022
                      Path:C:\Windows\System32\cmd.exe
                      Wow64 process (32bit):false
                      Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\UC2DFXQIBiE2kQ.dll",#1
                      Imagebase:0x7ff627730000
                      File size:273920 bytes
                      MD5 hash:4E2ACF4F8A396486AB4268C94A6A245F
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high

                      Target ID:3
                      Start time:11:47:17
                      Start date:16/11/2022
                      Path:C:\Windows\System32\regsvr32.exe
                      Wow64 process (32bit):false
                      Commandline:regsvr32.exe /s C:\Users\user\Desktop\UC2DFXQIBiE2kQ.dll
                      Imagebase:0x7ff7a6200000
                      File size:24064 bytes
                      MD5 hash:D78B75FC68247E8A63ACBA846182740E
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Yara matches:
                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000003.00000002.314073232.0000000000C90000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000003.00000002.314301645.0000000002731000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
                      Reputation:high

                      Target ID:4
                      Start time:11:47:17
                      Start date:16/11/2022
                      Path:C:\Windows\System32\rundll32.exe
                      Wow64 process (32bit):false
                      Commandline:rundll32.exe "C:\Users\user\Desktop\UC2DFXQIBiE2kQ.dll",#1
                      Imagebase:0x7ff62ca30000
                      File size:69632 bytes
                      MD5 hash:73C519F050C20580F8A62C849D49215A
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Yara matches:
                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000004.00000002.307121322.000001E000100000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000004.00000002.307321524.000001E000141000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
                      Reputation:high

                      Target ID:5
                      Start time:11:47:17
                      Start date:16/11/2022
                      Path:C:\Windows\System32\rundll32.exe
                      Wow64 process (32bit):false
                      Commandline:rundll32.exe C:\Users\user\Desktop\UC2DFXQIBiE2kQ.dll,ACeujVZMknFDjv
                      Imagebase:0x7ff62ca30000
                      File size:69632 bytes
                      MD5 hash:73C519F050C20580F8A62C849D49215A
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Yara matches:
                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000005.00000002.309988911.000002A2C5F01000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000005.00000002.309304798.000002A2C4510000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                      Reputation:high

                      Target ID:6
                      Start time:11:47:21
                      Start date:16/11/2022
                      Path:C:\Windows\System32\rundll32.exe
                      Wow64 process (32bit):false
                      Commandline:rundll32.exe C:\Users\user\Desktop\UC2DFXQIBiE2kQ.dll,AHuDGMflBfPryOEYjuTfbzJdEM
                      Imagebase:0x7ff62ca30000
                      File size:69632 bytes
                      MD5 hash:73C519F050C20580F8A62C849D49215A
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Yara matches:
                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000006.00000002.315862116.000001EEA9950000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000006.00000002.315937172.000001EEA9991000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security

                      Target ID:7
                      Start time:11:47:22
                      Start date:16/11/2022
                      Path:C:\Windows\System32\regsvr32.exe
                      Wow64 process (32bit):false
                      Commandline:C:\Windows\system32\regsvr32.exe "C:\Windows\system32\NzmNpNPvo\tzEWj.dll"
                      Imagebase:0x7ff7a6200000
                      File size:24064 bytes
                      MD5 hash:D78B75FC68247E8A63ACBA846182740E
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Yara matches:
                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000007.00000002.825157778.00000000004D0000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000007.00000002.825690145.0000000000731000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security

                      Target ID:8
                      Start time:11:47:24
                      Start date:16/11/2022
                      Path:C:\Windows\System32\rundll32.exe
                      Wow64 process (32bit):false
                      Commandline:rundll32.exe C:\Users\user\Desktop\UC2DFXQIBiE2kQ.dll,ATjQPkInxPUGuUu
                      Imagebase:0x7ff62ca30000
                      File size:69632 bytes
                      MD5 hash:73C519F050C20580F8A62C849D49215A
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language

                      Target ID:11
                      Start time:11:48:26
                      Start date:16/11/2022
                      Path:C:\Windows\System32\regsvr32.exe
                      Wow64 process (32bit):false
                      Commandline:C:\Windows\system32\regsvr32.exe" "C:\Windows\system32\NzmNpNPvo\tzEWj.dll
                      Imagebase:0x7ff7a6200000
                      File size:24064 bytes
                      MD5 hash:D78B75FC68247E8A63ACBA846182740E
                      Has elevated privileges:false
                      Has administrator privileges:false
                      Programmed in:C, C++ or other language
                      Yara matches:
                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000B.00000002.463359188.0000000001350000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000B.00000002.463986640.0000000002C41000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security

                      Target ID:12
                      Start time:11:48:32
                      Start date:16/11/2022
                      Path:C:\Windows\System32\regsvr32.exe
                      Wow64 process (32bit):false
                      Commandline:C:\Windows\system32\regsvr32.exe "C:\Users\user\AppData\Local\VfjAKsbRVDLoO\aeuwPIzDFvIwK.dll"
                      Imagebase:0x7ff7a6200000
                      File size:24064 bytes
                      MD5 hash:D78B75FC68247E8A63ACBA846182740E
                      Has elevated privileges:false
                      Has administrator privileges:false
                      Programmed in:C, C++ or other language

                      No disassembly