Windows Analysis Report
INNOVINC.one

Overview

General Information

Sample Name: INNOVINC.one
Analysis ID: 828504
MD5: 87e6d4c09602d4ad3fffa14f0859e4ab
SHA1: 8655b4753c3bc2c24c3c4ac43ce51401a9248fc7
SHA256: ab29f7e0adb4c813c74e69ab272ec00f0e9e1270e50fc3e38ce85c3c679dbc6f
Tags: one
Infos:

Detection

Emotet
Score: 100
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

Multi AV Scanner detection for submitted file
Yara detected Malicious OneNote
Yara detected Emotet
System process connects to network (likely due to code injection or exploit)
Sigma detected: Run temp file via regsvr32
Antivirus detection for URL or domain
Multi AV Scanner detection for dropped file
Snort IDS alert for network traffic
C2 URLs / IPs found in malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Document exploit detected (process start blacklist hit)
Queries the volume information (name, serial number etc) of a device
Yara signature match
Contains functionality to check if a debugger is running (IsDebuggerPresent)
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Creates files inside the system directory
PE file contains sections with non-standard names
Internet Provider seen in connection with other malware
Detected potential crypto function
Contains functionality to query CPU information (cpuid)
Stores files to the Windows start menu directory
JA3 SSL client fingerprint seen in connection with other malware
Contains functionality to call native functions
HTTP GET or POST without a user agent
Contains functionality which may be used to detect a debugger (GetProcessHeap)
IP address seen in connection with other malware
Drops PE files
Tries to load missing DLLs
Uses a known web browser user agent for HTTP communication
Drops PE files to the windows directory (C:\Windows)
Detected TCP or UDP traffic on non-standard ports
Connects to several IPs in different countries
Creates a start menu entry (Start Menu\Programs\Startup)
Registers a DLL
Found large amount of non-executed APIs
Creates a process in suspended mode (likely to inject code)
Found WSH timer for Javascript or VBS script (likely evasive script)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)

Classification

AV Detection

barindex
Source: INNOVINC.one ReversingLabs: Detection: 33%
Source: INNOVINC.one Virustotal: Detection: 40% Perma Link
Source: https://163.44.196.120:8080/hljclo/nvgjbvhfifkmnnu/fqmovqnozffbslm/luuduiszhryma/ Avira URL Cloud: Label: malware
Source: https://164.90.222.65/hljclo/nvgjbvhfifkmnnu/fqmovqnozffbslm/luuduiszhryma/ Avira URL Cloud: Label: malware
Source: https://66.228.32.31:7080/z Avira URL Cloud: Label: malware
Source: https://164.90.222.65/hljclo/nvgjbvhfifkmnnu/fqmovqnozffbslm/luuduiszhryma/ma/ Avira URL Cloud: Label: malware
Source: https://66.228.32.31:7080/h Avira URL Cloud: Label: malware
Source: https://91.121.146.47:8080/hljclo/nvgjbvhfifkmnnu/fqmovqnozffbslm/luuduiszhryma/Wk Avira URL Cloud: Label: malware
Source: https://104.168.155.143:8080/hljclo/nvgjbvhfifkmnnu/fqmovqnozffbslm/luuduiszhryma/o Avira URL Cloud: Label: malware
Source: https://163.44.196.120:8080/hljclo/nvgjbvhfifkmnnu/fqmovqnozffbslm/luuduiszhryma/q Avira URL Cloud: Label: malware
Source: https://164.90.222.65:443/hljclo/nvgjbvhfifkmnnu/fqmovqnozffbslm/luuduiszhryma/ Avira URL Cloud: Label: malware
Source: https://163.44.196.120:8080/ Avira URL Cloud: Label: malware
Source: https://91.121.146.47:8080/ Avira URL Cloud: Label: malware
Source: https://bbvoyage.com/useragreement/ElKHvb4QIQqSrh6Hqm/ Avira URL Cloud: Label: malware
Source: https://159.89.202.34/ Avira URL Cloud: Label: malware
Source: http://softwareulike.com/cWIYxWMPkK/ Avira URL Cloud: Label: malware
Source: https://182.162.143.56/8 Avira URL Cloud: Label: malware
Source: https://66.228.32.31:7080/ Avira URL Cloud: Label: malware
Source: https://www.gomespontes.com.br/logs/pd/vM Avira URL Cloud: Label: malware
Source: https://bbvoyage.com/useragreement/ElKHvb4QIQqSrh6Hqm/.dllmg Avira URL Cloud: Label: malware
Source: https://www.gomespontes.com.br/logs/pd/1 Avira URL Cloud: Label: malware
Source: https://66.228.32.31:7080/hljclo/nvgjbvhfifkmnnu/fqmovqnozffbslm/luuduiszhryma/ Avira URL Cloud: Label: malware
Source: https://bbvoyage.com/useragreement/ElKHvb4QIQqSrh6Hqm/.dll Avira URL Cloud: Label: malware
Source: https://167.172.199.165:8080/ Avira URL Cloud: Label: malware
Source: https://159.65.88.10:8080/hljclo/nvgjbvhfifkmnnu/fqmovqnozffbslm/luuduiszhryma/u Avira URL Cloud: Label: malware
Source: https://182.162.143.56/hljclo/nvgjbvhfifkmnnu/fqmovqnozffbslm/luuduiszhryma/ Avira URL Cloud: Label: malware
Source: http://ozmeydan.com/cekici/9/ Avira URL Cloud: Label: malware
Source: https://159.65.88.10:8080/ Avira URL Cloud: Label: malware
Source: https://portalevolucao.com/GerarBoleto/fLIOoFbFs1jHtX/wM Avira URL Cloud: Label: malware
Source: https://167.172.199.165:8080/hljclo/nvgjbvhfifkmnnu/fqmovqnozffbslm/luuduiszhryma/ Avira URL Cloud: Label: malware
Source: https://penshorn.org/admin/Ses8712iGR8du/tM Avira URL Cloud: Label: malware
Source: https://bbvoyage.com/useragreement/ElKHvb4QIQqSrh6Hqm/uM Avira URL Cloud: Label: malware
Source: https://159.65.88.10:8080/h Avira URL Cloud: Label: malware
Source: https://penshorn.org/admin/Ses8712iGR8du/ Avira URL Cloud: Label: malware
Source: https://www.gomespontes.com.br/logs/pd/ Avira URL Cloud: Label: malware
Source: https://159.89.202.34:443/hljclo/nvgjbvhfifkmnnu/fqmovqnozffbslm/luuduiszhryma/P Avira URL Cloud: Label: malware
Source: http://wrappixels.com/wp-admin/GdIA2oOQEiO5G/ Avira URL Cloud: Label: malware
Source: https://187.63.160.88:80/ Avira URL Cloud: Label: malware
Source: https://159.65.88.10:8080/hljclo/nvgjbvhfifkmnnu/fqmovqnozffbslm/luuduiszhryma/ Avira URL Cloud: Label: malware
Source: https://159.89.202.34/hljclo/nvgjbvhfifkmnnu/fqmovqnozffbslm/luuduiszhryma/ryma/ Avira URL Cloud: Label: malware
Source: http://softwareulike.com/cWIYxWMPkK/yM Avira URL Cloud: Label: malware
Source: https://159.89.202.34/X Avira URL Cloud: Label: malware
Source: https://portalevolucao.com/GerarBoleto/fLIOoFbFs1jHtX/ram Avira URL Cloud: Label: malware
Source: https://187.63.160.88:80/hljclo/nvgjbvhfifkmnnu/fqmovqnozffbslm/luuduiszhryma/ Avira URL Cloud: Label: malware
Source: https://104.168.155.143:8080/hljclo/nvgjbvhfifkmnnu/fqmovqnozffbslm/luuduiszhryma/3 Avira URL Cloud: Label: malware
Source: http://ozmeydan.com/cekici/9/xM Avira URL Cloud: Label: malware
Source: https://187.63.160.88:80/hljclo/nvgjbvhfifkmnnu/fqmovqnozffbslm/luuduiszhryma/.com& Avira URL Cloud: Label: malware
Source: https://159.89.202.34// Avira URL Cloud: Label: malware
Source: https://portalevolucao.com/GerarBoleto/fLIOoFbFs1jHtX/ Avira URL Cloud: Label: malware
Source: http://wrappixels.com/wp-admin/GdIA2oOQEiO5G/zM Avira URL Cloud: Label: malware
Source: https://159.89.202.34/hljclo/nvgjbvhfifkmnnu/fqmovqnozffbslm/luuduiszhryma/ Avira URL Cloud: Label: malware
Source: https://167.172.199.165:8080/hljclo/nvgjbvhfifkmnnu/fqmovqnozffbslm/luuduiszhryma/3 Avira URL Cloud: Label: malware
Source: C:\Users\user\AppData\Local\Temp\rad862DE.tmp.dll ReversingLabs: Detection: 58%
Source: C:\Windows\System32\OkzilcUDkTuKjw\FGdLGyDLKydH.dll (copy) ReversingLabs: Detection: 58%
Source: 0000000D.00000002.576728801.0000000000B88000.00000004.00000020.00020000.00000000.sdmp Malware Configuration Extractor: Emotet {"C2 list": ["91.121.146.47:8080", "66.228.32.31:7080", "182.162.143.56:443", "187.63.160.88:80", "167.172.199.165:8080", "164.90.222.65:443", "104.168.155.143:8080", "163.44.196.120:8080", "160.16.142.56:8080", "159.89.202.34:443", "159.65.88.10:8080", "186.194.240.217:443", "149.56.131.28:8080", "72.15.201.15:8080", "1.234.2.232:8080", "82.223.21.224:8080", "206.189.28.199:8080", "169.57.156.166:8080", "107.170.39.149:8080", "103.43.75.120:443", "91.207.28.33:8080", "213.239.212.5:443", "45.235.8.30:8080", "119.59.103.152:8080", "164.68.99.3:8080", "95.217.221.146:8080", "153.126.146.25:7080", "197.242.150.244:8080", "202.129.205.3:8080", "103.132.242.26:8080", "139.59.126.41:443", "110.232.117.186:8080", "183.111.227.137:8080", "5.135.159.50:443", "201.94.166.162:443", "103.75.201.2:443", "79.137.35.198:8080", "172.105.226.75:8080", "94.23.45.86:4143", "115.68.227.76:8080", "153.92.5.27:8080", "167.172.253.162:8080", "188.44.20.25:443", "147.139.166.154:8080", "129.232.188.93:443", "173.212.193.249:8080", "185.4.135.165:8080", "45.176.232.124:443"], "Public Key": ["RUNTMSAAAABAX3S2xNjcDD0fBno33Ln5t71eii+mofIPoXkNFOX1MeiwCh48iz97kB0mJjGGZXwardnDXKxI8GCHGNl0PFj5OmSQfQApAIA=", "RUNLMSAAAADzozW1Di4r9DVWzQpMKT588RDdy7BPILP6AiDOTLYMHkSWvrQO5slbmr1OvZ2Pz+AQWzRMggQmAtO6rPH7nyx22mRwfQAJAJI="]}
Source: unknown HTTPS traffic detected: 203.26.41.131:443 -> 192.168.2.3:49701 version: TLS 1.2
Source: unknown HTTPS traffic detected: 182.162.143.56:443 -> 192.168.2.3:49709 version: TLS 1.2
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_0000000180008D28 FindFirstFileExW, 12_2_0000000180008D28

Software Vulnerabilities

barindex
Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE Process created: C:\Windows\SysWOW64\wscript.exe

Networking

barindex
Source: C:\Windows\System32\regsvr32.exe Network Connect: 159.65.88.10 8080 Jump to behavior
Source: C:\Windows\System32\regsvr32.exe Network Connect: 164.90.222.65 443 Jump to behavior
Source: C:\Windows\SysWOW64\wscript.exe Network Connect: 203.26.41.131 443 Jump to behavior
Source: C:\Windows\SysWOW64\wscript.exe Domain query: penshorn.org
Source: C:\Windows\System32\regsvr32.exe Network Connect: 66.228.32.31 7080 Jump to behavior
Source: C:\Windows\System32\regsvr32.exe Network Connect: 187.63.160.88 80 Jump to behavior
Source: C:\Windows\System32\regsvr32.exe Network Connect: 104.168.155.143 8080 Jump to behavior
Source: C:\Windows\System32\regsvr32.exe Network Connect: 159.89.202.34 443 Jump to behavior
Source: C:\Windows\System32\regsvr32.exe Network Connect: 91.121.146.47 8080 Jump to behavior
Source: C:\Windows\System32\regsvr32.exe Network Connect: 160.16.142.56 8080 Jump to behavior
Source: C:\Windows\System32\regsvr32.exe Network Connect: 182.162.143.56 443 Jump to behavior
Source: C:\Windows\System32\regsvr32.exe Network Connect: 167.172.199.165 8080 Jump to behavior
Source: C:\Windows\System32\regsvr32.exe Network Connect: 163.44.196.120 8080 Jump to behavior
Source: Traffic Snort IDS: 2404312 ET CNC Feodo Tracker Reported CnC Server TCP group 7 192.168.2.3:49709 -> 182.162.143.56:443
Source: Traffic Snort IDS: 2404344 ET CNC Feodo Tracker Reported CnC Server TCP group 23 192.168.2.3:49706 -> 91.121.146.47:8080
Source: Traffic Snort IDS: 2404330 ET CNC Feodo Tracker Reported CnC Server TCP group 16 192.168.2.3:49708 -> 66.228.32.31:7080
Source: Traffic Snort IDS: 2404308 ET CNC Feodo Tracker Reported CnC Server TCP group 5 192.168.2.3:49711 -> 167.172.199.165:8080
Source: Traffic Snort IDS: 2404302 ET CNC Feodo Tracker Reported CnC Server TCP group 2 192.168.2.3:49716 -> 104.168.155.143:8080
Source: Malware configuration extractor IPs: 91.121.146.47:8080
Source: Malware configuration extractor IPs: 66.228.32.31:7080
Source: Malware configuration extractor IPs: 182.162.143.56:443
Source: Malware configuration extractor IPs: 187.63.160.88:80
Source: Malware configuration extractor IPs: 167.172.199.165:8080
Source: Malware configuration extractor IPs: 164.90.222.65:443
Source: Malware configuration extractor IPs: 104.168.155.143:8080
Source: Malware configuration extractor IPs: 163.44.196.120:8080
Source: Malware configuration extractor IPs: 160.16.142.56:8080
Source: Malware configuration extractor IPs: 159.89.202.34:443
Source: Malware configuration extractor IPs: 159.65.88.10:8080
Source: Malware configuration extractor IPs: 186.194.240.217:443
Source: Malware configuration extractor IPs: 149.56.131.28:8080
Source: Malware configuration extractor IPs: 72.15.201.15:8080
Source: Malware configuration extractor IPs: 1.234.2.232:8080
Source: Malware configuration extractor IPs: 82.223.21.224:8080
Source: Malware configuration extractor IPs: 206.189.28.199:8080
Source: Malware configuration extractor IPs: 169.57.156.166:8080
Source: Malware configuration extractor IPs: 107.170.39.149:8080
Source: Malware configuration extractor IPs: 103.43.75.120:443
Source: Malware configuration extractor IPs: 91.207.28.33:8080
Source: Malware configuration extractor IPs: 213.239.212.5:443
Source: Malware configuration extractor IPs: 45.235.8.30:8080
Source: Malware configuration extractor IPs: 119.59.103.152:8080
Source: Malware configuration extractor IPs: 164.68.99.3:8080
Source: Malware configuration extractor IPs: 95.217.221.146:8080
Source: Malware configuration extractor IPs: 153.126.146.25:7080
Source: Malware configuration extractor IPs: 197.242.150.244:8080
Source: Malware configuration extractor IPs: 202.129.205.3:8080
Source: Malware configuration extractor IPs: 103.132.242.26:8080
Source: Malware configuration extractor IPs: 139.59.126.41:443
Source: Malware configuration extractor IPs: 110.232.117.186:8080
Source: Malware configuration extractor IPs: 183.111.227.137:8080
Source: Malware configuration extractor IPs: 5.135.159.50:443
Source: Malware configuration extractor IPs: 201.94.166.162:443
Source: Malware configuration extractor IPs: 103.75.201.2:443
Source: Malware configuration extractor IPs: 79.137.35.198:8080
Source: Malware configuration extractor IPs: 172.105.226.75:8080
Source: Malware configuration extractor IPs: 94.23.45.86:4143
Source: Malware configuration extractor IPs: 115.68.227.76:8080
Source: Malware configuration extractor IPs: 153.92.5.27:8080
Source: Malware configuration extractor IPs: 167.172.253.162:8080
Source: Malware configuration extractor IPs: 188.44.20.25:443
Source: Malware configuration extractor IPs: 147.139.166.154:8080
Source: Malware configuration extractor IPs: 129.232.188.93:443
Source: Malware configuration extractor IPs: 173.212.193.249:8080
Source: Malware configuration extractor IPs: 185.4.135.165:8080
Source: Malware configuration extractor IPs: 45.176.232.124:443
Source: Joe Sandbox View ASN Name: RACKCORP-APRackCorpAU RACKCORP-APRackCorpAU
Source: Joe Sandbox View JA3 fingerprint: ce5f3254611a8c095a3d821d44539877
Source: global traffic HTTP traffic detected: POST /hljclo/nvgjbvhfifkmnnu/fqmovqnozffbslm/luuduiszhryma/ HTTP/1.1Connection: Keep-AliveContent-Length: 0Host: 182.162.143.56
Source: Joe Sandbox View IP Address: 110.232.117.186 110.232.117.186
Source: global traffic HTTP traffic detected: GET /admin/Ses8712iGR8du/ HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: penshorn.org
Source: global traffic TCP traffic: 192.168.2.3:49706 -> 91.121.146.47:8080
Source: global traffic TCP traffic: 192.168.2.3:49708 -> 66.228.32.31:7080
Source: global traffic TCP traffic: 192.168.2.3:49711 -> 167.172.199.165:8080
Source: global traffic TCP traffic: 192.168.2.3:49716 -> 104.168.155.143:8080
Source: global traffic TCP traffic: 192.168.2.3:49717 -> 163.44.196.120:8080
Source: global traffic TCP traffic: 192.168.2.3:49718 -> 160.16.142.56:8080
Source: global traffic TCP traffic: 192.168.2.3:49723 -> 159.65.88.10:8080
Source: unknown Network traffic detected: IP country count 17
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49722
Source: unknown Network traffic detected: HTTP traffic on port 49709 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49721
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49720
Source: unknown Network traffic detected: HTTP traffic on port 49712 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49721 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49719 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49720 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49722 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49701 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49709
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49719
Source: unknown Network traffic detected: HTTP traffic on port 49713 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49714 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49715 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49715
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49714
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49713
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49701
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49712
Source: unknown TCP traffic detected without corresponding DNS query: 91.121.146.47
Source: unknown TCP traffic detected without corresponding DNS query: 91.121.146.47
Source: unknown TCP traffic detected without corresponding DNS query: 91.121.146.47
Source: unknown TCP traffic detected without corresponding DNS query: 91.121.146.47
Source: unknown TCP traffic detected without corresponding DNS query: 91.121.146.47
Source: unknown TCP traffic detected without corresponding DNS query: 91.121.146.47
Source: unknown TCP traffic detected without corresponding DNS query: 91.121.146.47
Source: unknown TCP traffic detected without corresponding DNS query: 91.121.146.47
Source: unknown TCP traffic detected without corresponding DNS query: 91.121.146.47
Source: unknown TCP traffic detected without corresponding DNS query: 91.121.146.47
Source: unknown TCP traffic detected without corresponding DNS query: 91.121.146.47
Source: unknown TCP traffic detected without corresponding DNS query: 91.121.146.47
Source: unknown TCP traffic detected without corresponding DNS query: 66.228.32.31
Source: unknown TCP traffic detected without corresponding DNS query: 66.228.32.31
Source: unknown TCP traffic detected without corresponding DNS query: 66.228.32.31
Source: unknown TCP traffic detected without corresponding DNS query: 66.228.32.31
Source: unknown TCP traffic detected without corresponding DNS query: 66.228.32.31
Source: unknown TCP traffic detected without corresponding DNS query: 66.228.32.31
Source: unknown TCP traffic detected without corresponding DNS query: 66.228.32.31
Source: unknown TCP traffic detected without corresponding DNS query: 66.228.32.31
Source: unknown TCP traffic detected without corresponding DNS query: 66.228.32.31
Source: unknown TCP traffic detected without corresponding DNS query: 66.228.32.31
Source: unknown TCP traffic detected without corresponding DNS query: 182.162.143.56
Source: unknown TCP traffic detected without corresponding DNS query: 182.162.143.56
Source: unknown TCP traffic detected without corresponding DNS query: 182.162.143.56
Source: unknown TCP traffic detected without corresponding DNS query: 182.162.143.56
Source: unknown TCP traffic detected without corresponding DNS query: 182.162.143.56
Source: unknown TCP traffic detected without corresponding DNS query: 182.162.143.56
Source: unknown TCP traffic detected without corresponding DNS query: 182.162.143.56
Source: unknown TCP traffic detected without corresponding DNS query: 182.162.143.56
Source: unknown TCP traffic detected without corresponding DNS query: 182.162.143.56
Source: unknown TCP traffic detected without corresponding DNS query: 187.63.160.88
Source: unknown TCP traffic detected without corresponding DNS query: 187.63.160.88
Source: unknown TCP traffic detected without corresponding DNS query: 187.63.160.88
Source: unknown TCP traffic detected without corresponding DNS query: 187.63.160.88
Source: unknown TCP traffic detected without corresponding DNS query: 187.63.160.88
Source: unknown TCP traffic detected without corresponding DNS query: 187.63.160.88
Source: unknown TCP traffic detected without corresponding DNS query: 187.63.160.88
Source: unknown TCP traffic detected without corresponding DNS query: 187.63.160.88
Source: unknown TCP traffic detected without corresponding DNS query: 187.63.160.88
Source: unknown TCP traffic detected without corresponding DNS query: 187.63.160.88
Source: unknown TCP traffic detected without corresponding DNS query: 167.172.199.165
Source: unknown TCP traffic detected without corresponding DNS query: 167.172.199.165
Source: unknown TCP traffic detected without corresponding DNS query: 167.172.199.165
Source: unknown TCP traffic detected without corresponding DNS query: 164.90.222.65
Source: unknown TCP traffic detected without corresponding DNS query: 164.90.222.65
Source: unknown TCP traffic detected without corresponding DNS query: 164.90.222.65
Source: unknown TCP traffic detected without corresponding DNS query: 164.90.222.65
Source: unknown TCP traffic detected without corresponding DNS query: 164.90.222.65
Source: unknown TCP traffic detected without corresponding DNS query: 164.90.222.65
Source: wscript.exe, 0000000A.00000003.334568472.0000000005E2D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.352899714.0000000005E2D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000002.356606948.0000000005E2D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.351628835.0000000005E2D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.354576518.0000000005E2D000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000D.00000003.413006720.0000000000C79000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000D.00000003.476681841.0000000000C25000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000D.00000003.477133614.0000000000C25000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000D.00000003.415130605.0000000000C17000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000D.00000002.577044857.0000000000C17000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://crl.globalsign.net/root-r2.crl0
Source: regsvr32.exe, 0000000D.00000003.411622877.0000000000C75000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://ctldl.windowsupdate.com/do-I
Source: regsvr32.exe, 0000000D.00000003.476681841.0000000000C25000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000D.00000003.477133614.0000000000C25000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000D.00000003.415130605.0000000000C17000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000D.00000002.577044857.0000000000C17000.00000004.00000020.00020000.00000000.sdmp, 77EC63BDA74BD0D0E0426DC8F80085060.13.dr String found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
Source: regsvr32.exe, 0000000D.00000003.412584039.0000000002C88000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000D.00000003.411622877.0000000000C75000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000D.00000003.412386904.0000000002C41000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000D.00000003.412706035.0000000002CAE000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab?823f8f3890b32
Source: regsvr32.exe, 0000000D.00000003.477107170.0000000000BE6000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000D.00000003.476681841.0000000000BDC000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000D.00000002.577044857.0000000000BDC000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000D.00000003.415029958.0000000000BDC000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000D.00000003.414520712.0000000000BDC000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000D.00000003.477067849.0000000000BDC000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/eni
Source: wscript.exe, wscript.exe, 0000000A.00000003.349149787.0000000005BD1000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.338317578.000000000591A000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.339594149.0000000005A3E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.343579718.0000000005B59000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.343908189.0000000005B98000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.350699760.0000000005D0D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.351628835.0000000005DC9000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.344602778.0000000005B70000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.351436887.0000000005DAC000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.349636349.0000000005C1E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.337521397.0000000005906000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.354466039.0000000005D45000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.349707190.0000000005C99000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.338877846.0000000005983000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.336637688.00000000034F2000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.336698256.00000000058A0000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.344413378.0000000005BD9000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.339080962.00000000059F0000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.343777034.0000000005B7E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.335513504.000000000348A000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://ozmeydan.com/cekici/9/
Source: wscript.exe, 0000000A.00000003.351539021.0000000005567000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://ozmeydan.com/cekici/9/xM
Source: wscript.exe, 0000000A.00000003.342759926.00000000058FF000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000002.355583344.0000000005900000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://softwareulike.com/cW
Source: wscript.exe, wscript.exe, 0000000A.00000003.349149787.0000000005BD1000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.338317578.000000000591A000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.339594149.0000000005A3E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.343579718.0000000005B59000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.351137790.0000000005D47000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.343908189.0000000005B98000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.350699760.0000000005D0D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.351628835.0000000005DC9000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.344602778.0000000005B70000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.351436887.0000000005DAC000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.349636349.0000000005C1E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.337521397.0000000005906000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.349707190.0000000005C99000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.338877846.0000000005983000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.336637688.00000000034F2000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.336698256.00000000058A0000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.344413378.0000000005BD9000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.339080962.00000000059F0000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.343777034.0000000005B7E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.335513504.000000000348A000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://softwareulike.com/cWIYxWMPkK/
Source: wscript.exe, 0000000A.00000003.351539021.0000000005567000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://softwareulike.com/cWIYxWMPkK/yM
Source: wscript.exe, 0000000A.00000002.356232822.0000000005D33000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.351429202.0000000005D33000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.350714830.0000000005D32000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://softwareulike.com/cWIYxWX6
Source: wscript.exe, 0000000A.00000003.351436887.0000000005DAC000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.351359012.0000000005DA1000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.352842359.0000000005DBC000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000002.356455766.0000000005DBC000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://wrappixels.com/wp-
Source: wscript.exe, 0000000A.00000003.351436887.0000000005DAC000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.349636349.0000000005C1E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.337521397.0000000005906000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.349707190.0000000005C99000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.338877846.0000000005983000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.336637688.00000000034F2000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.336698256.00000000058A0000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.344413378.0000000005BD9000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.339080962.00000000059F0000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.343777034.0000000005B7E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.343872373.0000000005B85000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.344273271.0000000005B2B000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.334568472.0000000005DD1000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.335042827.0000000003474000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.339525923.00000000059B6000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.335328748.00000000034D2000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000002.356494821.0000000005DEF000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.348685714.0000000005BA5000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000002.356232822.0000000005D33000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.338317578.0000000005901000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.343210541.0000000005A8A000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://wrappixels.com/wp-admin/GdIA2oOQEiO5G/
Source: wscript.exe, 0000000A.00000003.351539021.0000000005567000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://wrappixels.com/wp-admin/GdIA2oOQEiO5G/zM
Source: regsvr32.exe, 0000000D.00000002.578533764.0000000002D33000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://104.168.155.143:8080/
Source: regsvr32.exe, 0000000D.00000002.577044857.0000000000C7A000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://104.168.155.143:8080/hljclo/nvgjbvhfifkmnnu/fqmovqnozffbslm/luuduiszhryma/3
Source: regsvr32.exe, 0000000D.00000002.577044857.0000000000C7A000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://104.168.155.143:8080/hljclo/nvgjbvhfifkmnnu/fqmovqnozffbslm/luuduiszhryma/o
Source: regsvr32.exe, 0000000D.00000002.577044857.0000000000BDC000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://109.65.88.10:8080/
Source: regsvr32.exe, 0000000D.00000002.577044857.0000000000C17000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://159.65.88.10:8080/
Source: regsvr32.exe, 0000000D.00000002.577044857.0000000000C17000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://159.65.88.10:8080/h
Source: regsvr32.exe, 0000000D.00000002.577044857.0000000000C7A000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000D.00000002.577044857.0000000000BDC000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000D.00000002.578490449.0000000002CC5000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000D.00000002.577044857.0000000000C17000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://159.65.88.10:8080/hljclo/nvgjbvhfifkmnnu/fqmovqnozffbslm/luuduiszhryma/
Source: regsvr32.exe, 0000000D.00000002.577044857.0000000000C7A000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://159.65.88.10:8080/hljclo/nvgjbvhfifkmnnu/fqmovqnozffbslm/luuduiszhryma/u
Source: regsvr32.exe, 0000000D.00000002.577044857.0000000000C17000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://159.89.202.34/
Source: regsvr32.exe, 0000000D.00000002.577044857.0000000000C17000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://159.89.202.34//
Source: regsvr32.exe, 0000000D.00000002.577044857.0000000000C17000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://159.89.202.34/X
Source: regsvr32.exe, 0000000D.00000002.577044857.0000000000C17000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000D.00000002.578490449.0000000002CAE000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://159.89.202.34/hljclo/nvgjbvhfifkmnnu/fqmovqnozffbslm/luuduiszhryma/
Source: regsvr32.exe, 0000000D.00000002.577044857.0000000000C17000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://159.89.202.34/hljclo/nvgjbvhfifkmnnu/fqmovqnozffbslm/luuduiszhryma/ryma/
Source: regsvr32.exe, 0000000D.00000002.578490449.0000000002CC5000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://159.89.202.34:443/hljclo/nvgjbvhfifkmnnu/fqmovqnozffbslm/luuduiszhryma/P
Source: regsvr32.exe, 0000000D.00000002.577044857.0000000000BDC000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000D.00000002.577044857.0000000000C17000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://160.16.142.56:8080/
Source: regsvr32.exe, 0000000D.00000002.577044857.0000000000C17000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://160.16.142.56:8080/$
Source: regsvr32.exe, 0000000D.00000002.577044857.0000000000C7A000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000D.00000002.578490449.0000000002CC5000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://160.16.142.56:8080/hljclo/nvgjbvhfifkmnnu/fqmovqnozffbslm/luuduiszhryma/
Source: regsvr32.exe, 0000000D.00000002.578533764.0000000002D33000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://163.44.196.120:8080/
Source: regsvr32.exe, 0000000D.00000002.577044857.0000000000C7A000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://163.44.196.120:8080/hljclo/nvgjbvhfifkmnnu/fqmovqnozffbslm/luuduiszhryma/
Source: regsvr32.exe, 0000000D.00000002.578490449.0000000002CC5000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://163.44.196.120:8080/hljclo/nvgjbvhfifkmnnu/fqmovqnozffbslm/luuduiszhryma/q
Source: regsvr32.exe, 0000000D.00000003.477107170.0000000000BE6000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000D.00000003.476681841.0000000000C25000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000D.00000003.477133614.0000000000C25000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000D.00000003.476681841.0000000000BDC000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000D.00000003.477067849.0000000000BDC000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://164.90.222.65/
Source: regsvr32.exe, 0000000D.00000003.477133614.0000000000C25000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://164.90.222.65/hljclo/nvgjbvhfifkmnnu/fqmovqnozffbslm/luuduiszhryma/
Source: regsvr32.exe, 0000000D.00000003.476681841.0000000000C25000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000D.00000003.477133614.0000000000C25000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://164.90.222.65/hljclo/nvgjbvhfifkmnnu/fqmovqnozffbslm/luuduiszhryma/ma/
Source: regsvr32.exe, 0000000D.00000002.578490449.0000000002CC5000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://164.90.222.65:443/hljclo/nvgjbvhfifkmnnu/fqmovqnozffbslm/luuduiszhryma/
Source: regsvr32.exe, 0000000D.00000002.578533764.0000000002D33000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://167.172.199.165:8080/
Source: regsvr32.exe, 0000000D.00000003.477067849.0000000000BDC000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://167.172.199.165:8080/hljclo/nvgjbvhfifkmnnu/fqmovqnozffbslm/luuduiszhryma/
Source: regsvr32.exe, 0000000D.00000003.476942364.0000000000C7A000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://167.172.199.165:8080/hljclo/nvgjbvhfifkmnnu/fqmovqnozffbslm/luuduiszhryma/3
Source: regsvr32.exe, 0000000D.00000003.476681841.0000000000C25000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000D.00000003.477133614.0000000000C25000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://182.162.143.56/
Source: regsvr32.exe, 0000000D.00000003.476681841.0000000000C25000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000D.00000003.477133614.0000000000C25000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://182.162.143.56/8
Source: regsvr32.exe, 0000000D.00000003.476681841.0000000000C25000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000D.00000003.477133614.0000000000C25000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://187.63.160.88:80/
Source: regsvr32.exe, 0000000D.00000002.576728801.0000000000B88000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://187.63.160.88:80/hljclo/nvgjbvhfifkmnnu/fqmovqnozffbslm/luuduiszhryma/
Source: regsvr32.exe, 0000000D.00000003.476942364.0000000000C7A000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000D.00000002.577044857.0000000000C7A000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://187.63.160.88:80/hljclo/nvgjbvhfifkmnnu/fqmovqnozffbslm/luuduiszhryma/.com&
Source: regsvr32.exe, 0000000D.00000003.476681841.0000000000C25000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000D.00000003.477133614.0000000000C25000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://66.228.32.31:7080/
Source: regsvr32.exe, 0000000D.00000003.476681841.0000000000C25000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000D.00000003.477133614.0000000000C25000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://66.228.32.31:7080/h
Source: regsvr32.exe, 0000000D.00000003.476942364.0000000000C7A000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000D.00000002.577044857.0000000000C7A000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://66.228.32.31:7080/hljclo/nvgjbvhfifkmnnu/fqmovqnozffbslm/luuduiszhryma/
Source: regsvr32.exe, 0000000D.00000003.476681841.0000000000C25000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000D.00000003.477133614.0000000000C25000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000D.00000002.577044857.0000000000C17000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://66.228.32.31:7080/z
Source: regsvr32.exe, 0000000D.00000002.576728801.0000000000B88000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://91.121.146.47:8080/
Source: regsvr32.exe, 0000000D.00000003.414863014.0000000000C01000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://91.121.146.47:8080/hljclo/nvgjbvhfifkmnnu/fqmovqnozffbslm/luuduiszhryma/Wk
Source: wscript.exe, wscript.exe, 0000000A.00000003.349149787.0000000005BD1000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.338317578.000000000591A000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.339594149.0000000005A3E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.343579718.0000000005B59000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.343908189.0000000005B98000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.350699760.0000000005D0D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.351628835.0000000005DC9000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.344602778.0000000005B70000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.351436887.0000000005DAC000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.349636349.0000000005C1E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.337521397.0000000005906000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.335513504.0000000003470000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.354466039.0000000005D45000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.349707190.0000000005C99000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.338877846.0000000005983000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.336637688.00000000034F2000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.336698256.00000000058A0000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.344413378.0000000005BD9000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.339080962.00000000059F0000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.343777034.0000000005B7E000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://bbvoyage.com/useragreement/ElKHvb4QIQqSrh6Hqm/
Source: wscript.exe, 0000000A.00000003.351149534.0000000005D14000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://bbvoyage.com/useragreement/ElKHvb4QIQqSrh6Hqm/.dll
Source: wscript.exe, 0000000A.00000003.350699760.0000000005D0D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.350260982.0000000005CE8000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.350598253.0000000005CF1000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.349734604.0000000005CE8000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://bbvoyage.com/useragreement/ElKHvb4QIQqSrh6Hqm/.dllmg
Source: wscript.exe, 0000000A.00000003.351539021.0000000005567000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://bbvoyage.com/useragreement/ElKHvb4QIQqSrh6Hqm/uM
Source: wscript.exe, 0000000A.00000003.334568472.0000000005E2D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.334568472.0000000005E00000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.351628835.0000000005E00000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.352899714.0000000005E2D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000002.356606948.0000000005E2D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000002.356494821.0000000005E00000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.351628835.0000000005E2D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.354576518.0000000005E2D000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://penshorn.org/
Source: wscript.exe, 0000000A.00000003.338607407.0000000005962000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.337976965.00000000058EE000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.343506146.0000000005A9E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.339525923.00000000059DB000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.338824444.00000000059AB000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.337976965.00000000058DE000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.351005610.0000000005D17000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.342759926.00000000058FF000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.343618922.0000000005B23000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.337976965.00000000058FF000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.343410553.0000000005B1E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.335188810.00000000034BF000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.334897076.000000000345E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.344273271.0000000005B17000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.351149534.0000000005D14000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000002.355656591.0000000005B8D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000002.355664779.0000000005B90000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.348527228.0000000005B70000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.343506146.0000000005AC5000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.350260982.0000000005CE8000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000002.355246506.00000000034FA000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://penshorn.org/admin/Ses8712iGR8du/
Source: wscript.exe, 0000000A.00000003.351539021.0000000005567000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://penshorn.org/admin/Ses8712iGR8du/tM
Source: wscript.exe, 0000000A.00000002.356232822.0000000005D33000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.351429202.0000000005D33000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.350714830.0000000005D32000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://portalevolucao.com/GerarBoleto/fLIOoFbFs1j
Source: wscript.exe, wscript.exe, 0000000A.00000003.349149787.0000000005BD1000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.338317578.000000000591A000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.339594149.0000000005A3E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.343579718.0000000005B59000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.343908189.0000000005B98000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.350699760.0000000005D0D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.351628835.0000000005DC9000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.344602778.0000000005B70000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.351436887.0000000005DAC000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.349636349.0000000005C1E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.337521397.0000000005906000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.335513504.0000000003470000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.354466039.0000000005D45000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.349707190.0000000005C99000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.338877846.0000000005983000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.336637688.00000000034F2000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.336698256.00000000058A0000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.344413378.0000000005BD9000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.339080962.00000000059F0000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.343777034.0000000005B7E000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://portalevolucao.com/GerarBoleto/fLIOoFbFs1jHtX/
Source: wscript.exe, 0000000A.00000003.351436887.0000000005DAC000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.351359012.0000000005DA1000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.352114448.0000000005DBF000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.351487137.0000000005DBE000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://portalevolucao.com/GerarBoleto/fLIOoFbFs1jHtX/ram
Source: wscript.exe, 0000000A.00000003.351539021.0000000005567000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://portalevolucao.com/GerarBoleto/fLIOoFbFs1jHtX/wM
Source: wscript.exe, 0000000A.00000003.351436887.0000000005DAC000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.351359012.0000000005DA1000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.352842359.0000000005DBC000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000002.356455766.0000000005DBC000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://www.gomespontes.com.br/
Source: wscript.exe, wscript.exe, 0000000A.00000003.349149787.0000000005BD1000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.338317578.000000000591A000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.339594149.0000000005A3E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.343579718.0000000005B59000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.343908189.0000000005B98000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.350699760.0000000005D0D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.351628835.0000000005DC9000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.344602778.0000000005B70000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.351436887.0000000005DAC000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.349636349.0000000005C1E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.337521397.0000000005906000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.335513504.0000000003470000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.354466039.0000000005D45000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.349707190.0000000005C99000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.338877846.0000000005983000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.336637688.00000000034F2000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.336698256.00000000058A0000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.344413378.0000000005BD9000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.339080962.00000000059F0000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.343777034.0000000005B7E000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://www.gomespontes.com.br/logs/pd/
Source: wscript.exe, 0000000A.00000003.351416616.0000000005D8E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.351261263.0000000005D7F000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.351082656.0000000005D51000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.351316396.0000000005D86000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.351039727.0000000005D3E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.350714830.0000000005D32000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.350901308.0000000005D34000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://www.gomespontes.com.br/logs/pd/1
Source: wscript.exe, 0000000A.00000003.351539021.0000000005567000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://www.gomespontes.com.br/logs/pd/vM
Source: unknown HTTP traffic detected: POST /hljclo/nvgjbvhfifkmnnu/fqmovqnozffbslm/luuduiszhryma/ HTTP/1.1Connection: Keep-AliveContent-Length: 0Host: 182.162.143.56
Source: unknown DNS traffic detected: queries for: penshorn.org
Source: global traffic HTTP traffic detected: GET /admin/Ses8712iGR8du/ HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: penshorn.org
Source: unknown HTTPS traffic detected: 203.26.41.131:443 -> 192.168.2.3:49701 version: TLS 1.2
Source: unknown HTTPS traffic detected: 182.162.143.56:443 -> 192.168.2.3:49709 version: TLS 1.2

E-Banking Fraud

barindex
Source: Yara match File source: 0000000D.00000002.576728801.0000000000B88000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 13.2.regsvr32.exe.b50000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 12.2.regsvr32.exe.2410000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 13.2.regsvr32.exe.b50000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 12.2.regsvr32.exe.2410000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 0000000D.00000002.576351502.0000000000B50000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000D.00000002.578265574.0000000000C81000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000C.00000002.329916167.0000000002441000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000C.00000002.329850872.0000000002410000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
Source: 0000000A.00000003.351436887.0000000005DAC000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY Matched rule: WEBSHELL_asp_generic date = 2021-03-07, author = Arnim Rupp, description = Generic ASP webshell which uses any eval/exec function indirectly on user input or writes a file, score = a8c63c418609c1c291b3e731ca85ded4b3e0fba83f3489c21a3199173b176a75, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, modified = 2023-01-06
Source: 0000000A.00000003.351487137.0000000005DBE000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY Matched rule: WEBSHELL_asp_generic date = 2021-03-07, author = Arnim Rupp, description = Generic ASP webshell which uses any eval/exec function indirectly on user input or writes a file, score = a8c63c418609c1c291b3e731ca85ded4b3e0fba83f3489c21a3199173b176a75, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, modified = 2023-01-06
Source: C:\Windows\System32\regsvr32.exe File created: C:\Windows\system32\OkzilcUDkTuKjw\ Jump to behavior
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_0000000180006818 12_2_0000000180006818
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_000000018000B878 12_2_000000018000B878
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_0000000180007110 12_2_0000000180007110
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_0000000180008D28 12_2_0000000180008D28
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_0000000180014555 12_2_0000000180014555
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_00A70000 12_2_00A70000
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_0244263C 12_2_0244263C
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_02448BC8 12_2_02448BC8
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_02458FC8 12_2_02458FC8
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_0245A000 12_2_0245A000
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_0244CC14 12_2_0244CC14
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_0245709C 12_2_0245709C
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_02447D6C 12_2_02447D6C
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_0245A244 12_2_0245A244
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_0244F65C 12_2_0244F65C
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_0244B258 12_2_0244B258
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_0244A660 12_2_0244A660
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_02443274 12_2_02443274
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_02450A70 12_2_02450A70
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_02455A00 12_2_02455A00
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_02468A00 12_2_02468A00
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_02443E0C 12_2_02443E0C
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_0245020C 12_2_0245020C
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_02458E08 12_2_02458E08
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_02444214 12_2_02444214
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_0244461C 12_2_0244461C
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_0244BA2C 12_2_0244BA2C
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_02458A2C 12_2_02458A2C
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_02450E2C 12_2_02450E2C
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_0245662C 12_2_0245662C
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_0245EAC0 12_2_0245EAC0
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_0244D6CC 12_2_0244D6CC
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_024596D4 12_2_024596D4
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_024492F0 12_2_024492F0
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_02448A8C 12_2_02448A8C
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_02464E8C 12_2_02464E8C
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_0244BE90 12_2_0244BE90
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_02454A90 12_2_02454A90
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_02443ABC 12_2_02443ABC
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_0245A6BC 12_2_0245A6BC
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_0244AAB8 12_2_0244AAB8
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_02444EB8 12_2_02444EB8
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_0245E750 12_2_0245E750
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_0244975C 12_2_0244975C
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_02444758 12_2_02444758
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_0245D770 12_2_0245D770
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_0245CF70 12_2_0245CF70
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_0244F77C 12_2_0244F77C
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_02448378 12_2_02448378
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_0244EF14 12_2_0244EF14
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_02453B14 12_2_02453B14
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_0245E310 12_2_0245E310
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_02454F18 12_2_02454F18
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_0244D33C 12_2_0244D33C
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_024597CC 12_2_024597CC
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_02442FD4 12_2_02442FD4
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_024433D4 12_2_024433D4
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_02453FD0 12_2_02453FD0
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_024627EC 12_2_024627EC
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_0244A7F0 12_2_0244A7F0
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_02455384 12_2_02455384
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_02441B94 12_2_02441B94
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_0244DBA0 12_2_0244DBA0
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_02448FB0 12_2_02448FB0
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_0244FFB8 12_2_0244FFB8
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_02458BB8 12_2_02458BB8
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_02447840 12_2_02447840
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_0245C44C 12_2_0245C44C
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_02465450 12_2_02465450
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_0245C058 12_2_0245C058
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_0245B460 12_2_0245B460
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_0244D474 12_2_0244D474
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_02456C70 12_2_02456C70
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_0244B07C 12_2_0244B07C
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_02442C78 12_2_02442C78
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_0244C078 12_2_0244C078
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_02441000 12_2_02441000
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_02449408 12_2_02449408
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_02447C08 12_2_02447C08
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_0246181C 12_2_0246181C
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_02451030 12_2_02451030
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_0245EC30 12_2_0245EC30
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_0244B83C 12_2_0244B83C
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_0244F8C4 12_2_0244F8C4
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_02455CC4 12_2_02455CC4
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_024480CC 12_2_024480CC
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_024508CC 12_2_024508CC
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_024414D4 12_2_024414D4
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_02453CD4 12_2_02453CD4
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_024418DC 12_2_024418DC
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_024520E0 12_2_024520E0
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_02443CF4 12_2_02443CF4
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_024448FC 12_2_024448FC
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_024490F8 12_2_024490F8
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_02444C84 12_2_02444C84
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_0245CC84 12_2_0245CC84
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_02455880 12_2_02455880
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_0244AC94 12_2_0244AC94
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_024498AC 12_2_024498AC
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_0245A8B0 12_2_0245A8B0
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_024694BC 12_2_024694BC
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_0244DCB8 12_2_0244DCB8
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_02468500 12_2_02468500
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_0245610C 12_2_0245610C
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_02469910 12_2_02469910
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_02457518 12_2_02457518
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_02451924 12_2_02451924
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_02454D20 12_2_02454D20
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_0245AD28 12_2_0245AD28
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_02447530 12_2_02447530
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_0245B130 12_2_0245B130
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_02446138 12_2_02446138
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_024515C8 12_2_024515C8
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_0245D5F0 12_2_0245D5F0
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_0245BDA0 12_2_0245BDA0
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_024495BC 12_2_024495BC
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00B40000 13_2_00B40000
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00C908CC 13_2_00C908CC
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00C8640A 13_2_00C8640A
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00C8CC14 13_2_00C8CC14
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00C87D6C 13_2_00C87D6C
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00C976A8 13_2_00C976A8
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00C86E42 13_2_00C86E42
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00CA0618 13_2_00CA0618
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00C88BC8 13_2_00C88BC8
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00C98FC8 13_2_00C98FC8
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00C93FD0 13_2_00C93FD0
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00C863F4 13_2_00C863F4
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00CA73A4 13_2_00CA73A4
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00C89B79 13_2_00C89B79
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00C880CC 13_2_00C880CC
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00C8F8C4 13_2_00C8F8C4
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00C95CC4 13_2_00C95CC4
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00C818DC 13_2_00C818DC
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00C814D4 13_2_00C814D4
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00C93CD4 13_2_00C93CD4
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00CA1CD4 13_2_00CA1CD4
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00C920E0 13_2_00C920E0
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00C890F8 13_2_00C890F8
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00C848FC 13_2_00C848FC
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00C83CF4 13_2_00C83CF4
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00CA488C 13_2_00CA488C
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00C95880 13_2_00C95880
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00C84C84 13_2_00C84C84
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00C9CC84 13_2_00C9CC84
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00C9709C 13_2_00C9709C
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00C8AC94 13_2_00C8AC94
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00CA1494 13_2_00CA1494
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00CA44A8 13_2_00CA44A8
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00C898AC 13_2_00C898AC
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00C8DCB8 13_2_00C8DCB8
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00CA94BC 13_2_00CA94BC
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00C9A8B0 13_2_00C9A8B0
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00C9C44C 13_2_00C9C44C
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00C87840 13_2_00C87840
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00C9C058 13_2_00C9C058
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00CA5450 13_2_00CA5450
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00CA5868 13_2_00CA5868
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00C9B460 13_2_00C9B460
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00C82C78 13_2_00C82C78
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00C8C078 13_2_00C8C078
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00C8B07C 13_2_00C8B07C
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00C96C70 13_2_00C96C70
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00C8D474 13_2_00C8D474
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00C89408 13_2_00C89408
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00C87C08 13_2_00C87C08
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00C81000 13_2_00C81000
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00C9A000 13_2_00C9A000
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00CA181C 13_2_00CA181C
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00C87410 13_2_00C87410
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00C8B83C 13_2_00C8B83C
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00C91030 13_2_00C91030
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00C9EC30 13_2_00C9EC30
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00C915C8 13_2_00C915C8
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00C9D5F0 13_2_00C9D5F0
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00C9BDA0 13_2_00C9BDA0
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00C895BC 13_2_00C895BC
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00CA4D64 13_2_00CA4D64
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00C9610C 13_2_00C9610C
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00CA8500 13_2_00CA8500
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00CA2100 13_2_00CA2100
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00C97518 13_2_00C97518
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00CA9910 13_2_00CA9910
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00C9AD28 13_2_00C9AD28
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00C94D20 13_2_00C94D20
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00C91924 13_2_00C91924
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00C86138 13_2_00C86138
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00C9B130 13_2_00C9B130
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00C8D6CC 13_2_00C8D6CC
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00C9EAC0 13_2_00C9EAC0
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00C996D4 13_2_00C996D4
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00CA36FC 13_2_00CA36FC
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00C892F0 13_2_00C892F0
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00C88A8C 13_2_00C88A8C
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00CA4E8C 13_2_00CA4E8C
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00CA2E84 13_2_00CA2E84
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00C8BE90 13_2_00C8BE90
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00C94A90 13_2_00C94A90
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00C8AAB8 13_2_00C8AAB8
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00C84EB8 13_2_00C84EB8
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00C83ABC 13_2_00C83ABC
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00C9A6BC 13_2_00C9A6BC
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00CA2AB0 13_2_00CA2AB0
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00CA6E48 13_2_00CA6E48
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00C9A244 13_2_00C9A244
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00C8B258 13_2_00C8B258
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00C8F65C 13_2_00C8F65C
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00C8A660 13_2_00C8A660
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00C90A70 13_2_00C90A70
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00C83274 13_2_00C83274
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00C98E08 13_2_00C98E08
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00C83E0C 13_2_00C83E0C
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00C9020C 13_2_00C9020C
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00C95A00 13_2_00C95A00
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00CA8A00 13_2_00CA8A00
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00C8461C 13_2_00C8461C
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00C84214 13_2_00C84214
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00C8BA2C 13_2_00C8BA2C
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00C98A2C 13_2_00C98A2C
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00C90E2C 13_2_00C90E2C
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00C9662C 13_2_00C9662C
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00C8263C 13_2_00C8263C
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00C997CC 13_2_00C997CC
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00C82FD4 13_2_00C82FD4
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00C833D4 13_2_00C833D4
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00CA27EC 13_2_00CA27EC
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00C9FFFC 13_2_00C9FFFC
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00C8A7F0 13_2_00C8A7F0
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00C95384 13_2_00C95384
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00C81B94 13_2_00C81B94
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00CA47A8 13_2_00CA47A8
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00C8DBA0 13_2_00C8DBA0
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00C8FFB8 13_2_00C8FFB8
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00C98BB8 13_2_00C98BB8
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00C88FB0 13_2_00C88FB0
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00C84758 13_2_00C84758
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00C8975C 13_2_00C8975C
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00C9E750 13_2_00C9E750
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00CA8B68 13_2_00CA8B68
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00C88378 13_2_00C88378
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00C8F77C 13_2_00C8F77C
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00C9D770 13_2_00C9D770
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00C9CF70 13_2_00C9CF70
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00C94F18 13_2_00C94F18
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00CA5B1C 13_2_00CA5B1C
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00C9E310 13_2_00C9E310
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00CA8310 13_2_00CA8310
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00C8EF14 13_2_00C8EF14
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00C93B14 13_2_00C93B14
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00C8D33C 13_2_00C8D33C
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_0000000180010C10 LdrFindResource_U,LdrAccessResource,NtAllocateVirtualMemory, 12_2_0000000180010C10
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_0000000180010AC0 ExitProcess,RtlQueueApcWow64Thread,NtTestAlert, 12_2_0000000180010AC0
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_0000000180010DB0 ZwOpenSymbolicLinkObject,ZwOpenSymbolicLinkObject, 12_2_0000000180010DB0
Source: C:\Windows\SysWOW64\regsvr32.exe Section loaded: sfc.dll Jump to behavior
Source: C:\Windows\System32\regsvr32.exe Section loaded: sfc.dll Jump to behavior
Source: C:\Windows\System32\regsvr32.exe Section loaded: sfc.dll Jump to behavior
Source: INNOVINC.one ReversingLabs: Detection: 33%
Source: INNOVINC.one Virustotal: Detection: 40%
Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE Key opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\SystemCertificates\CA Jump to behavior
Source: unknown Process created: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE" "C:\Users\user\Desktop\INNOVINC.one
Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE Process created: C:\Windows\SysWOW64\wscript.exe C:\Windows\System32\WScript.exe "C:\Users\user\AppData\Local\Temp\click.wsf"
Source: C:\Windows\SysWOW64\wscript.exe Process created: C:\Windows\SysWOW64\regsvr32.exe C:\Windows\System32\regsvr32.exe" "C:\Users\user\AppData\Local\Temp\rad862DE.tmp.dll
Source: C:\Windows\SysWOW64\regsvr32.exe Process created: C:\Windows\System32\regsvr32.exe "C:\Users\user\AppData\Local\Temp\rad862DE.tmp.dll"
Source: C:\Windows\System32\regsvr32.exe Process created: C:\Windows\System32\regsvr32.exe C:\Windows\system32\regsvr32.exe "C:\Windows\system32\OkzilcUDkTuKjw\FGdLGyDLKydH.dll"
Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE Process created: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTEM.EXE /tsr
Source: unknown Process created: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTEM.EXE "C:\Program Files (x86)\Microsoft Office\Office16\ONENOTEM.EXE" /tsr
Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE Process created: C:\Windows\SysWOW64\wscript.exe C:\Windows\System32\WScript.exe "C:\Users\user\AppData\Local\Temp\click.wsf" Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE Process created: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTEM.EXE /tsr Jump to behavior
Source: C:\Windows\SysWOW64\wscript.exe Process created: C:\Windows\SysWOW64\regsvr32.exe C:\Windows\System32\regsvr32.exe" "C:\Users\user\AppData\Local\Temp\rad862DE.tmp.dll Jump to behavior
Source: C:\Windows\SysWOW64\regsvr32.exe Process created: C:\Windows\System32\regsvr32.exe "C:\Users\user\AppData\Local\Temp\rad862DE.tmp.dll" Jump to behavior
Source: C:\Windows\System32\regsvr32.exe Process created: C:\Windows\System32\regsvr32.exe C:\Windows\system32\regsvr32.exe "C:\Windows\system32\OkzilcUDkTuKjw\FGdLGyDLKydH.dll" Jump to behavior
Source: C:\Windows\SysWOW64\wscript.exe Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{06290BD0-48AA-11D2-8432-006008C3FBFC}\InprocServer32 Jump to behavior
Source: Send to OneNote.lnk.0.dr LNK file: ..\..\..\..\..\..\..\..\..\Program Files (x86)\Microsoft Office\Office16\ONENOTEM.EXE
Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE File created: C:\Users\user\Documents\{DF341BB7-B8DD-439F-A859-E34A3377422B} Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE File created: C:\Users\user\AppData\Local\Temp\{36662884-7DDD-458E-BA2C-FCEF9A682517} - OProcSessId.dat Jump to behavior
Source: classification engine Classification label: mal100.troj.expl.evad.winONE@12/695@1/49
Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE File read: C:\Program Files (x86)\desktop.ini Jump to behavior
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_02448BC8 Process32NextW,Process32FirstW,CreateToolhelp32Snapshot,FindCloseChangeNotification, 12_2_02448BC8
Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTEM.EXE Mutant created: \Sessions\1\BaseNamedObjects\OneNoteM:AppShared
Source: C:\Windows\SysWOW64\wscript.exe File read: C:\Windows\System32\drivers\etc\hosts Jump to behavior
Source: C:\Windows\SysWOW64\wscript.exe File read: C:\Windows\System32\drivers\etc\hosts Jump to behavior
Source: C:\Windows\System32\regsvr32.exe File read: C:\Windows\System32\drivers\etc\hosts Jump to behavior
Source: Window Recorder Window detected: More than 3 window changes detected
Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE Key opened: HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages Jump to behavior
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_0000000180005C69 push rdi; ret 12_2_0000000180005C72
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_00000001800056DD push rdi; ret 12_2_00000001800056E4
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_0244A26E push ebp; ret 12_2_0244A26F
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_02449E8B push eax; retf 12_2_02449E8E
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_02457EAF push 458BCC5Ah; retf 12_2_02457EBC
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_0245C731 push esi; iretd 12_2_0245C732
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_024580D7 push ebp; retf 12_2_024580D8
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_02446CDE push esi; iretd 12_2_02446CDF
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_0244A0FC push ebp; iretd 12_2_0244A0FD
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_02446C9F pushad ; ret 12_2_02446CAA
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_02457D4E push ebp; iretd 12_2_02457D4F
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_02458157 push ebp; retf 12_2_02458158
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_02449D51 push ebp; retf 12_2_02449D5A
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_02457D25 push 4D8BFFFFh; retf 12_2_02457D2A
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_02457D3C push ebp; retf 12_2_02457D3D
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_0244A1D2 push ebp; iretd 12_2_0244A1D3
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_02457987 push ebp; iretd 12_2_0245798F
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00C86CDE push esi; iretd 13_2_00C86CDF
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00C86C9F pushad ; ret 13_2_00C86CAA
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00CA6D34 push edi; ret 13_2_00CA6D36
Source: C:\Windows\System32\regsvr32.exe Code function: 13_2_00C9C731 push esi; iretd 13_2_00C9C732
Source: rad862DE.tmp.dll.10.dr Static PE information: section name: _RDATA
Source: C:\Windows\SysWOW64\wscript.exe Process created: C:\Windows\SysWOW64\regsvr32.exe C:\Windows\System32\regsvr32.exe" "C:\Users\user\AppData\Local\Temp\rad862DE.tmp.dll
Source: C:\Windows\System32\regsvr32.exe File created: C:\Windows\System32\OkzilcUDkTuKjw\FGdLGyDLKydH.dll (copy) Jump to dropped file
Source: C:\Windows\SysWOW64\wscript.exe File created: C:\Users\user\AppData\Local\Temp\rad862DE.tmp.dll Jump to dropped file
Source: C:\Windows\System32\regsvr32.exe File created: C:\Windows\System32\OkzilcUDkTuKjw\FGdLGyDLKydH.dll (copy) Jump to dropped file
Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE File created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Send to OneNote.lnk Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE File created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Send to OneNote.lnk Jump to behavior

Hooking and other Techniques for Hiding and Protection

barindex
Source: C:\Windows\System32\regsvr32.exe File opened: C:\Windows\system32\OkzilcUDkTuKjw\FGdLGyDLKydH.dll:Zone.Identifier read attributes | delete Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\wscript.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\wscript.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\wscript.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTEM.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\wscript.exe TID: 4760 Thread sleep time: -30000s >= -30000s Jump to behavior
Source: C:\Windows\SysWOW64\wscript.exe TID: 664 Thread sleep time: -30000s >= -30000s Jump to behavior
Source: C:\Windows\System32\regsvr32.exe TID: 1844 Thread sleep time: -300000s >= -30000s Jump to behavior
Source: C:\Windows\System32\regsvr32.exe API coverage: 8.0 %
Source: C:\Windows\SysWOW64\wscript.exe Window found: window name: WSH-Timer Jump to behavior
Source: C:\Windows\System32\regsvr32.exe Process information queried: ProcessInformation Jump to behavior
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_0000000180008D28 FindFirstFileExW, 12_2_0000000180008D28
Source: C:\Windows\System32\regsvr32.exe File Volume queried: C:\ FullSizeInformation Jump to behavior
Source: wscript.exe, 0000000A.00000003.334568472.0000000005E2D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.352899714.0000000005E2D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000002.356606948.0000000005E2D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.351628835.0000000005E2D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.354576518.0000000005E2D000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V RAW)8:?
Source: wscript.exe, 0000000A.00000003.334568472.0000000005E2D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.352899714.0000000005E2D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000002.356606948.0000000005E2D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.351628835.0000000005E2D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.354576518.0000000005E2D000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000D.00000002.577044857.0000000000BCD000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000D.00000003.415130605.0000000000C17000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000D.00000003.476942364.0000000000C17000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000D.00000003.414520712.0000000000BCD000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000D.00000002.577044857.0000000000C17000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000D.00000003.476681841.0000000000BCD000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V RAW
Source: wscript.exe, 0000000A.00000003.334568472.0000000005DD1000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000002.356494821.0000000005DEF000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.352164477.0000000005DED000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.351628835.0000000005DDA000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V RAWh4
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_0000000180001C48 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, 12_2_0000000180001C48
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_000000018000A878 GetProcessHeap, 12_2_000000018000A878
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_0000000180010C10 LdrFindResource_U,LdrAccessResource,NtAllocateVirtualMemory, 12_2_0000000180010C10
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_0000000180001C48 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, 12_2_0000000180001C48
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_00000001800082EC RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, 12_2_00000001800082EC
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_00000001800017DC SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, 12_2_00000001800017DC

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Windows\System32\regsvr32.exe Network Connect: 159.65.88.10 8080 Jump to behavior
Source: C:\Windows\System32\regsvr32.exe Network Connect: 164.90.222.65 443 Jump to behavior
Source: C:\Windows\SysWOW64\wscript.exe Network Connect: 203.26.41.131 443 Jump to behavior
Source: C:\Windows\SysWOW64\wscript.exe Domain query: penshorn.org
Source: C:\Windows\System32\regsvr32.exe Network Connect: 66.228.32.31 7080 Jump to behavior
Source: C:\Windows\System32\regsvr32.exe Network Connect: 187.63.160.88 80 Jump to behavior
Source: C:\Windows\System32\regsvr32.exe Network Connect: 104.168.155.143 8080 Jump to behavior
Source: C:\Windows\System32\regsvr32.exe Network Connect: 159.89.202.34 443 Jump to behavior
Source: C:\Windows\System32\regsvr32.exe Network Connect: 91.121.146.47 8080 Jump to behavior
Source: C:\Windows\System32\regsvr32.exe Network Connect: 160.16.142.56 8080 Jump to behavior
Source: C:\Windows\System32\regsvr32.exe Network Connect: 182.162.143.56 443 Jump to behavior
Source: C:\Windows\System32\regsvr32.exe Network Connect: 167.172.199.165 8080 Jump to behavior
Source: C:\Windows\System32\regsvr32.exe Network Connect: 163.44.196.120 8080 Jump to behavior
Source: C:\Windows\SysWOW64\wscript.exe Process created: C:\Windows\SysWOW64\regsvr32.exe C:\Windows\System32\regsvr32.exe" "C:\Users\user\AppData\Local\Temp\rad862DE.tmp.dll Jump to behavior
Source: C:\Windows\System32\regsvr32.exe Queries volume information: C:\ VolumeInformation Jump to behavior
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_00000001800070A0 cpuid 12_2_00000001800070A0
Source: C:\Windows\SysWOW64\wscript.exe Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid Jump to behavior
Source: C:\Windows\System32\regsvr32.exe Code function: 12_2_0000000180001D98 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter, 12_2_0000000180001D98

Stealing of Sensitive Information

barindex
Source: Yara match File source: INNOVINC.one, type: SAMPLE
Source: Yara match File source: C:\Users\user\Desktop\INNOVINC.one, type: DROPPED
Source: Yara match File source: 0000000D.00000002.576728801.0000000000B88000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 13.2.regsvr32.exe.b50000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 12.2.regsvr32.exe.2410000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 13.2.regsvr32.exe.b50000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 12.2.regsvr32.exe.2410000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 0000000D.00000002.576351502.0000000000B50000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000D.00000002.578265574.0000000000C81000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000C.00000002.329916167.0000000002441000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000C.00000002.329850872.0000000002410000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY

Remote Access Functionality

barindex
Source: Yara match File source: INNOVINC.one, type: SAMPLE
Source: Yara match File source: C:\Users\user\Desktop\INNOVINC.one, type: DROPPED
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs