Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
UC2DFXQIBiE2kQ.dll

Overview

General Information

Sample Name:UC2DFXQIBiE2kQ.dll
Analysis ID:747451
MD5:e2ec88ae31e147d1976368c6a8988d3c
SHA1:937a21ced7f2663c923c9c614cbe06d95def511a
SHA256:ae7e655db35a71a3b2df96051d722d7995ec94feea3cbd59bec501042ab40847
Infos:

Detection

Emotet
Score:84
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Yara detected Emotet
System process connects to network (likely due to code injection or exploit)
Snort IDS alert for network traffic
Creates an autostart registry key pointing to binary in C:\Windows
C2 URLs / IPs found in malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Queries the volume information (name, serial number etc) of a device
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query locales information (e.g. system language)
Deletes files inside the Windows folder
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Creates files inside the system directory
PE file contains sections with non-standard names
Internet Provider seen in connection with other malware
Detected potential crypto function
Contains functionality to query CPU information (cpuid)
Found potential string decryption / allocating functions
Sample execution stops while process was sleeping (likely an evasion)
Contains functionality which may be used to detect a debugger (GetProcessHeap)
IP address seen in connection with other malware
Tries to load missing DLLs
Drops PE files to the windows directory (C:\Windows)
Checks if the current process is being debugged
Connects to several IPs in different countries
Registers a DLL
Found large amount of non-executed APIs
Uses Microsoft's Enhanced Cryptographic Provider
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • loaddll64.exe (PID: 4728 cmdline: loaddll64.exe "C:\Users\user\Desktop\UC2DFXQIBiE2kQ.dll" MD5: C676FC0263EDD17D4CE7D644B8F3FCD6)
    • conhost.exe (PID: 3536 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • cmd.exe (PID: 4116 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\UC2DFXQIBiE2kQ.dll",#1 MD5: 4E2ACF4F8A396486AB4268C94A6A245F)
      • rundll32.exe (PID: 5108 cmdline: rundll32.exe "C:\Users\user\Desktop\UC2DFXQIBiE2kQ.dll",#1 MD5: 73C519F050C20580F8A62C849D49215A)
    • regsvr32.exe (PID: 1636 cmdline: regsvr32.exe /s C:\Users\user\Desktop\UC2DFXQIBiE2kQ.dll MD5: D78B75FC68247E8A63ACBA846182740E)
      • regsvr32.exe (PID: 1524 cmdline: C:\Windows\system32\regsvr32.exe "C:\Windows\system32\MHtsbrv\IoiBQ.dll" MD5: D78B75FC68247E8A63ACBA846182740E)
    • rundll32.exe (PID: 4460 cmdline: rundll32.exe C:\Users\user\Desktop\UC2DFXQIBiE2kQ.dll,ACeujVZMknFDjv MD5: 73C519F050C20580F8A62C849D49215A)
    • rundll32.exe (PID: 4292 cmdline: rundll32.exe C:\Users\user\Desktop\UC2DFXQIBiE2kQ.dll,AHuDGMflBfPryOEYjuTfbzJdEM MD5: 73C519F050C20580F8A62C849D49215A)
    • rundll32.exe (PID: 780 cmdline: rundll32.exe C:\Users\user\Desktop\UC2DFXQIBiE2kQ.dll,ATjQPkInxPUGuUu MD5: 73C519F050C20580F8A62C849D49215A)
  • regsvr32.exe (PID: 4728 cmdline: C:\Windows\system32\regsvr32.exe" "C:\Windows\system32\MHtsbrv\IoiBQ.dll MD5: D78B75FC68247E8A63ACBA846182740E)
    • regsvr32.exe (PID: 1592 cmdline: C:\Windows\system32\regsvr32.exe "C:\Users\user\AppData\Local\VADoV\ahExZn.dll" MD5: D78B75FC68247E8A63ACBA846182740E)
  • cleanup
{"C2 list": ["172.105.115.71:8080", "218.38.121.17:443", "186.250.48.5:443", "103.71.99.57:8080", "85.214.67.203:8080", "85.25.120.45:8080", "139.196.72.155:8080", "103.85.95.4:8080", "198.199.70.22:8080", "209.239.112.82:8080", "78.47.204.80:443", "36.67.23.59:443", "104.244.79.94:443", "62.171.178.147:8080", "195.77.239.39:8080", "103.56.149.105:8080", "80.211.107.116:8080", "93.104.209.107:8080", "174.138.33.49:7080", "202.28.34.99:8080", "178.62.112.199:8080", "114.79.130.68:443", "118.98.72.86:443", "103.41.204.169:8080", "178.238.225.252:8080", "83.229.80.93:8080", "46.101.98.60:8080", "82.98.180.154:7080", "87.106.97.83:7080", "196.44.98.190:8080", "139.59.80.108:8080", "103.224.241.74:8080", "103.254.12.236:7080", "185.148.169.10:8080", "165.22.254.236:8080", "37.44.244.177:8080", "54.37.228.122:443", "51.75.33.122:443", "128.199.217.206:443", "188.165.79.151:443", "210.57.209.142:8080", "160.16.143.191:8080", "175.126.176.79:8080", "202.134.4.210:7080", "103.126.216.86:443", "190.145.8.4:443", "128.199.242.164:8080", "64.227.55.231:8080"], "Public Key": ["RUNTMSAAAAD0LxqDNhonUYwk8sqo7IWuUllRdUiUBnACc6romsQoe1YJD7wIe4AheqYofpZFucPDXCZ0z9i+ooUffqeoLZU0Ycch+AAVAIA=", "RUNLMSAAAADYNZPXY4tQxd/N4Wn5sTYAm5tUOxY2ol1ELrI4MNhHNi640vSLasjYTHpFRBoG+o84vtr7AJachCzOHjaAJFCWSccJ+AANAI4="]}
SourceRuleDescriptionAuthorStrings
0000000B.00000002.467051052.0000000002D41000.00000020.00001000.00020000.00000000.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
    00000003.00000002.318362912.0000000002371000.00000020.00001000.00020000.00000000.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
      0000000B.00000002.467020854.0000000002D10000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
        00000005.00000002.312762728.000001FA0A8D1000.00000020.00001000.00020000.00000000.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
          00000007.00000002.702581906.0000000000F51000.00000020.00001000.00020000.00000000.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
            Click to see the 7 entries
            SourceRuleDescriptionAuthorStrings
            7.2.regsvr32.exe.f00000.0.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
              3.2.regsvr32.exe.2220000.0.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
                11.2.regsvr32.exe.2d10000.0.raw.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
                  6.2.rundll32.exe.2112e630000.0.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
                    6.2.rundll32.exe.2112e630000.0.raw.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
                      Click to see the 7 entries
                      No Sigma rule has matched
                      Timestamp:192.168.2.6115.178.55.2249714802404304 11/16/22-11:49:29.070302
                      SID:2404304
                      Source Port:49714
                      Destination Port:80
                      Protocol:TCP
                      Classtype:A Network Trojan was detected

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection

                      barindex
                      Source: UC2DFXQIBiE2kQ.dllReversingLabs: Detection: 80%
                      Source: UC2DFXQIBiE2kQ.dllVirustotal: Detection: 65%Perma Link
                      Source: 00000007.00000002.702237508.0000000000D8B000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: Emotet {"C2 list": ["172.105.115.71:8080", "218.38.121.17:443", "186.250.48.5:443", "103.71.99.57:8080", "85.214.67.203:8080", "85.25.120.45:8080", "139.196.72.155:8080", "103.85.95.4:8080", "198.199.70.22:8080", "209.239.112.82:8080", "78.47.204.80:443", "36.67.23.59:443", "104.244.79.94:443", "62.171.178.147:8080", "195.77.239.39:8080", "103.56.149.105:8080", "80.211.107.116:8080", "93.104.209.107:8080", "174.138.33.49:7080", "202.28.34.99:8080", "178.62.112.199:8080", "114.79.130.68:443", "118.98.72.86:443", "103.41.204.169:8080", "178.238.225.252:8080", "83.229.80.93:8080", "46.101.98.60:8080", "82.98.180.154:7080", "87.106.97.83:7080", "196.44.98.190:8080", "139.59.80.108:8080", "103.224.241.74:8080", "103.254.12.236:7080", "185.148.169.10:8080", "165.22.254.236:8080", "37.44.244.177:8080", "54.37.228.122:443", "51.75.33.122:443", "128.199.217.206:443", "188.165.79.151:443", "210.57.209.142:8080", "160.16.143.191:8080", "175.126.176.79:8080", "202.134.4.210:7080", "103.126.216.86:443", "190.145.8.4:443", "128.199.242.164:8080", "64.227.55.231:8080"], "Public Key": ["RUNTMSAAAAD0LxqDNhonUYwk8sqo7IWuUllRdUiUBnACc6romsQoe1YJD7wIe4AheqYofpZFucPDXCZ0z9i+ooUffqeoLZU0Ycch+AAVAIA=", "RUNLMSAAAADYNZPXY4tQxd/N4Wn5sTYAm5tUOxY2ol1ELrI4MNhHNi640vSLasjYTHpFRBoG+o84vtr7AJachCzOHjaAJFCWSccJ+AANAI4="]}
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018004A020 CryptStringToBinaryA,CryptStringToBinaryA,
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180029290 FindFirstFileExW,
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018002972C FindFirstFileExW,FindNextFileW,FindClose,
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180028B30 _invalid_parameter_noinfo,_invalid_parameter_noinfo,FindFirstFileExW,FindNextFileW,FindClose,FindClose,FindClose,
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180028B30 _invalid_parameter_noinfo,_invalid_parameter_noinfo,FindFirstFileExW,FindNextFileW,FindClose,FindClose,FindClose,

                      Networking

                      barindex
                      Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 115.178.55.22 80
                      Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 172.105.115.71 8080
                      Source: TrafficSnort IDS: 2404304 ET CNC Feodo Tracker Reported CnC Server TCP group 3 192.168.2.6:49714 -> 115.178.55.22:80
                      Source: Malware configuration extractorIPs: 172.105.115.71:8080
                      Source: Malware configuration extractorIPs: 218.38.121.17:443
                      Source: Malware configuration extractorIPs: 186.250.48.5:443
                      Source: Malware configuration extractorIPs: 103.71.99.57:8080
                      Source: Malware configuration extractorIPs: 85.214.67.203:8080
                      Source: Malware configuration extractorIPs: 85.25.120.45:8080
                      Source: Malware configuration extractorIPs: 139.196.72.155:8080
                      Source: Malware configuration extractorIPs: 103.85.95.4:8080
                      Source: Malware configuration extractorIPs: 198.199.70.22:8080
                      Source: Malware configuration extractorIPs: 209.239.112.82:8080
                      Source: Malware configuration extractorIPs: 78.47.204.80:443
                      Source: Malware configuration extractorIPs: 36.67.23.59:443
                      Source: Malware configuration extractorIPs: 104.244.79.94:443
                      Source: Malware configuration extractorIPs: 62.171.178.147:8080
                      Source: Malware configuration extractorIPs: 195.77.239.39:8080
                      Source: Malware configuration extractorIPs: 103.56.149.105:8080
                      Source: Malware configuration extractorIPs: 80.211.107.116:8080
                      Source: Malware configuration extractorIPs: 93.104.209.107:8080
                      Source: Malware configuration extractorIPs: 174.138.33.49:7080
                      Source: Malware configuration extractorIPs: 202.28.34.99:8080
                      Source: Malware configuration extractorIPs: 178.62.112.199:8080
                      Source: Malware configuration extractorIPs: 114.79.130.68:443
                      Source: Malware configuration extractorIPs: 118.98.72.86:443
                      Source: Malware configuration extractorIPs: 103.41.204.169:8080
                      Source: Malware configuration extractorIPs: 178.238.225.252:8080
                      Source: Malware configuration extractorIPs: 83.229.80.93:8080
                      Source: Malware configuration extractorIPs: 46.101.98.60:8080
                      Source: Malware configuration extractorIPs: 82.98.180.154:7080
                      Source: Malware configuration extractorIPs: 87.106.97.83:7080
                      Source: Malware configuration extractorIPs: 196.44.98.190:8080
                      Source: Malware configuration extractorIPs: 139.59.80.108:8080
                      Source: Malware configuration extractorIPs: 103.224.241.74:8080
                      Source: Malware configuration extractorIPs: 103.254.12.236:7080
                      Source: Malware configuration extractorIPs: 185.148.169.10:8080
                      Source: Malware configuration extractorIPs: 165.22.254.236:8080
                      Source: Malware configuration extractorIPs: 37.44.244.177:8080
                      Source: Malware configuration extractorIPs: 54.37.228.122:443
                      Source: Malware configuration extractorIPs: 51.75.33.122:443
                      Source: Malware configuration extractorIPs: 128.199.217.206:443
                      Source: Malware configuration extractorIPs: 188.165.79.151:443
                      Source: Malware configuration extractorIPs: 210.57.209.142:8080
                      Source: Malware configuration extractorIPs: 160.16.143.191:8080
                      Source: Malware configuration extractorIPs: 175.126.176.79:8080
                      Source: Malware configuration extractorIPs: 202.134.4.210:7080
                      Source: Malware configuration extractorIPs: 103.126.216.86:443
                      Source: Malware configuration extractorIPs: 190.145.8.4:443
                      Source: Malware configuration extractorIPs: 128.199.242.164:8080
                      Source: Malware configuration extractorIPs: 64.227.55.231:8080
                      Source: Joe Sandbox ViewASN Name: LINODE-APLinodeLLCUS LINODE-APLinodeLLCUS
                      Source: Joe Sandbox ViewASN Name: OVHFR OVHFR
                      Source: Joe Sandbox ViewIP Address: 172.105.115.71 172.105.115.71
                      Source: unknownNetwork traffic detected: IP country count 20
                      Source: unknownTCP traffic detected without corresponding DNS query: 115.178.55.22
                      Source: unknownTCP traffic detected without corresponding DNS query: 115.178.55.22
                      Source: unknownTCP traffic detected without corresponding DNS query: 115.178.55.22
                      Source: unknownTCP traffic detected without corresponding DNS query: 172.105.115.71
                      Source: unknownTCP traffic detected without corresponding DNS query: 172.105.115.71
                      Source: unknownTCP traffic detected without corresponding DNS query: 172.105.115.71
                      Source: unknownTCP traffic detected without corresponding DNS query: 172.105.115.71
                      Source: unknownTCP traffic detected without corresponding DNS query: 172.105.115.71
                      Source: unknownTCP traffic detected without corresponding DNS query: 172.105.115.71
                      Source: unknownTCP traffic detected without corresponding DNS query: 172.105.115.71
                      Source: unknownTCP traffic detected without corresponding DNS query: 172.105.115.71
                      Source: unknownTCP traffic detected without corresponding DNS query: 172.105.115.71
                      Source: unknownTCP traffic detected without corresponding DNS query: 172.105.115.71
                      Source: unknownTCP traffic detected without corresponding DNS query: 172.105.115.71
                      Source: unknownTCP traffic detected without corresponding DNS query: 172.105.115.71
                      Source: regsvr32.exe, 00000007.00000003.427841680.0000000000E04000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000003.556749300.0000000000E04000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000003.557059862.0000000000E07000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000003.557538526.0000000000E0A000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000003.557982608.0000000000E0B000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000002.702427302.0000000000E0E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
                      Source: regsvr32.exe, 00000007.00000003.422849672.0000000000E6C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/L
                      Source: regsvr32.exe, 00000007.00000003.558020353.0000000000E52000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000003.427732059.0000000000E52000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000002.702486993.0000000000E52000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000003.557007547.0000000000E52000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000003.427883229.0000000000E52000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/Low
                      Source: regsvr32.exe, 00000007.00000003.557297088.0000000000DDC000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000003.427917940.0000000000DD6000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000002.702378692.0000000000DDD000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000003.555859485.0000000000DD6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en
                      Source: regsvr32.exe, 00000007.00000003.427841680.0000000000E04000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000003.558020353.0000000000E52000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000003.427732059.0000000000E52000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000003.556749300.0000000000E04000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000002.702486993.0000000000E52000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000003.557059862.0000000000E07000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000003.557538526.0000000000E0A000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000003.557007547.0000000000E52000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000003.557982608.0000000000E0B000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000002.702427302.0000000000E0E000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000003.427883229.0000000000E52000.00000004.00000020.00020000.00000000.sdmp, 77EC63BDA74BD0D0E0426DC8F80085060.7.drString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
                      Source: regsvr32.exe, 00000007.00000003.427883229.0000000000E52000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab?07a6b928d5b0b
                      Source: regsvr32.exe, 00000007.00000003.556726724.0000000000DF4000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000003.427612828.0000000000DED000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000002.702404362.0000000000DF5000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000003.427824031.0000000000DF0000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000003.557517173.0000000000DF5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab?eh
                      Source: regsvr32.exe, 00000007.00000003.427917940.0000000000DD6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://112.105.115.71:8080/
                      Source: regsvr32.exe, 00000007.00000003.557297088.0000000000DDC000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000003.427917940.0000000000DD6000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000002.702378692.0000000000DDD000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000003.555859485.0000000000DD6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://172.105.115.71:8080/
                      Source: regsvr32.exe, 00000007.00000003.557517173.0000000000DF5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://172.105.115.71:8080/sznnz/

                      E-Banking Fraud

                      barindex
                      Source: Yara matchFile source: 7.2.regsvr32.exe.f00000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.regsvr32.exe.2220000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 11.2.regsvr32.exe.2d10000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.2.rundll32.exe.2112e630000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.2.rundll32.exe.2112e630000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.2d49c940000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.regsvr32.exe.2220000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.2d49c940000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 11.2.regsvr32.exe.2d10000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.rundll32.exe.1fa0a880000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 7.2.regsvr32.exe.f00000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.rundll32.exe.1fa0a880000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0000000B.00000002.467051052.0000000002D41000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.318362912.0000000002371000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000B.00000002.467020854.0000000002D10000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.312762728.000001FA0A8D1000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000007.00000002.702581906.0000000000F51000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000007.00000002.702535100.0000000000F00000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.312660694.000001FA0A880000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.311777418.000002D49CBA1000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000006.00000002.318286149.000002112E630000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.318268149.0000000002220000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000006.00000002.318338859.000002112E661000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.311650335.000002D49C940000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: C:\Windows\System32\regsvr32.exeFile deleted: C:\Windows\System32\MHtsbrv\IoiBQ.dll:Zone.IdentifierJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeFile created: C:\Windows\system32\MHtsbrv\Jump to behavior
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180044C30
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180031018
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800391F8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180020204
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018001F22C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018003D23C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180029290
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180024460
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018001F4B0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800204D0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018003459C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018003B5A0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800305F8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180017604
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018001F74C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180032824
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180037854
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018002B890
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018000A93C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018003A9A0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018001F9B4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180026A0C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180028B30
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018002B890
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018001FC30
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180031C3C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180028B30
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018003AE50
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018001FF10
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180032F94
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02250000
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_023738A5
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_023948E0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0237B1E0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02379E38
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02390454
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02398C94
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02375DB4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02374DDC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02389230
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0237BA24
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02391A2C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02371A1C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0238FA08
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02398A04
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0238827C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02382244
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0238629C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0239629C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02379298
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02392A84
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02377AF0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0238B2F0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0237EAC4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02385334
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0238D32C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02385B18
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02380310
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02371364
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0237C364
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0237E368
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02371B5C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02376B5C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02397348
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02374B4C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0238FB88
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02383B88
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02392B8C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0237CB8D
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_023873F8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02387BF8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0237F3E0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02379BEC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02373BE8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02372834
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0237E828
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02371000
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0239005C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_023778B6
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_023848B0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_023810AC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0238B898
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02394098
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0238308C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02376880
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_023898DC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0237B8D0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_023738DC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02390930
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02399124
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02372128
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02382110
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0237F174
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0238C974
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02380954
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02379144
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_023859A0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0237D1AC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02387198
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_023899E8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0237D1E0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_023799EC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0237A1D4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0238C1DC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_023779D8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_023769C0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0237BE34
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0238E614
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02371660
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02381664
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02376650
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_023796B8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02397EA4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02383698
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02377694
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02398690
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0237569C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02385694
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0237AE84
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02394680
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02388ECC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0237A734
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0238CF30
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02391728
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0237871C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0237E708
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02388778
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0237FF64
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0238E76C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_023957B4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_023897AC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02378FA0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02384FA4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02382780
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02383FE0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0237741C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02385400
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02375478
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02386464
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02384C48
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02374CA0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0237C498
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0239748C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_023964F8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_023784F8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02371CCC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02393D28
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02379D24
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0238B520
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02383524
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02385508
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02388D0C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0237BD00
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0237E570
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02388560
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0238F550
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02390D54
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02381DAC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02375590
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02395D84
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000002D49C970000
                      Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000001FA0A8C0000
                      Source: C:\Windows\System32\rundll32.exeCode function: 6_2_000002112CB90000
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00D60000
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00F748E0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00F538DC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00F72CBC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00F5B1E0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00F54DDC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00F55DB4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00F59144
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00F65694
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00F52A7C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00F59E38
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00F6FA08
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00F673F8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00F53BE8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00F6E76C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00F6D718
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00F584F8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00F764F8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00F5B8D0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00F698DC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00F51CCC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00F578B6
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00F648B0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00F54CA0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00F610AC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00F78C94
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00F5C498
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00F6B898
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00F74098
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00F56880
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00F6308C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00F7748C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00F55478
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00F66464
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00F70454
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00F7005C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00F64C48
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00F52834
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00F5E828
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00F5741C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00F5CC06
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00F51000
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00F65400
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00F73C0C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00F5D1E0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00F599EC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00F699E8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00F5A1D4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00F6C1DC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00F579D8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00F569C0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00F659A0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00F5D1AC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00F61DAC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00F55590
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00F67198
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00F75D84
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00F5F174
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00F6C974
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00F5E570
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00F68560
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00F79568
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00F60954
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00F70D54
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00F6F550
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00F70930
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00F59D24
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00F63524
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00F79124
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00F6B520
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00F52128
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00F73D28
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00F62110
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00F5BD00
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00F68D0C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00F65508
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00F57AF0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00F6B2F0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00F5EAC4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00F68ECC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00F596B8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00F77EA4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00F5C6A2
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00F57694
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00F78690
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00F5569C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00F6629C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00F7629C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00F59298
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00F63698
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00F5AE84
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00F72A84
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00F74680
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00F6827C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00F61664
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00F51660
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00F56650
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00F62244
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00F5BE34
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00F69230
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00F5BA24
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00F71A2C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00F6E614
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00F51A1C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00F78A04
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00F67BF8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00F5F3E0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00F63FE0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00F59BEC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00F757B4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00F747B0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00F64FA4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00F58FA0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00F697AC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00F62780
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00F72B8C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00F63B88
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00F6FB88
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00F68778
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00F51364
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00F5FF64
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00F5C364
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00F5E368
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00F56B5C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00F51B5C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00F54B4C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00F77348
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00F5A734
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00F65334
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00F6CF30
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00F6D32C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00F71728
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00F75B28
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00F60310
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00F5871C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00F65B18
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00F5E708
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_01350000
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02D49E38
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02D55B18
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02D648E0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02D68C94
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02D438A5
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02D60454
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02D44DDC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02D4B1E0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02D45DB4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02D4EAC4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02D58ECC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02D47AF0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02D5B2F0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02D47694
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02D55694
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02D68690
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02D4569C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02D5629C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02D6629C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02D49298
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02D53698
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02D4AE84
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02D62A84
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02D64680
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02D496B8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02D67EA4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02D46650
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02D52244
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02D5827C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02D51664
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02D41660
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02D5E614
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02D41A1C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02D68A04
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02D5FA08
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02D4BE34
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02D59230
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02D4BA24
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02D61A2C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02D573F8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02D57BF8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02D4F3E0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02D53FE0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02D49BEC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02D43BE8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02D52780
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02D4CB8D
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02D62B8C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02D5FB88
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02D53B88
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02D657B4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02D647B0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02D54FA4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02D48FA0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02D597AC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02D46B5C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02D41B5C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02D44B4C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02D67348
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02D58778
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02D41364
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02D4FF64
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02D4C364
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02D5E76C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02D4E368
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02D50310
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02D4871C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02D4E708
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02D4A734
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02D55334
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02D5CF30
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02D5D32C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02D61728
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02D65B28
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02D4B8D0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02D438DC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02D598DC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02D41CCC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02D484F8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02D664F8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02D4C498
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02D5B898
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02D64098
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02D46880
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02D5308C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02D6748C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02D478B6
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02D548B0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02D44CA0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02D510AC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02D6005C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02D54C48
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02D45478
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02D4D864
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02D56464
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02D4741C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02D41000
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02D55400
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02D63C0C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02D42834
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02D4E828
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02D4A1D4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02D5C1DC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02D479D8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02D469C0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02D4D1CA
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02D499EC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02D599E8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02D45590
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02D57198
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02D65D84
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02D559A0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02D4D1AC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02D51DAC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02D50954
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02D60D54
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02D5F550
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02D49144
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02D4F174
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02D5C974
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02D4E570
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02D58560
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02D69568
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02D52110
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02D4BD00
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02D58D0C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02D55508
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02D60930
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02D49D24
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02D53524
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02D69124
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02D5B520
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02D42128
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02D63D28
                      Source: C:\Windows\System32\regsvr32.exeCode function: String function: 000000018002CA30 appears 48 times
                      Source: C:\Windows\System32\regsvr32.exeSection loaded: sfc.dll
                      Source: C:\Windows\System32\regsvr32.exeSection loaded: sfc.dll
                      Source: C:\Windows\System32\regsvr32.exeSection loaded: sfc.dll
                      Source: C:\Windows\System32\regsvr32.exeSection loaded: sfc.dll
                      Source: UC2DFXQIBiE2kQ.dllReversingLabs: Detection: 80%
                      Source: UC2DFXQIBiE2kQ.dllVirustotal: Detection: 65%
                      Source: UC2DFXQIBiE2kQ.dllStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      Source: C:\Windows\System32\loaddll64.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                      Source: unknownProcess created: C:\Windows\System32\loaddll64.exe loaddll64.exe "C:\Users\user\Desktop\UC2DFXQIBiE2kQ.dll"
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\UC2DFXQIBiE2kQ.dll",#1
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\UC2DFXQIBiE2kQ.dll
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\UC2DFXQIBiE2kQ.dll",#1
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\UC2DFXQIBiE2kQ.dll,ACeujVZMknFDjv
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\UC2DFXQIBiE2kQ.dll,AHuDGMflBfPryOEYjuTfbzJdEM
                      Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\System32\regsvr32.exe C:\Windows\system32\regsvr32.exe "C:\Windows\system32\MHtsbrv\IoiBQ.dll"
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\UC2DFXQIBiE2kQ.dll,ATjQPkInxPUGuUu
                      Source: unknownProcess created: C:\Windows\System32\regsvr32.exe C:\Windows\system32\regsvr32.exe" "C:\Windows\system32\MHtsbrv\IoiBQ.dll
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\regsvr32.exe C:\Windows\system32\regsvr32.exe "C:\Users\user\AppData\Local\VADoV\ahExZn.dll"
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\UC2DFXQIBiE2kQ.dll",#1
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\UC2DFXQIBiE2kQ.dll
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\UC2DFXQIBiE2kQ.dll,ACeujVZMknFDjv
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\UC2DFXQIBiE2kQ.dll,AHuDGMflBfPryOEYjuTfbzJdEM
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\UC2DFXQIBiE2kQ.dll,ATjQPkInxPUGuUu
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\UC2DFXQIBiE2kQ.dll",#1
                      Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\System32\regsvr32.exe C:\Windows\system32\regsvr32.exe "C:\Windows\system32\MHtsbrv\IoiBQ.dll"
                      Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\System32\regsvr32.exe C:\Windows\system32\regsvr32.exe "C:\Users\user\AppData\Local\VADoV\ahExZn.dll"
                      Source: C:\Windows\System32\regsvr32.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32
                      Source: C:\Windows\System32\regsvr32.exeFile created: C:\Users\user\AppData\Local\VADoV\Jump to behavior
                      Source: classification engineClassification label: mal84.troj.evad.winDLL@19/2@0/49
                      Source: C:\Windows\System32\regsvr32.exeFile read: C:\Users\desktop.iniJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02375DB4 FindCloseChangeNotification,Process32NextW,CreateToolhelp32Snapshot,Process32FirstW,
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\UC2DFXQIBiE2kQ.dll",#1
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3536:120:WilError_01
                      Source: C:\Windows\System32\regsvr32.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Windows\System32\rundll32.exeAutomated click: OK
                      Source: C:\Windows\System32\regsvr32.exeAutomated click: OK
                      Source: Window RecorderWindow detected: More than 3 window changes detected
                      Source: UC2DFXQIBiE2kQ.dllStatic PE information: More than 250 > 100 exports found
                      Source: UC2DFXQIBiE2kQ.dllStatic PE information: Image base 0x180000000 > 0x60000000
                      Source: UC2DFXQIBiE2kQ.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                      Source: UC2DFXQIBiE2kQ.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                      Source: UC2DFXQIBiE2kQ.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                      Source: UC2DFXQIBiE2kQ.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                      Source: UC2DFXQIBiE2kQ.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                      Source: UC2DFXQIBiE2kQ.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                      Source: UC2DFXQIBiE2kQ.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                      Source: UC2DFXQIBiE2kQ.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                      Source: UC2DFXQIBiE2kQ.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                      Source: UC2DFXQIBiE2kQ.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                      Source: UC2DFXQIBiE2kQ.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                      Source: UC2DFXQIBiE2kQ.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800131BD push rdi; ret
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180013749 push rdi; ret
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02393A7E push ebp; ret
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0237838C push eax; ret
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0238E0E9 push 8B48E1F7h; retf
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0238E0D3 push 09B8E1F7h; retf
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02393127 push ebp; ret
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02392E55 push ebp; retf
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_02392F5E push ebp; ret
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0238E5C5 pushad ; ret
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00F5838C push eax; ret
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02D62E55 push ebp; retf
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02D63A7E push ebp; ret
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02D63BE1 push ebp; ret
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02D4838C push eax; ret
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02D62F5E push ebp; ret
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02D5E0D3 push 09B8E1F7h; retf
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02D5E0E9 push 8B48E1F7h; retf
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02D5E5C5 pushad ; ret
                      Source: C:\Windows\System32\regsvr32.exeCode function: 11_2_02D63127 push ebp; ret
                      Source: UC2DFXQIBiE2kQ.dllStatic PE information: section name: _RDATA
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\UC2DFXQIBiE2kQ.dll
                      Source: C:\Windows\System32\regsvr32.exePE file moved: C:\Windows\System32\MHtsbrv\IoiBQ.dllJump to behavior

                      Boot Survival

                      barindex
                      Source: C:\Windows\System32\regsvr32.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run IoiBQ.dllJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run IoiBQ.dllJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run IoiBQ.dllJump to behavior

                      Hooking and other Techniques for Hiding and Protection

                      barindex
                      Source: C:\Windows\System32\regsvr32.exeFile opened: C:\Windows\system32\MHtsbrv\IoiBQ.dll:Zone.Identifier read attributes | delete
                      Source: C:\Windows\System32\regsvr32.exeFile opened: C:\Users\user\AppData\Local\VADoV\ahExZn.dll:Zone.Identifier read attributes | delete
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\regsvr32.exe TID: 2160Thread sleep time: -60000s >= -30000s
                      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                      Source: C:\Windows\System32\regsvr32.exeAPI coverage: 7.5 %
                      Source: C:\Windows\System32\regsvr32.exeProcess information queried: ProcessInformation
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180029290 FindFirstFileExW,
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018002972C FindFirstFileExW,FindNextFileW,FindClose,
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180028B30 _invalid_parameter_noinfo,_invalid_parameter_noinfo,FindFirstFileExW,FindNextFileW,FindClose,FindClose,FindClose,
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180028B30 _invalid_parameter_noinfo,_invalid_parameter_noinfo,FindFirstFileExW,FindNextFileW,FindClose,FindClose,FindClose,
                      Source: C:\Windows\System32\regsvr32.exeFile Volume queried: C:\ FullSizeInformation
                      Source: C:\Windows\System32\regsvr32.exeFile Volume queried: C:\ FullSizeInformation
                      Source: regsvr32.exe, 00000007.00000003.427841680.0000000000E04000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000003.556749300.0000000000E04000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000003.557059862.0000000000E07000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000003.557538526.0000000000E0A000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000003.557982608.0000000000E0B000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000002.702427302.0000000000E0E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                      Source: regsvr32.exe, 00000007.00000003.427515676.0000000000DBE000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000003.557364615.0000000000DBE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW`
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180003460 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018002DE88 GetProcessHeap,
                      Source: C:\Windows\System32\loaddll64.exeProcess queried: DebugPort
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180003460 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180003648 SetUnhandledExceptionFilter,
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800156F8 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_0000000180002E94 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,

                      HIPS / PFW / Operating System Protection Evasion

                      barindex
                      Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 115.178.55.22 80
                      Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 172.105.115.71 8080
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\UC2DFXQIBiE2kQ.dll",#1
                      Source: C:\Windows\System32\regsvr32.exeQueries volume information: C:\ VolumeInformation
                      Source: C:\Windows\System32\regsvr32.exeCode function: EnumSystemLocalesW,
                      Source: C:\Windows\System32\regsvr32.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,
                      Source: C:\Windows\System32\regsvr32.exeCode function: EnumSystemLocalesW,
                      Source: C:\Windows\System32\regsvr32.exeCode function: GetLocaleInfoW,
                      Source: C:\Windows\System32\regsvr32.exeCode function: try_get_function,GetLocaleInfoW,
                      Source: C:\Windows\System32\regsvr32.exeCode function: EnumSystemLocalesW,
                      Source: C:\Windows\System32\regsvr32.exeCode function: EnumSystemLocalesW,
                      Source: C:\Windows\System32\regsvr32.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,
                      Source: C:\Windows\System32\regsvr32.exeCode function: GetLocaleInfoW,
                      Source: C:\Windows\System32\regsvr32.exeCode function: EnumSystemLocalesW,GetUserDefaultLCID,ProcessCodePage,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,
                      Source: C:\Windows\System32\regsvr32.exeCode function: TranslateName,TranslateName,GetACP,IsValidCodePage,GetLocaleInfoW,
                      Source: C:\Windows\System32\regsvr32.exeCode function: EnumSystemLocalesW,
                      Source: C:\Windows\System32\regsvr32.exeCode function: EnumSystemLocalesW,
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_00000001800243D0 cpuid
                      Source: C:\Windows\System32\regsvr32.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
                      Source: C:\Windows\System32\regsvr32.exeCode function: 3_2_000000018002D450 try_get_function,GetSystemTimeAsFileTime,

                      Stealing of Sensitive Information

                      barindex
                      Source: Yara matchFile source: 7.2.regsvr32.exe.f00000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.regsvr32.exe.2220000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 11.2.regsvr32.exe.2d10000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.2.rundll32.exe.2112e630000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.2.rundll32.exe.2112e630000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.2d49c940000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.regsvr32.exe.2220000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.2d49c940000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 11.2.regsvr32.exe.2d10000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.rundll32.exe.1fa0a880000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 7.2.regsvr32.exe.f00000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.rundll32.exe.1fa0a880000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0000000B.00000002.467051052.0000000002D41000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.318362912.0000000002371000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000B.00000002.467020854.0000000002D10000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.312762728.000001FA0A8D1000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000007.00000002.702581906.0000000000F51000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000007.00000002.702535100.0000000000F00000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.312660694.000001FA0A880000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.311777418.000002D49CBA1000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000006.00000002.318286149.000002112E630000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.318268149.0000000002220000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000006.00000002.318338859.000002112E661000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.311650335.000002D49C940000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                      Valid AccountsWindows Management Instrumentation11
                      Registry Run Keys / Startup Folder
                      111
                      Process Injection
                      21
                      Masquerading
                      OS Credential Dumping1
                      System Time Discovery
                      Remote Services1
                      Archive Collected Data
                      Exfiltration Over Other Network Medium2
                      Encrypted Channel
                      Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                      Default AccountsScheduled Task/Job1
                      DLL Side-Loading
                      11
                      Registry Run Keys / Startup Folder
                      2
                      Virtualization/Sandbox Evasion
                      LSASS Memory31
                      Security Software Discovery
                      Remote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth1
                      Application Layer Protocol
                      Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                      Domain AccountsAt (Linux)Logon Script (Windows)1
                      DLL Side-Loading
                      111
                      Process Injection
                      Security Account Manager2
                      Virtualization/Sandbox Evasion
                      SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                      Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)1
                      Deobfuscate/Decode Files or Information
                      NTDS2
                      Process Discovery
                      Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
                      Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
                      Hidden Files and Directories
                      LSA Secrets1
                      Remote System Discovery
                      SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                      Replication Through Removable MediaLaunchdRc.commonRc.common2
                      Obfuscated Files or Information
                      Cached Domain Credentials2
                      File and Directory Discovery
                      VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                      External Remote ServicesScheduled TaskStartup ItemsStartup Items1
                      Regsvr32
                      DCSync34
                      System Information Discovery
                      Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                      Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job1
                      Rundll32
                      Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
                      Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)1
                      DLL Side-Loading
                      /etc/passwd and /etc/shadowSystem Network Connections DiscoverySoftware Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
                      Supply Chain CompromiseAppleScriptAt (Windows)At (Windows)1
                      File Deletion
                      Network SniffingProcess DiscoveryTaint Shared ContentLocal Data StagingExfiltration Over Unencrypted/Obfuscated Non-C2 ProtocolFile Transfer ProtocolsData Encrypted for Impact
                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet
                      behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 747451 Sample: UC2DFXQIBiE2kQ.dll Startdate: 16/11/2022 Architecture: WINDOWS Score: 84 30 103.224.241.74 WEBWERKS-AS-INWebWerksIndiaPvtLtdIN India 2->30 32 210.57.209.142 UNAIR-AS-IDUniversitasAirlanggaID Indonesia 2->32 34 45 other IPs or domains 2->34 40 Snort IDS alert for network traffic 2->40 42 Multi AV Scanner detection for submitted file 2->42 44 Yara detected Emotet 2->44 46 C2 URLs / IPs found in malware configuration 2->46 8 loaddll64.exe 1 2->8         started        10 regsvr32.exe 2 2->10         started        signatures3 process4 signatures5 13 regsvr32.exe 2 8->13         started        16 cmd.exe 1 8->16         started        18 rundll32.exe 8->18         started        22 3 other processes 8->22 52 Hides that the sample has been downloaded from the Internet (zone.identifier) 10->52 20 regsvr32.exe 10->20         started        process6 signatures7 54 Hides that the sample has been downloaded from the Internet (zone.identifier) 13->54 24 regsvr32.exe 1 13->24         started        28 rundll32.exe 16->28         started        process8 dnsIp9 36 115.178.55.22, 49696, 80 SIMAYA-AS-IDPTSimayaJejaringMandiriID Indonesia 24->36 38 172.105.115.71, 49697, 8080 LINODE-APLinodeLLCUS United States 24->38 48 System process connects to network (likely due to code injection or exploit) 24->48 50 Creates an autostart registry key pointing to binary in C:\Windows 24->50 signatures10

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                      windows-stand
                      SourceDetectionScannerLabelLink
                      UC2DFXQIBiE2kQ.dll81%ReversingLabsWin64.Trojan.Emotet
                      UC2DFXQIBiE2kQ.dll65%VirustotalBrowse
                      No Antivirus matches
                      SourceDetectionScannerLabelLinkDownload
                      6.2.rundll32.exe.2112e630000.0.unpack100%AviraHEUR/AGEN.1215461Download File
                      5.2.rundll32.exe.1fa0a880000.0.unpack100%AviraHEUR/AGEN.1215461Download File
                      3.2.regsvr32.exe.2220000.0.unpack100%AviraHEUR/AGEN.1215461Download File
                      11.2.regsvr32.exe.2d10000.0.unpack100%AviraHEUR/AGEN.1215461Download File
                      7.2.regsvr32.exe.f00000.0.unpack100%AviraHEUR/AGEN.1215461Download File
                      4.2.rundll32.exe.2d49c940000.0.unpack100%AviraHEUR/AGEN.1215461Download File
                      SourceDetectionScannerLabelLink
                      c-0001.c-msedge.net0%VirustotalBrowse
                      SourceDetectionScannerLabelLink
                      https://172.105.115.71:8080/0%Avira URL Cloudsafe
                      https://172.105.115.71:8080/sznnz/0%Avira URL Cloudsafe
                      https://112.105.115.71:8080/0%Avira URL Cloudsafe
                      NameIPActiveMaliciousAntivirus DetectionReputation
                      c-0001.c-msedge.net
                      13.107.4.50
                      truefalseunknown
                      NameSourceMaliciousAntivirus DetectionReputation
                      https://172.105.115.71:8080/regsvr32.exe, 00000007.00000003.557297088.0000000000DDC000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000003.427917940.0000000000DD6000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000002.702378692.0000000000DDD000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000003.555859485.0000000000DD6000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://172.105.115.71:8080/sznnz/regsvr32.exe, 00000007.00000003.557517173.0000000000DF5000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://112.105.115.71:8080/regsvr32.exe, 00000007.00000003.427917940.0000000000DD6000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      • No. of IPs < 25%
                      • 25% < No. of IPs < 50%
                      • 50% < No. of IPs < 75%
                      • 75% < No. of IPs
                      IPDomainCountryFlagASNASN NameMalicious
                      172.105.115.71
                      unknownUnited States
                      63949LINODE-APLinodeLLCUStrue
                      188.165.79.151
                      unknownFrance
                      16276OVHFRtrue
                      196.44.98.190
                      unknownGhana
                      327814EcobandGHtrue
                      174.138.33.49
                      unknownUnited States
                      14061DIGITALOCEAN-ASNUStrue
                      36.67.23.59
                      unknownIndonesia
                      17974TELKOMNET-AS2-APPTTelekomunikasiIndonesiaIDtrue
                      103.41.204.169
                      unknownIndonesia
                      58397INFINYS-AS-IDPTInfinysSystemIndonesiaIDtrue
                      85.214.67.203
                      unknownGermany
                      6724STRATOSTRATOAGDEtrue
                      83.229.80.93
                      unknownUnited Kingdom
                      8513SKYVISIONGBtrue
                      198.199.70.22
                      unknownUnited States
                      14061DIGITALOCEAN-ASNUStrue
                      93.104.209.107
                      unknownGermany
                      8767MNET-ASGermanyDEtrue
                      186.250.48.5
                      unknownBrazil
                      262807RedfoxTelecomunicacoesLtdaBRtrue
                      209.239.112.82
                      unknownUnited States
                      30083AS-30083-GO-DADDY-COM-LLCUStrue
                      175.126.176.79
                      unknownKorea Republic of
                      9523MOKWON-AS-KRMokwonUniversityKRtrue
                      128.199.242.164
                      unknownUnited Kingdom
                      14061DIGITALOCEAN-ASNUStrue
                      178.238.225.252
                      unknownGermany
                      51167CONTABODEtrue
                      46.101.98.60
                      unknownNetherlands
                      14061DIGITALOCEAN-ASNUStrue
                      190.145.8.4
                      unknownColombia
                      14080TelmexColombiaSACOtrue
                      82.98.180.154
                      unknownSpain
                      42612DINAHOSTING-ASEStrue
                      103.71.99.57
                      unknownIndia
                      135682AWDHPL-AS-INAdvikaWebDevelopmentsHostingPvtLtdINtrue
                      87.106.97.83
                      unknownGermany
                      8560ONEANDONE-ASBrauerstrasse48DEtrue
                      103.254.12.236
                      unknownViet Nam
                      56151DIGISTAR-VNDigiStarCompanyLimitedVNtrue
                      103.85.95.4
                      unknownIndonesia
                      136077IDNIC-UNSRAT-AS-IDUniversitasIslamNegeriMataramIDtrue
                      202.134.4.210
                      unknownIndonesia
                      7713TELKOMNET-AS-APPTTelekomunikasiIndonesiaIDtrue
                      165.22.254.236
                      unknownUnited States
                      14061DIGITALOCEAN-ASNUStrue
                      78.47.204.80
                      unknownGermany
                      24940HETZNER-ASDEtrue
                      118.98.72.86
                      unknownIndonesia
                      7713TELKOMNET-AS-APPTTelekomunikasiIndonesiaIDtrue
                      139.59.80.108
                      unknownSingapore
                      14061DIGITALOCEAN-ASNUStrue
                      104.244.79.94
                      unknownUnited States
                      53667PONYNETUStrue
                      37.44.244.177
                      unknownGermany
                      47583AS-HOSTINGERLTtrue
                      51.75.33.122
                      unknownFrance
                      16276OVHFRtrue
                      160.16.143.191
                      unknownJapan9370SAKURA-BSAKURAInternetIncJPtrue
                      103.56.149.105
                      unknownIndonesia
                      55688BEON-AS-IDPTBeonIntermediaIDtrue
                      85.25.120.45
                      unknownGermany
                      8972GD-EMEA-DC-SXB1DEtrue
                      139.196.72.155
                      unknownChina
                      37963CNNIC-ALIBABA-CN-NET-APHangzhouAlibabaAdvertisingCoLtdtrue
                      115.178.55.22
                      unknownIndonesia
                      38783SIMAYA-AS-IDPTSimayaJejaringMandiriIDtrue
                      103.126.216.86
                      unknownBangladesh
                      138482SKYVIEW-AS-APSKYVIEWONLINELTDBDtrue
                      128.199.217.206
                      unknownUnited Kingdom
                      14061DIGITALOCEAN-ASNUStrue
                      114.79.130.68
                      unknownIndia
                      45769DVOIS-IND-VoisBroadbandPvtLtdINtrue
                      103.224.241.74
                      unknownIndia
                      133296WEBWERKS-AS-INWebWerksIndiaPvtLtdINtrue
                      210.57.209.142
                      unknownIndonesia
                      38142UNAIR-AS-IDUniversitasAirlanggaIDtrue
                      202.28.34.99
                      unknownThailand
                      9562MSU-TH-APMahasarakhamUniversityTHtrue
                      80.211.107.116
                      unknownItaly
                      31034ARUBA-ASNITtrue
                      54.37.228.122
                      unknownFrance
                      16276OVHFRtrue
                      218.38.121.17
                      unknownKorea Republic of
                      9318SKB-ASSKBroadbandCoLtdKRtrue
                      185.148.169.10
                      unknownGermany
                      44780EVERSCALE-ASDEtrue
                      195.77.239.39
                      unknownSpain
                      60493FICOSA-ASEStrue
                      178.62.112.199
                      unknownEuropean Union
                      14061DIGITALOCEAN-ASNUStrue
                      62.171.178.147
                      unknownUnited Kingdom
                      51167CONTABODEtrue
                      64.227.55.231
                      unknownUnited States
                      14061DIGITALOCEAN-ASNUStrue
                      Joe Sandbox Version:36.0.0 Rainbow Opal
                      Analysis ID:747451
                      Start date and time:2022-11-16 11:58:52 +01:00
                      Joe Sandbox Product:CloudBasic
                      Overall analysis duration:0h 8m 36s
                      Hypervisor based Inspection enabled:false
                      Report type:light
                      Sample file name:UC2DFXQIBiE2kQ.dll
                      Cookbook file name:default.jbs
                      Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
                      Run name:Run with higher sleep bypass
                      Number of analysed new started processes analysed:16
                      Number of new started drivers analysed:0
                      Number of existing processes analysed:0
                      Number of existing drivers analysed:0
                      Number of injected processes analysed:0
                      Technologies:
                      • HCA enabled
                      • EGA enabled
                      • HDC enabled
                      • AMSI enabled
                      Analysis Mode:default
                      Analysis stop reason:Timeout
                      Detection:MAL
                      Classification:mal84.troj.evad.winDLL@19/2@0/49
                      EGA Information:
                      • Successful, ratio: 100%
                      HDC Information:
                      • Successful, ratio: 82% (good quality ratio 74.8%)
                      • Quality average: 72.8%
                      • Quality standard deviation: 32.3%
                      HCA Information:
                      • Successful, ratio: 99%
                      • Number of executed functions: 0
                      • Number of non-executed functions: 0
                      Cookbook Comments:
                      • Found application associated with file extension: .dll
                      • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, WMIADAP.exe, conhost.exe, backgroundTaskHost.exe
                      • Excluded IPs from analysis (whitelisted): 173.222.108.226, 173.222.108.210, 13.107.4.50
                      • Excluded domains from analysis (whitelisted): ctldl.windowsupdate.com, a767.dspw65.akamai.net, wu-bg-shim.trafficmanager.net, download.windowsupdate.com.edgesuite.net
                      • Not all processes where analyzed, report is missing behavior information
                      • Report size getting too big, too many NtOpenKeyEx calls found.
                      • Report size getting too big, too many NtProtectVirtualMemory calls found.
                      • Report size getting too big, too many NtQueryValueKey calls found.
                      TimeTypeDescription
                      12:00:47AutostartRun: HKLM64\Software\Microsoft\Windows\CurrentVersion\Run IoiBQ.dll C:\Windows\system32\regsvr32.exe "C:\Windows\system32\MHtsbrv\IoiBQ.dll"
                      No context
                      No context
                      No context
                      No context
                      No context
                      Process:C:\Windows\System32\regsvr32.exe
                      File Type:Microsoft Cabinet archive data, Windows 2000/XP setup, 62919 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks, 0x1 compression
                      Category:dropped
                      Size (bytes):62919
                      Entropy (8bit):7.995280921994772
                      Encrypted:true
                      SSDEEP:1536:d+OfVxHl7Wyf11lYom3xQcRVOtPHwQV4rP6Ji7:d+OxHxJlZcuPt4b6q
                      MD5:3DCF580A93972319E82CAFBC047D34D5
                      SHA1:8528D2A1363E5DE77DC3B1142850E51EAD0F4B6B
                      SHA-256:40810E31F1B69075C727E6D557F9614D5880112895FF6F4DF1767E87AE5640D1
                      SHA-512:98384BE7218340F95DAE88D1CB865F23A0B4E12855BEB6E74A3752274C9B4C601E493864DB777BCA677A370D0A9DBFFD68D94898A82014537F3A801CCE839C42
                      Malicious:false
                      Preview:MSCF............,...................I.......Q.........GU.\ .authroot.stl..O..5..CK..<Tk...c_.d....A.K...+.d.-;%.BJII!.QIR..$t)Kd.-QQ*...g......^..~|N=...y....{. .4{...W....b.i...j.I.......1:..b\.0.....Ait.2t......w.%.&.",tL_...4.8L[G..;.57....AT.k.......V..K......(....mzS...G....r.".=H.?>.........x&...S%....X.M^..j...A..x.9`.9...A../.s..#.4#.....Id.w..B....s.8..(...dj....=L.)..s.d.]NxQX8....stV#.K.'7.tH..9u~.2..!..2./.....!..9C../...mP $..../y.....@p.6.}.`...5. 0r.w...@(.. .Q....)g.........m..z*.8rR..).].T9r<.L....0..`.........c.....;-.g..;.wk.)......i..c5.....{v.u...AS..=.....&.:.........+..P.N..9..EAQ.V.$s.......B.`.Mfe..8.......$...y-.q9J........W...2.Q8...O.......i..@\^.=X..dG$.M..#=....m.h..{9.'...-.v..Z...!....z.....N....i..^..,........d...%Xa~q.@D|0...Y.m...........&d.4..A..{t=...../.t.3._.....?-.....uroP?.d.Z..S..{...$.i....X..$.O..4..N.)....U.Z..P....X,.... ...Lg..35..W..s.!c...Ap.].P..8..M..W.......U..,...m.u..|=.m1..~..!..b...._.
                      Process:C:\Windows\System32\regsvr32.exe
                      File Type:data
                      Category:modified
                      Size (bytes):328
                      Entropy (8bit):3.1047399189055147
                      Encrypted:false
                      SSDEEP:6:kK3N1HlNiN+SkQlPlEGYRMY9z+4KlDA3RUeKlTAlWRyf1:V/kPlE99SNxAhUexYo1
                      MD5:91FB1E611BC3038811F8FAB3E7341200
                      SHA1:BA9D76233C306C2A7AF6713D0086F1FF263CFEAC
                      SHA-256:D9EC19A2F3229CFED8CB1B585E03EC6F42640F7624CC0AC7BF2E27DBDB72DEC9
                      SHA-512:47886FE486FD7D6CB653B9060B313D8921E64291AAD891EEFE4327AD4AC64E9BED40C8E483FCB8B3F2394F06D0551B6DBCEB325C0D020B810C8BC5351E86B695
                      Malicious:false
                      Preview:p...... ........'.......(....................................................... ..................&...............h.t.t.p.:././.c.t.l.d.l...w.i.n.d.o.w.s.u.p.d.a.t.e...c.o.m./.m.s.d.o.w.n.l.o.a.d./.u.p.d.a.t.e./.v.3./.s.t.a.t.i.c./.t.r.u.s.t.e.d.r./.e.n./.a.u.t.h.r.o.o.t.s.t.l...c.a.b...".0.e.d.e.4.d.3.9.b.e.8.d.8.1.:.0."...
                      File type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                      Entropy (8bit):6.82554843363977
                      TrID:
                      • Win64 Dynamic Link Library (generic) (102004/3) 86.43%
                      • Win64 Executable (generic) (12005/4) 10.17%
                      • Generic Win/DOS Executable (2004/3) 1.70%
                      • DOS Executable Generic (2002/1) 1.70%
                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.01%
                      File name:UC2DFXQIBiE2kQ.dll
                      File size:636416
                      MD5:e2ec88ae31e147d1976368c6a8988d3c
                      SHA1:937a21ced7f2663c923c9c614cbe06d95def511a
                      SHA256:ae7e655db35a71a3b2df96051d722d7995ec94feea3cbd59bec501042ab40847
                      SHA512:ce9c95d721ee389dbbe3d7758d51bdde38f608675c7123d61fa6e0fde500e677651c043be3ef1d52d424b4a1d80d7191cb180887a8944059634ca55042bfa278
                      SSDEEP:6144:S6/ptuaN+qWUILr1HRf/9Mu1vHLI7U9XWi9gQ30/bP/09Xls9HV6MExbnyDAzlsH:S6/ptu/qerXtU7U9XUZWYobyDAzl+
                      TLSH:A7D4BE04B2AC40B5D5BBC17AC8A3592AE2B27C524764D7CB13A107BA1F2B7E11D3FB51
                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......................................................................................\.......\.......\.r.............\.......Rich...
                      Icon Hash:74f0e4ecccdce0e4
                      Entrypoint:0x180002e54
                      Entrypoint Section:.text
                      Digitally signed:false
                      Imagebase:0x180000000
                      Subsystem:windows gui
                      Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, DLL
                      DLL Characteristics:HIGH_ENTROPY_VA, NX_COMPAT
                      Time Stamp:0x636C09DF [Wed Nov 9 20:13:19 2022 UTC]
                      TLS Callbacks:
                      CLR (.Net) Version:
                      OS Version Major:6
                      OS Version Minor:0
                      File Version Major:6
                      File Version Minor:0
                      Subsystem Version Major:6
                      Subsystem Version Minor:0
                      Import Hash:bf309f28e2e75a572eb2f2244be62b26
                      Instruction
                      dec eax
                      mov dword ptr [esp+08h], ebx
                      dec eax
                      mov dword ptr [esp+10h], esi
                      push edi
                      dec eax
                      sub esp, 20h
                      dec ecx
                      mov edi, eax
                      mov ebx, edx
                      dec eax
                      mov esi, ecx
                      cmp edx, 01h
                      jne 00007F188CAE4077h
                      call 00007F188CAE4ACCh
                      dec esp
                      mov eax, edi
                      mov edx, ebx
                      dec eax
                      mov ecx, esi
                      dec eax
                      mov ebx, dword ptr [esp+30h]
                      dec eax
                      mov esi, dword ptr [esp+38h]
                      dec eax
                      add esp, 20h
                      pop edi
                      jmp 00007F188CAE3EE0h
                      int3
                      int3
                      int3
                      inc eax
                      push ebx
                      dec eax
                      sub esp, 20h
                      dec eax
                      mov ebx, ecx
                      xor ecx, ecx
                      call dword ptr [00049283h]
                      dec eax
                      mov ecx, ebx
                      call dword ptr [00049272h]
                      call dword ptr [0004927Ch]
                      dec eax
                      mov ecx, eax
                      mov edx, C0000409h
                      dec eax
                      add esp, 20h
                      pop ebx
                      dec eax
                      jmp dword ptr [00049270h]
                      dec eax
                      mov dword ptr [esp+08h], ecx
                      dec eax
                      sub esp, 38h
                      mov ecx, 00000017h
                      call dword ptr [00049264h]
                      test eax, eax
                      je 00007F188CAE4079h
                      mov ecx, 00000002h
                      int 29h
                      dec eax
                      lea ecx, dword ptr [00095FC2h]
                      call 00007F188CAE434Eh
                      dec eax
                      mov eax, dword ptr [esp+38h]
                      dec eax
                      mov dword ptr [000960A9h], eax
                      dec eax
                      lea eax, dword ptr [esp+38h]
                      dec eax
                      add eax, 08h
                      dec eax
                      mov dword ptr [00096039h], eax
                      dec eax
                      mov eax, dword ptr [00096092h]
                      dec eax
                      mov dword ptr [00095F03h], eax
                      NameVirtual AddressVirtual Size Is in Section
                      IMAGE_DIRECTORY_ENTRY_EXPORT0x94ef00x1a30.rdata
                      IMAGE_DIRECTORY_ENTRY_IMPORT0x969200x78.rdata
                      IMAGE_DIRECTORY_ENTRY_RESOURCE0xa00000x268.rsrc
                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x9b0000x3b34.pdata
                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                      IMAGE_DIRECTORY_ENTRY_BASERELOC0xa10000x860.reloc
                      IMAGE_DIRECTORY_ENTRY_DEBUG0x916a80x1c.rdata
                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x916d00x138.rdata
                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_IAT0x4c0000x3b0.rdata
                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                      NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                      .text0x10000x4a1e50x4a200False0.48174009274873525data6.479787977595784IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      .rdata0x4c0000x4b5920x4b600False0.611217998548922data6.281987992518068IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .data0x980000x2a440xe00False0.18052455357142858DOS executable (block device driver \322f\324\377\3772)2.7637122521836313IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                      .pdata0x9b0000x3b340x3c00False0.46953125data5.536843174034769IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      _RDATA0x9f0000xf40x200False0.30078125data1.982153456785509IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .rsrc0xa00000x2680x400False0.3173828125data3.200437559634333IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .reloc0xa10000x8600xa00False0.46796875data5.031424688639632IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                      NameRVASizeTypeLanguageCountry
                      RT_STRING0xa00a00x48dataEnglishUnited States
                      RT_MANIFEST0xa00e80x17dXML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States
                      DLLImport
                      USER32.dllMessageBoxA, InvalidateRect, GetMessageW, DefWindowProcW, DestroyWindow, CreateWindowExW, RegisterClassExW, LoadStringW, ShowWindow, DispatchMessageW, SetGestureConfig, GetGestureInfo, TranslateAcceleratorW, TranslateMessage, LoadCursorW, PostQuitMessage, UpdateWindow, BeginPaint, EndPaint, CloseGestureInfoHandle, ScreenToClient
                      GDI32.dllPolyline, LineTo, CreatePen, MoveToEx, DeleteObject, SelectObject
                      ole32.dllCoLoadLibrary
                      CRYPT32.dllCryptStringToBinaryA
                      KERNEL32.dllGetConsoleMode, GetConsoleCP, WriteFile, FlushFileBuffers, SetStdHandle, HeapReAlloc, GetFileSizeEx, WriteConsoleW, SetConsoleCtrlHandler, GetFileType, GetStdHandle, GetProcessHeap, EnumSystemLocalesW, SetFilePointerEx, ReadFile, ReadConsoleW, OutputDebugStringW, CreateFileW, HeapSize, CloseHandle, GetUserDefaultLCID, IsValidLocale, GetStringTypeW, DeleteCriticalSection, RtlCaptureContext, RtlLookupFunctionEntry, RtlVirtualUnwind, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetCurrentProcess, TerminateProcess, IsProcessorFeaturePresent, IsDebuggerPresent, GetStartupInfoW, GetModuleHandleW, QueryPerformanceCounter, GetCurrentProcessId, GetCurrentThreadId, GetSystemTimeAsFileTime, InitializeSListHead, RtlUnwindEx, RtlPcToFileHeader, RaiseException, InterlockedPushEntrySList, InterlockedFlushSList, GetLastError, SetLastError, EncodePointer, EnterCriticalSection, LeaveCriticalSection, RtlUnwind, InitializeCriticalSectionAndSpinCount, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, FreeLibrary, GetProcAddress, LoadLibraryExW, ExitProcess, GetModuleHandleExW, GetModuleFileNameW, GetCurrentThread, HeapFree, HeapAlloc, FindClose, FindFirstFileExW, FindNextFileW, IsValidCodePage, GetACP, GetOEMCP, GetCPInfo, GetCommandLineA, GetCommandLineW, MultiByteToWideChar, WideCharToMultiByte, GetEnvironmentStringsW, FreeEnvironmentStringsW, SetEnvironmentVariableW, GetDateFormatW, GetTimeFormatW, CompareStringW, LCMapStringW, GetLocaleInfoW
                      NameOrdinalAddress
                      ACeujVZMknFDjv10x180043600
                      AHuDGMflBfPryOEYjuTfbzJdEM20x180043f30
                      ATjQPkInxPUGuUu30x180043890
                      AmbryhtjKWGeCnsRXR40x180043690
                      AukYzjkZpQjlyb50x180043e80
                      BEHGKvjtYm60x1800438c0
                      BRUFxz70x180043b50
                      BUZBRSzPLxRhY80x180043ba0
                      BZCzGXtURmWdIZoaE90x180043a50
                      BZqjzJIejob100x1800439a0
                      BmZYhYQxzCQQ110x180043810
                      BubGPfVJvMw120x180043420
                      CBkyPEXjXbRUHKXJo130x180043330
                      CEsNfdgPgd140x180044070
                      CVPqxJEtookkvK150x180043e70
                      CaJBhuFKGDiSQoojdQF160x180044120
                      CcKlmw170x1800434f0
                      CfrkXlNpYveSkH180x180043730
                      CtcUKaNM190x180043d60
                      CtmIxtaSEWrJoeKFHYsQVRF200x180043f20
                      DCcTBPjgUmKACiowmtURUFfgN210x180043290
                      DRpUgpG220x1800432d0
                      DYDsOtWxMUufQk230x1800434c0
                      DacmPRKwn240x180043ca0
                      DdBIgVVvJpDDYojhSveGWyVC250x1800440d0
                      DllRegisterServer260x180044a60
                      EDkUTFetsWTlyEplV270x180043bd0
                      EZveIcVQbxXQvHAc280x180043960
                      EetKwkljiiO290x1800440e0
                      EiwSmYwuw300x180043410
                      EjKZnNkyirwOPcLJfvNShOHV310x180043250
                      ElumsVBNoiVQFecpcx320x1800438f0
                      FVCmCSsewcOgpmVCPhNN330x180043e90
                      FeniiccJDJZQOquCQEDZFbp340x180043490
                      GhuZhUSaPqDNPQyLmKmMs350x180043530
                      GidoxoYzkYTZBUKjTczrNz360x180043240
                      GmOuZYJiGNspxqOxoBCu370x180043af0
                      GoueteXAa380x180043de0
                      HZyUwOgdhWiacaSFvYDsgUbdhh390x180043370
                      HtmqUvH400x1800437f0
                      HvKfMTiGc410x180043ad0
                      HwiGZdXrkhPSBdQhcNF420x180043d80
                      IOKBBQdlpeQCrqGhE430x180043f80
                      IftUczqAOEEpksLc440x1800440b0
                      IujIKjACwijLXf450x180043a80
                      JPOlfklrHwimOYpdWU460x180043980
                      JldHyQJYHPfgwSota470x180043f70
                      KHRcAfeWiWXczrzetcsf480x1800435c0
                      KSBSWsMPLKrvLpLuQEVBQaA490x1800437b0
                      KXPHHrx500x180043cc0
                      KqKYPtMNYPZwVVbFgnJskTDgXZ510x180044080
                      KrLeibTbke520x180043da0
                      KtNQbfYVcdlRzCxJLbItSH530x180043fc0
                      KtZFnRWCN540x180043c50
                      KyUDQzimOqrGaUdqnpHCadI550x180043950
                      LNVXKJhSBOeqiQPpxZuBrf560x180043770
                      LbOnTCPkjmOOEdhEeyEy570x180043cf0
                      LlFIOHcteRaL580x180043990
                      MAmiSwkyFlQMDaCByXR590x1800438d0
                      MHyRvOCLFO600x180043c00
                      MbZnllsXkfnyOmtthLrL610x180043640
                      MbsuSbHtpeltWArBKaXuf620x180043eb0
                      MltZiwCXSxF630x180043440
                      NFzpzSbcGrv640x180043e20
                      NXasCwwz650x180043310
                      NfwIIEvnLCKXIrpxWtDCbXx660x180043bf0
                      NgkonMKeLNPfNxT670x180043b30
                      NlplQAUkkIZ680x1800437e0
                      OQruapyPUnukiDhEvANkgElZqh690x180043700
                      ORBMTIE700x180043e50
                      OdtvuFxrrpfsY710x180043d00
                      OoZePWcMAAdh720x1800432a0
                      PbgMOKpkqAeEgOBtpecKal730x180043a90
                      PhHcvOzcWKVEzqGUAuH740x180044020
                      PqcNviu750x1800439b0
                      PxhniQgzegWvoSCaIPorRhqOEt760x180043200
                      PzcLCLdBlIdqBxBTbNiI770x180043ab0
                      RFSoSJnzzPHjPzvZCOvWT780x180043f90
                      RSrAlLsSbnJmicoYtpKsPYkwFn790x180044040
                      ReujwDwTrVxLhVwaWvQS800x180044100
                      RqzpZDiLuFMWsJ810x180043630
                      SUemGjmeVuPs820x180043a70
                      ScnrskpiicPdg830x180043840
                      SeCKWgTgmmtDUvFC840x180043be0
                      SjnxUxHKGlth850x180043cd0
                      StNIEkqRHMtB860x180043ae0
                      StepECvENJONrwlynYAOx870x180043550
                      SyluAQQc880x180043800
                      SyvpWCmyZbMrEFnfTmyrBRH890x1800436d0
                      TLTUEROtrtYd900x1800434d0
                      TdNJCbJiInjtCOpp910x180043d20
                      TndRvx920x180043fe0
                      TpEywJZSeYXzmbHgod930x180043c70
                      TrziFVlHgMVVONOLNIfRem940x180043d90
                      TzKueUFolaHBJPFhx950x180043b40
                      UClTVsmfYtgzIL960x1800437c0
                      URuQMqrUPMSAGVyWQTqN970x180044010
                      UbLvGEZfkFcvnnw980x180044170
                      VXfdoDKAoHiAA990x180043390
                      VeRxloJdVvetDztDxLQT1000x180043dd0
                      VkIbTCoknzceJuPcnCXzzPj1010x180043e30
                      VqNxpzS1020x180043e00
                      WPumZrRRafooNh1030x1800435a0
                      WQIBBQj1040x1800431e0
                      WUVuwTliAyCBAOHuSOD1050x180043e40
                      WsADtJekvYjSfChaZ1060x1800434e0
                      XBRWcmDQWuUdmmFxx1070x180043570
                      XDLVzSefOKneeAsytcH1080x180043b60
                      XDecZDvu1090x180043ec0
                      XNmJlnrJjgZEjPQQeoOIT1100x180043860
                      XWdPewUOSEaHKCHnynymDhLttF1110x180044000
                      XmEMSisfXGvwdcnUI1120x180044130
                      XxYbsglQgKXTYWUmlX1130x1800433d0
                      YOqqPZdimbNEuvMaM1140x1800439d0
                      YXgNyXKelZfQK1150x180043220
                      YrlEvikMuwUvtjDbAASCV1160x180043b70
                      YrpQLSvKN1170x180043320
                      YtyiKWITImQlOTP1180x1800439f0
                      ZMAtbEQuVEpze1190x180043db0
                      ZOTjVFL1200x180043b20
                      ZXigMFrErZGCgnGQdpTo1210x180043790
                      ZcqfXQvmSIhHXuDEPmA1220x180043610
                      ZmNbZwqyJPRHpqmUZOmpJexK1230x1800436c0
                      aOxloUcrMaTBrKRkXkvrKaAy1240x180044050
                      aXDBQtKlOSCf1250x180043340
                      azZsnWvbQULjBuaCVG1260x180043650
                      bCHMpZKuNDwxXrs1270x180043f00
                      bFyNFHBUflbBAfRZV1280x180043560
                      bGaVPXQawxz1290x180043910
                      bVRtqQ1300x180043d40
                      bWXHfJrBjrdcVRLbuT1310x180043780
                      blakCcJabYayatiII1320x180043c40
                      bsEGIgCVUNZeSRsr1330x1800431f0
                      btMHyPMu1340x180043380
                      bteqpXpGuaIzWJWPXQj1350x1800433e0
                      buvNCuoglefZoipISdUp1360x1800433a0
                      bvumZozkETqFchaDGgv1370x180044150
                      cKgbFcy1380x180043260
                      chPwzpRWTYf1390x180043400
                      cliUpMkAyvnx1400x180043460
                      cpEBzofbApJInexgeY1410x180043520
                      cpNZFVzZSKe1420x180043c20
                      cpmbLfWGBjxaaZNR1430x1800437a0
                      csebqY1440x1800433c0
                      czlJGyv1450x180043430
                      dOrUqBBEUz1460x1800440f0
                      disvxAJjTCcpofcItH1470x180043850
                      djhGwwWdNkNOGnSMVhO1480x180043f50
                      drTNkYg1490x1800435d0
                      elaOoLpqFiyIbnyvaU1500x180043500
                      fAKHjGkpTjHcAAfMvshh1510x180043bc0
                      fBFgQesCsDDEqolwHzSbbSIs1520x180043f40
                      fDZRRfyfwlYoeFo1530x180043b00
                      fLcYUVhVDDHHRUryudAO1540x180043720
                      fWkhxqQSpEMsqhItVIr1550x1800432b0
                      fZQaoqMpByybzlfgG1560x180043a20
                      fadaIHaPgvjpA1570x180044160
                      fodVsUcqiRZtLe1580x1800434b0
                      fwWFiWowsdju1590x180043a00
                      gQiEYElmfk1600x180043480
                      gexCIfMSOkWBVEs1610x180044060
                      gnKyXNiVXhIQQVNkxutn1620x180043350
                      hHoSVYFgUoRXoGwPBdTY1630x1800436f0
                      hKiUTWNKTCBHARIejKtitX1640x180043970
                      hTcXrfT1650x180043b10
                      hdpzQLMeXdHLAXI1660x180043ef0
                      hqmMcxlMowrqdmwCD1670x1800432f0
                      huwZDnzyRrUuSv1680x180044110
                      hwwioGqcSiONSnnoqSgGGlYG1690x1800437d0
                      hwxiWyDPZ1700x180043300
                      iIMUBUcxlPgIoCou1710x180043ce0
                      iXVpeLZjxHYfZy1720x180043ed0
                      ickoyirauzuqSYooWRxIBKP1730x1800433b0
                      ixEhmcgYbORYTvwI1740x180043940
                      jXSCkxhrXSnIiziUsUkSa1750x1800438a0
                      jhMrQlkZnbNzE1760x1800435e0
                      jnmtHhyvcXOtUsFySuhzSRFwZ1770x180043c80
                      jqfPKICr1780x180043210
                      kFVNBreOaZSGgseVYXfZAQSt1790x180043e60
                      kLMzjQJrPZFPf1800x180043470
                      kONtiEAEi1810x180043510
                      kUNUwtZ1820x180043cb0
                      lIEZQCqZKko1830x180043ee0
                      lZiHnzEuXoXZIzRd1840x180043df0
                      larnkUFYFI1850x180043620
                      lfFBdv1860x180043e10
                      mJFTxuzjmKwZE1870x1800438e0
                      mJPUafqK1880x1800436b0
                      mRinbRZ1890x1800435b0
                      miGqUGeEk1900x180043f10
                      muHYTksHDRccMJtbMIVY1910x180043bb0
                      nEWvJUznqPuIORIkmbdcWjKd1920x180043fb0
                      nXCjDafayJLQ1930x180043fa0
                      nfPVFCecEC1940x180043fd0
                      ntSsSyvUegFeD1950x180043590
                      nttFqgw1960x180043f60
                      nuflNZYxVuFptSebTKUXxH1970x180043dc0
                      oFyUMrjmgKtGCEsn1980x180043d70
                      oJhfaaiLZFHiBCXJlPO1990x180043d30
                      oPpitKCbVriCZu2000x180043280
                      oTMlKNA2010x180043d10
                      pOQozXdpf2020x180043710
                      pqXsDgFAKqxqyeZwyCjZ2030x180043230
                      qhBjRUFjPgGnZCYf2040x180043a60
                      qnqswBvEbONoReovLIKnVYuSA2050x1800439c0
                      qpggbjTvfN2060x1800432c0
                      rGJIMlvpqBhxViL2070x180043880
                      rUmobKc2080x180043a10
                      rfqEeKHAx2090x180044140
                      rsgxCEvQpI2100x1800436e0
                      rstbQmhTSxcrhUlcaxRFhGIXK2110x180043c10
                      rxpoWUmUrHlSIHeznkyrivE2120x180043d50
                      rzgTPjoxRh2130x180044090
                      sFmMISJDeOoy2140x180043a40
                      sGzvLqVdsbQ2150x180043930
                      sRyuPhAwDlOgUlGVpIfduYySp2160x1800440a0
                      sTHzpfVYU2170x180043820
                      sUKvQIa2180x180043680
                      sVMFsGCCfvDfoTh2190x180043450
                      sfAGqCcFJlYOMkqZahTjTiAX2200x1800439e0
                      stMogsRXrfH2210x180043c30
                      tBAtJGzOlooKPbZ2220x1800438b0
                      tTdsornziSGMnYRGtlv2230x180043870
                      taVJVqMCMlkFIDWVCcDLV2240x180043ea0
                      twRKUF2250x180043a30
                      uTtYPS2260x180043920
                      ujLBGDEExK2270x1800435f0
                      ujfIFiuxQFuoWpBYlfPja2280x1800436a0
                      unVwakRZhbHEVJWGGZDyCZP2290x1800434a0
                      utlgNYXohozxx2300x180043aa0
                      uvBxDGCDNqLbDaufFb2310x180043740
                      vycQUvI2320x180043830
                      vzdSRyxeERBiXlOkqVUB2330x180043ff0
                      wAHuFSGPWcgVtPzRzoUTnbwo2340x180043660
                      wiIXJqSWsUXvPbq2350x180043360
                      wjeHVSTrDxCzMVNUFEQoz2360x180043b90
                      xPjfyQjUovqeohLapv2370x1800440c0
                      xeyyJZUMQlYiCHikxXoEko2380x180043670
                      xmDlQKqSmhiJfARRXzslVED2390x1800433f0
                      xzJluXH2400x180043580
                      yAYxFjbdwTSooJJzoq2410x180043b80
                      yBpkXiNAKugdWlxIPQKL2420x180043540
                      yIApLlDSJNmmOc2430x180043270
                      yMokeHArDgIyDvmsuwd2440x180044030
                      yVLTygbNjHTxXaOuZBkHmpajxq2450x180043ac0
                      yhCymcBLApUWyPqapsEDJtfjMV2460x180043760
                      yjGXMXnz2470x180043c90
                      yprPVXLUkdnzWv2480x1800432e0
                      yzkENTmBV2490x180043750
                      zQnFkEsglvSmYtKlkFDTme2500x180043900
                      zdMhYw2510x180043c60
                      Language of compilation systemCountry where language is spokenMap
                      EnglishUnited States
                      TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                      192.168.2.6115.178.55.2249714802404304 11/16/22-11:49:29.070302TCP2404304ET CNC Feodo Tracker Reported CnC Server TCP group 34971480192.168.2.6115.178.55.22
                      TimestampSource PortDest PortSource IPDest IP
                      Nov 16, 2022 12:00:30.842588902 CET4969680192.168.2.4115.178.55.22
                      Nov 16, 2022 12:00:31.114790916 CET8049696115.178.55.22192.168.2.4
                      Nov 16, 2022 12:00:31.622838020 CET4969680192.168.2.4115.178.55.22
                      Nov 16, 2022 12:00:31.894951105 CET8049696115.178.55.22192.168.2.4
                      Nov 16, 2022 12:00:32.404217958 CET4969680192.168.2.4115.178.55.22
                      Nov 16, 2022 12:00:32.676603079 CET8049696115.178.55.22192.168.2.4
                      Nov 16, 2022 12:00:38.224107027 CET496978080192.168.2.4172.105.115.71
                      Nov 16, 2022 12:00:38.399163008 CET808049697172.105.115.71192.168.2.4
                      Nov 16, 2022 12:00:38.402193069 CET496978080192.168.2.4172.105.115.71
                      Nov 16, 2022 12:00:38.409889936 CET496978080192.168.2.4172.105.115.71
                      Nov 16, 2022 12:00:38.584748030 CET808049697172.105.115.71192.168.2.4
                      Nov 16, 2022 12:00:38.603451014 CET808049697172.105.115.71192.168.2.4
                      Nov 16, 2022 12:00:38.603521109 CET808049697172.105.115.71192.168.2.4
                      Nov 16, 2022 12:00:38.603640079 CET496978080192.168.2.4172.105.115.71
                      Nov 16, 2022 12:00:38.613255978 CET496978080192.168.2.4172.105.115.71
                      Nov 16, 2022 12:00:38.788207054 CET808049697172.105.115.71192.168.2.4
                      Nov 16, 2022 12:00:38.789042950 CET808049697172.105.115.71192.168.2.4
                      Nov 16, 2022 12:00:38.842250109 CET496978080192.168.2.4172.105.115.71
                      Nov 16, 2022 12:00:43.803936958 CET496978080192.168.2.4172.105.115.71
                      Nov 16, 2022 12:00:43.803936958 CET496978080192.168.2.4172.105.115.71
                      Nov 16, 2022 12:00:43.978933096 CET808049697172.105.115.71192.168.2.4
                      Nov 16, 2022 12:00:43.978991032 CET808049697172.105.115.71192.168.2.4
                      Nov 16, 2022 12:00:44.791079044 CET808049697172.105.115.71192.168.2.4
                      Nov 16, 2022 12:00:44.952107906 CET496978080192.168.2.4172.105.115.71
                      Nov 16, 2022 12:00:47.796264887 CET808049697172.105.115.71192.168.2.4
                      Nov 16, 2022 12:00:47.796338081 CET808049697172.105.115.71192.168.2.4
                      Nov 16, 2022 12:00:47.796525955 CET496978080192.168.2.4172.105.115.71
                      Nov 16, 2022 12:00:47.797079086 CET496978080192.168.2.4172.105.115.71
                      Nov 16, 2022 12:00:47.797142029 CET496978080192.168.2.4172.105.115.71
                      Nov 16, 2022 12:00:47.971709013 CET808049697172.105.115.71192.168.2.4
                      Nov 16, 2022 12:00:47.971746922 CET808049697172.105.115.71192.168.2.4
                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                      Nov 16, 2022 12:00:40.448456049 CET8.8.8.8192.168.2.40x573eNo error (0)au.c-0001.c-msedge.netc-0001.c-msedge.netCNAME (Canonical name)IN (0x0001)false
                      Nov 16, 2022 12:00:40.448456049 CET8.8.8.8192.168.2.40x573eNo error (0)c-0001.c-msedge.net13.107.4.50A (IP address)IN (0x0001)false

                      Click to jump to process

                      Target ID:0
                      Start time:11:59:47
                      Start date:16/11/2022
                      Path:C:\Windows\System32\loaddll64.exe
                      Wow64 process (32bit):false
                      Commandline:loaddll64.exe "C:\Users\user\Desktop\UC2DFXQIBiE2kQ.dll"
                      Imagebase:0x7ff6fb1e0000
                      File size:139776 bytes
                      MD5 hash:C676FC0263EDD17D4CE7D644B8F3FCD6
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high

                      Target ID:1
                      Start time:11:59:47
                      Start date:16/11/2022
                      Path:C:\Windows\System32\conhost.exe
                      Wow64 process (32bit):false
                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Imagebase:0x7ff7c72c0000
                      File size:625664 bytes
                      MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high

                      Target ID:2
                      Start time:11:59:48
                      Start date:16/11/2022
                      Path:C:\Windows\System32\cmd.exe
                      Wow64 process (32bit):false
                      Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\UC2DFXQIBiE2kQ.dll",#1
                      Imagebase:0x7ff632260000
                      File size:273920 bytes
                      MD5 hash:4E2ACF4F8A396486AB4268C94A6A245F
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high

                      Target ID:3
                      Start time:11:59:48
                      Start date:16/11/2022
                      Path:C:\Windows\System32\regsvr32.exe
                      Wow64 process (32bit):false
                      Commandline:regsvr32.exe /s C:\Users\user\Desktop\UC2DFXQIBiE2kQ.dll
                      Imagebase:0x7ff76ca50000
                      File size:24064 bytes
                      MD5 hash:D78B75FC68247E8A63ACBA846182740E
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Yara matches:
                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000003.00000002.318362912.0000000002371000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000003.00000002.318268149.0000000002220000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                      Reputation:high

                      Target ID:4
                      Start time:11:59:48
                      Start date:16/11/2022
                      Path:C:\Windows\System32\rundll32.exe
                      Wow64 process (32bit):false
                      Commandline:rundll32.exe "C:\Users\user\Desktop\UC2DFXQIBiE2kQ.dll",#1
                      Imagebase:0x7ff7709b0000
                      File size:69632 bytes
                      MD5 hash:73C519F050C20580F8A62C849D49215A
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Yara matches:
                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000004.00000002.311777418.000002D49CBA1000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000004.00000002.311650335.000002D49C940000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                      Reputation:high

                      Target ID:5
                      Start time:11:59:48
                      Start date:16/11/2022
                      Path:C:\Windows\System32\rundll32.exe
                      Wow64 process (32bit):false
                      Commandline:rundll32.exe C:\Users\user\Desktop\UC2DFXQIBiE2kQ.dll,ACeujVZMknFDjv
                      Imagebase:0x7ff7709b0000
                      File size:69632 bytes
                      MD5 hash:73C519F050C20580F8A62C849D49215A
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Yara matches:
                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000005.00000002.312762728.000001FA0A8D1000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000005.00000002.312660694.000001FA0A880000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                      Reputation:high

                      Target ID:6
                      Start time:11:59:51
                      Start date:16/11/2022
                      Path:C:\Windows\System32\rundll32.exe
                      Wow64 process (32bit):false
                      Commandline:rundll32.exe C:\Users\user\Desktop\UC2DFXQIBiE2kQ.dll,AHuDGMflBfPryOEYjuTfbzJdEM
                      Imagebase:0x7ff7709b0000
                      File size:69632 bytes
                      MD5 hash:73C519F050C20580F8A62C849D49215A
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Yara matches:
                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000006.00000002.318286149.000002112E630000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000006.00000002.318338859.000002112E661000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security

                      Target ID:7
                      Start time:11:59:52
                      Start date:16/11/2022
                      Path:C:\Windows\System32\regsvr32.exe
                      Wow64 process (32bit):false
                      Commandline:C:\Windows\system32\regsvr32.exe "C:\Windows\system32\MHtsbrv\IoiBQ.dll"
                      Imagebase:0x7ff76ca50000
                      File size:24064 bytes
                      MD5 hash:D78B75FC68247E8A63ACBA846182740E
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Yara matches:
                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000007.00000002.702581906.0000000000F51000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000007.00000002.702535100.0000000000F00000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security

                      Target ID:8
                      Start time:11:59:54
                      Start date:16/11/2022
                      Path:C:\Windows\System32\rundll32.exe
                      Wow64 process (32bit):false
                      Commandline:rundll32.exe C:\Users\user\Desktop\UC2DFXQIBiE2kQ.dll,ATjQPkInxPUGuUu
                      Imagebase:0x7ff7709b0000
                      File size:69632 bytes
                      MD5 hash:73C519F050C20580F8A62C849D49215A
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language

                      Target ID:11
                      Start time:12:00:56
                      Start date:16/11/2022
                      Path:C:\Windows\System32\regsvr32.exe
                      Wow64 process (32bit):false
                      Commandline:C:\Windows\system32\regsvr32.exe" "C:\Windows\system32\MHtsbrv\IoiBQ.dll
                      Imagebase:0x7ff76ca50000
                      File size:24064 bytes
                      MD5 hash:D78B75FC68247E8A63ACBA846182740E
                      Has elevated privileges:false
                      Has administrator privileges:false
                      Programmed in:C, C++ or other language
                      Yara matches:
                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000B.00000002.467051052.0000000002D41000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000B.00000002.467020854.0000000002D10000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security

                      Target ID:12
                      Start time:12:01:02
                      Start date:16/11/2022
                      Path:C:\Windows\System32\regsvr32.exe
                      Wow64 process (32bit):false
                      Commandline:C:\Windows\system32\regsvr32.exe "C:\Users\user\AppData\Local\VADoV\ahExZn.dll"
                      Imagebase:0x7ff76ca50000
                      File size:24064 bytes
                      MD5 hash:D78B75FC68247E8A63ACBA846182740E
                      Has elevated privileges:false
                      Has administrator privileges:false
                      Programmed in:C, C++ or other language

                      No disassembly