Windows Analysis Report
malware.one

Overview

General Information

Sample Name: malware.one
(renamed file extension from malware to one, renamed because original name is a hash value)
Original Sample Name: malware.malware
Analysis ID: 830538
MD5: 80a381f900f302d1be5673f54f76321c
SHA1: 1acac99bb1343a9dfd0100042e58e5f4e3a16f61
SHA256: 59ecfd5be8b5d602353660723377ea0b2d517f621b350ce25a9b6f1f1386fd15
Infos:

Detection

Emotet
Score: 100
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

Multi AV Scanner detection for submitted file
Yara detected Malicious OneNote
Yara detected Emotet
System process connects to network (likely due to code injection or exploit)
Sigma detected: Run temp file via regsvr32
Antivirus detection for URL or domain
Multi AV Scanner detection for dropped file
Snort IDS alert for network traffic
C2 URLs / IPs found in malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Document exploit detected (process start blacklist hit)
Queries the volume information (name, serial number etc) of a device
Yara signature match
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query locales information (e.g. system language)
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Creates files inside the system directory
Internet Provider seen in connection with other malware
Detected potential crypto function
Contains functionality to query CPU information (cpuid)
Found potential string decryption / allocating functions
Stores files to the Windows start menu directory
JA3 SSL client fingerprint seen in connection with other malware
Contains functionality to call native functions
Contains functionality which may be used to detect a debugger (GetProcessHeap)
IP address seen in connection with other malware
Drops PE files
Tries to load missing DLLs
Uses a known web browser user agent for HTTP communication
Drops PE files to the windows directory (C:\Windows)
Detected TCP or UDP traffic on non-standard ports
Connects to several IPs in different countries
Creates a start menu entry (Start Menu\Programs\Startup)
Registers a DLL
Found large amount of non-executed APIs
Creates a process in suspended mode (likely to inject code)
Found WSH timer for Javascript or VBS script (likely evasive script)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)

Classification

AV Detection

barindex
Source: malware.one ReversingLabs: Detection: 28%
Source: https://115.178.55.22:80/tcbvserkm/kigv/rbwmds/rw Avira URL Cloud: Label: malware
Source: https://218.38.121.17/tcbvserkm/kigv/rbwmds/ Avira URL Cloud: Label: malware
Source: https://115.178.55.22:80/tcbvserkm/kigv/rbwmds/0 Avira URL Cloud: Label: malware
Source: https://218.38.121.17:443/tcbvserkm/kigv/rbwmds/ Avira URL Cloud: Label: malware
Source: https://138.197.14.67:8080/tcbvserkm/kigv/rbwmds/ Avira URL Cloud: Label: malware
Source: https://218.38.121.17/tcbvserkm/kigv/rbwmds/T( Avira URL Cloud: Label: malware
Source: https://olgaperezporro.com/js/ExGBiCZdkkw0GBAuHNZ/6 Avira URL Cloud: Label: malware
Source: https://218.38.121.17/tcbvserkm/kigv/rbwmds/wn Avira URL Cloud: Label: malware
Source: https://thailandcan.org/assets/ulRa/P Avira URL Cloud: Label: malware
Source: https://4fly.su:443/search/OfGA/wM Avira URL Cloud: Label: malware
Source: https://olgaperezporro.com/js/ExGBiCZdkkw0GBAuHNZ/vM Avira URL Cloud: Label: malware
Source: https://olgaperezporro.com/js/ExGBiCZdkkw0GBAuHNZ/ Avira URL Cloud: Label: malware
Source: http://semedacara.com.br/ava/ahhz/ Avira URL Cloud: Label: malware
Source: http://staging-demo.com/public_html/wTG/ Avira URL Cloud: Label: malware
Source: http://malli.su:80/img/PXN5J/ Avira URL Cloud: Label: malware
Source: https://115.178.55.22:80/tcbvserkm/kigv/rbwmds/ Avira URL Cloud: Label: malware
Source: https://93.84.115.205:7080/T Avira URL Cloud: Label: malware
Source: https://olgaperezporro.com/ Avira URL Cloud: Label: malware
Source: https://115.178.55.22:80/l Avira URL Cloud: Label: malware
Source: http://uk-eurodom.com/bitrix/9HrzPY66D1F/ Avira URL Cloud: Label: malware
Source: https://olgaperezporro.com Avira URL Cloud: Label: malware
Source: https://olgaperezporro.com/js/ExGBiCZdkkw0GBAuHNZ/esqu Avira URL Cloud: Label: malware
Source: https://138.197.14.67:8080/tcbvserkm/kigv/rbwmds/a Avira URL Cloud: Label: malware
Source: https://4fly.su:443/search/OfGA/ Avira URL Cloud: Label: malware
Source: http://staging-demo.com/public_html/wTG/xM Avira URL Cloud: Label: phishing
Source: http://semedacara.com.br/ava/ahhz/yM Avira URL Cloud: Label: malware
Source: https://kts.group/35ccbf2003/jKgk8/uM Avira URL Cloud: Label: malware
Source: http://1it.fit/site_vp/4PwK3s6Bf9K7TEA/ Avira URL Cloud: Label: malware
Source: http://efirma.sglwebs.com/img/2mmLuv7SxhhYFRVn/8 Avira URL Cloud: Label: malware
Source: https://4fly.su:443/search/OfGA/ata Avira URL Cloud: Label: malware
Source: https://kts.group Avira URL Cloud: Label: malware
Source: http://staging-demo.com/public_html/wT Avira URL Cloud: Label: phishing
Source: http://uk-eurodom.com/bitrix/9HrzPY66D1F/24Q Avira URL Cloud: Label: malware
Source: https://kts.group/35ccbf2003/jKgk8/ Avira URL Cloud: Label: malware
Source: https://thailandcan.org/assets/ulRa/ Avira URL Cloud: Label: malware
Source: http://malli.su:80/img/PXN5J/tM Avira URL Cloud: Label: malware
Source: http://1it.fit/site_vp/4PwK3s6Bf9K7TEA/EC24% Avira URL Cloud: Label: malware
Source: https://138.197.14.67:8080/ Avira URL Cloud: Label: malware
Source: http://efirma.sglwebs.com/img/2mmLuv7SxhhYFRVn/ Avira URL Cloud: Label: malware
Source: C:\Users\user\AppData\Local\Temp\rad66B18.tmp.dll ReversingLabs: Detection: 79%
Source: C:\Windows\System32\JMgyzwrCUAZpIA\OfEg.dll (copy) ReversingLabs: Detection: 79%
Source: 0000000F.00000002.572181479.00000000006EA000.00000004.00000020.00020000.00000000.sdmp Malware Configuration Extractor: Emotet {"C2 list": ["138.197.14.67:8080", "193.194.92.175:443", "93.84.115.205:7080", "115.178.55.22:80", "218.38.121.17:443", "186.250.48.5:443", "174.138.33.49:7080", "83.229.80.93:8080", "175.126.176.79:8080", "209.239.112.82:8080", "37.59.103.148:8080", "185.148.169.10:8080", "82.98.180.154:7080", "103.224.241.74:8080", "103.41.204.169:8080", "202.28.34.99:8080", "198.199.70.22:8080", "62.171.178.147:8080", "37.44.244.177:8080", "195.77.239.39:8080", "159.65.135.222:7080", "139.196.72.155:8080", "46.101.98.60:8080", "85.214.67.203:8080", "54.37.228.122:443", "93.104.209.107:8080", "178.62.112.199:8080", "103.85.95.4:8080", "139.59.80.108:8080", "64.227.55.231:8080", "160.16.143.191:8080", "87.106.97.83:7080", "128.199.217.206:443", "178.238.225.252:8080", "128.199.242.164:8080", "85.25.120.45:8080", "103.254.12.236:7080", "114.79.130.68:443", "104.244.79.94:443", "78.47.204.80:443"], "Public Key": ["RUNTMSAAAAD0LxqDNhonUYwk8sqo7IWuUllRdUiUBnACc6romsQoe1YJD7wIe4AheqYofpZFucPDXCZ0z9i+ooUffqeoLZU0XqmO8QAUAJA=", "RUNLMSAAAADYNZPXY4tQxd/N4Wn5sTYAm5tUOxY2ol1ELrI4MNhHNi640vSLasjYTHpFRBoG+o84vtr7AJachCzOHjaAJFCWu6mj8QANAJA="]}
Source: unknown HTTPS traffic detected: 31.31.196.93:443 -> 192.168.2.3:49702 version: TLS 1.2
Source: unknown HTTPS traffic detected: 40.115.116.248:443 -> 192.168.2.3:49703 version: TLS 1.2
Source: unknown HTTPS traffic detected: 218.38.121.17:443 -> 192.168.2.3:49710 version: TLS 1.2
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_000000018002ED44 memset,FindFirstFileExA, 14_2_000000018002ED44
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_000000018002F114 memset,FindFirstFileExW,FindClose,FindNextFileW, 14_2_000000018002F114
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_000000018002F2C4 FindFirstFileExA, 14_2_000000018002F2C4
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_000000018002F2F0 FindFirstFileExW, 14_2_000000018002F2F0

Software Vulnerabilities

barindex
Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE Process created: C:\Windows\SysWOW64\wscript.exe

Networking

barindex
Source: C:\Windows\System32\regsvr32.exe Network Connect: 115.178.55.22 80 Jump to behavior
Source: C:\Windows\System32\regsvr32.exe Network Connect: 193.194.92.175 443 Jump to behavior
Source: C:\Windows\System32\regsvr32.exe Network Connect: 93.84.115.205 7080 Jump to behavior
Source: C:\Windows\SysWOW64\wscript.exe Network Connect: 195.2.88.86 80 Jump to behavior
Source: C:\Windows\SysWOW64\wscript.exe Network Connect: 31.31.196.93 443 Jump to behavior
Source: C:\Windows\SysWOW64\wscript.exe Domain query: olgaperezporro.com
Source: C:\Windows\SysWOW64\wscript.exe Network Connect: 40.115.116.248 443 Jump to behavior
Source: C:\Windows\System32\regsvr32.exe Network Connect: 218.38.121.17 443 Jump to behavior
Source: C:\Windows\SysWOW64\wscript.exe Domain query: malli.su
Source: C:\Windows\SysWOW64\wscript.exe Domain query: kts.group
Source: C:\Windows\System32\regsvr32.exe Network Connect: 138.197.14.67 8080 Jump to behavior
Source: Traffic Snort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.3:57840 -> 8.8.8.8:53
Source: Traffic Snort IDS: 2404306 ET CNC Feodo Tracker Reported CnC Server TCP group 4 192.168.2.3:49705 -> 138.197.14.67:8080
Source: Traffic Snort IDS: 2404346 ET CNC Feodo Tracker Reported CnC Server TCP group 24 192.168.2.3:49708 -> 93.84.115.205:7080
Source: Traffic Snort IDS: 2404304 ET CNC Feodo Tracker Reported CnC Server TCP group 3 192.168.2.3:49709 -> 115.178.55.22:80
Source: Traffic Snort IDS: 2404322 ET CNC Feodo Tracker Reported CnC Server TCP group 12 192.168.2.3:49710 -> 218.38.121.17:443
Source: Malware configuration extractor IPs: 138.197.14.67:8080
Source: Malware configuration extractor IPs: 193.194.92.175:443
Source: Malware configuration extractor IPs: 93.84.115.205:7080
Source: Malware configuration extractor IPs: 115.178.55.22:80
Source: Malware configuration extractor IPs: 218.38.121.17:443
Source: Malware configuration extractor IPs: 186.250.48.5:443
Source: Malware configuration extractor IPs: 174.138.33.49:7080
Source: Malware configuration extractor IPs: 83.229.80.93:8080
Source: Malware configuration extractor IPs: 175.126.176.79:8080
Source: Malware configuration extractor IPs: 209.239.112.82:8080
Source: Malware configuration extractor IPs: 37.59.103.148:8080
Source: Malware configuration extractor IPs: 185.148.169.10:8080
Source: Malware configuration extractor IPs: 82.98.180.154:7080
Source: Malware configuration extractor IPs: 103.224.241.74:8080
Source: Malware configuration extractor IPs: 103.41.204.169:8080
Source: Malware configuration extractor IPs: 202.28.34.99:8080
Source: Malware configuration extractor IPs: 198.199.70.22:8080
Source: Malware configuration extractor IPs: 62.171.178.147:8080
Source: Malware configuration extractor IPs: 37.44.244.177:8080
Source: Malware configuration extractor IPs: 195.77.239.39:8080
Source: Malware configuration extractor IPs: 159.65.135.222:7080
Source: Malware configuration extractor IPs: 139.196.72.155:8080
Source: Malware configuration extractor IPs: 46.101.98.60:8080
Source: Malware configuration extractor IPs: 85.214.67.203:8080
Source: Malware configuration extractor IPs: 54.37.228.122:443
Source: Malware configuration extractor IPs: 93.104.209.107:8080
Source: Malware configuration extractor IPs: 178.62.112.199:8080
Source: Malware configuration extractor IPs: 103.85.95.4:8080
Source: Malware configuration extractor IPs: 139.59.80.108:8080
Source: Malware configuration extractor IPs: 64.227.55.231:8080
Source: Malware configuration extractor IPs: 160.16.143.191:8080
Source: Malware configuration extractor IPs: 87.106.97.83:7080
Source: Malware configuration extractor IPs: 128.199.217.206:443
Source: Malware configuration extractor IPs: 178.238.225.252:8080
Source: Malware configuration extractor IPs: 128.199.242.164:8080
Source: Malware configuration extractor IPs: 85.25.120.45:8080
Source: Malware configuration extractor IPs: 103.254.12.236:7080
Source: Malware configuration extractor IPs: 114.79.130.68:443
Source: Malware configuration extractor IPs: 104.244.79.94:443
Source: Malware configuration extractor IPs: 78.47.204.80:443
Source: Joe Sandbox View ASN Name: ARNDZ ARNDZ
Source: Joe Sandbox View ASN Name: BELPAK-ASBELPAKBY BELPAK-ASBELPAKBY
Source: Joe Sandbox View JA3 fingerprint: ce5f3254611a8c095a3d821d44539877
Source: Joe Sandbox View IP Address: 193.194.92.175 193.194.92.175
Source: Joe Sandbox View IP Address: 93.84.115.205 93.84.115.205
Source: Joe Sandbox View IP Address: 174.138.33.49 174.138.33.49
Source: global traffic HTTP traffic detected: GET /35ccbf2003/jKgk8/ HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: kts.group
Source: global traffic HTTP traffic detected: GET /js/ExGBiCZdkkw0GBAuHNZ/ HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: olgaperezporro.com
Source: global traffic TCP traffic: 192.168.2.3:49705 -> 138.197.14.67:8080
Source: global traffic TCP traffic: 192.168.2.3:49708 -> 93.84.115.205:7080
Source: unknown Network traffic detected: IP country count 19
Source: unknown Network traffic detected: HTTP traffic on port 49710 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49710
Source: unknown Network traffic detected: HTTP traffic on port 49707 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49702 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49703 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49707
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49703
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49702
Source: unknown TCP traffic detected without corresponding DNS query: 138.197.14.67
Source: unknown TCP traffic detected without corresponding DNS query: 138.197.14.67
Source: unknown TCP traffic detected without corresponding DNS query: 138.197.14.67
Source: unknown TCP traffic detected without corresponding DNS query: 138.197.14.67
Source: unknown TCP traffic detected without corresponding DNS query: 138.197.14.67
Source: unknown TCP traffic detected without corresponding DNS query: 138.197.14.67
Source: unknown TCP traffic detected without corresponding DNS query: 138.197.14.67
Source: unknown TCP traffic detected without corresponding DNS query: 138.197.14.67
Source: unknown TCP traffic detected without corresponding DNS query: 138.197.14.67
Source: unknown TCP traffic detected without corresponding DNS query: 193.194.92.175
Source: unknown TCP traffic detected without corresponding DNS query: 193.194.92.175
Source: unknown TCP traffic detected without corresponding DNS query: 193.194.92.175
Source: unknown TCP traffic detected without corresponding DNS query: 193.194.92.175
Source: unknown TCP traffic detected without corresponding DNS query: 93.84.115.205
Source: unknown TCP traffic detected without corresponding DNS query: 93.84.115.205
Source: unknown TCP traffic detected without corresponding DNS query: 93.84.115.205
Source: unknown TCP traffic detected without corresponding DNS query: 115.178.55.22
Source: unknown TCP traffic detected without corresponding DNS query: 115.178.55.22
Source: unknown TCP traffic detected without corresponding DNS query: 115.178.55.22
Source: unknown TCP traffic detected without corresponding DNS query: 218.38.121.17
Source: unknown TCP traffic detected without corresponding DNS query: 218.38.121.17
Source: unknown TCP traffic detected without corresponding DNS query: 218.38.121.17
Source: unknown TCP traffic detected without corresponding DNS query: 218.38.121.17
Source: wscript.exe, 0000000A.00000003.389552765.00000000058D1000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.389268464.00000000058D1000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000002.394733751.00000000058D2000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://1it.fit
Source: wscript.exe, 0000000A.00000003.388681276.00000000055AA000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.388352589.00000000057EE000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.384898008.000000000561F000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.382616382.0000000005541000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.387365837.000000000579E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.389287393.0000000005904000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.379710983.0000000005345000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000002.394765226.0000000005917000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.381147538.0000000005534000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.383882868.000000000566D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.388670695.000000000576D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.393765942.00000000056CF000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.380261353.00000000054B3000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.379756871.0000000005359000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.379986129.00000000053BD000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.381405615.0000000005558000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.388829355.000000000589B000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.380405706.000000000545A000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.382922576.000000000564F000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.381734544.0000000005502000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.391066699.00000000059A5000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://1it.fit/site_vp/4PwK3s6Bf9K7TEA/
Source: wscript.exe, 0000000A.00000003.381296278.0000000005577000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.381439650.000000000557E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.382616382.000000000558C000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000002.394341142.000000000558C000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://1it.fit/site_vp/4PwK3s6Bf9K7TEA/EC24%
Source: wscript.exe, 0000000A.00000003.393736917.0000000005A1F000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.393578356.0000000005A12000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.375930591.0000000005A12000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000002.395019547.0000000005A20000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000F.00000002.572181479.0000000000788000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000F.00000003.453274257.0000000002888000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://crl.globalsign.net/root-r2.crl0
Source: regsvr32.exe, 0000000F.00000003.452510983.0000000002887000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000F.00000003.453274257.0000000002888000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://ctldl.windowsupdate.com/Q
Source: regsvr32.exe, 0000000F.00000002.572181479.00000000006EA000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000F.00000002.572181479.0000000000788000.00000004.00000020.00020000.00000000.sdmp, 77EC63BDA74BD0D0E0426DC8F80085060.15.dr String found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
Source: regsvr32.exe, 0000000F.00000002.572181479.000000000073C000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/enEM32
Source: wscript.exe, 0000000A.00000003.389552765.00000000058D1000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.389268464.00000000058D1000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000002.394733751.00000000058D2000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://efirma.sg
Source: wscript.exe, 0000000A.00000003.388829355.000000000589B000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000002.394701314.00000000058A2000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://efirma.sglwebs.com/img/2mmLuv
Source: wscript.exe, wscript.exe, 0000000A.00000002.394746955.00000000058EE000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.379175657.0000000005359000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.388681276.00000000055AA000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.388352589.00000000057EE000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.384898008.000000000561F000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.382616382.0000000005541000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.387365837.000000000579E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.389287393.0000000005904000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.379710983.0000000005345000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.381147538.0000000005534000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.383882868.000000000566D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.388670695.000000000576D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.393765942.00000000056CF000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.380261353.00000000054B3000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.379756871.0000000005359000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.376996553.0000000002DB5000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.379986129.00000000053BD000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.381405615.0000000005558000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.388829355.000000000589B000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.380405706.000000000545A000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://efirma.sglwebs.com/img/2mmLuv7SxhhYFRVn/
Source: wscript.exe, 0000000A.00000003.387365837.000000000579E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.386373392.0000000005794000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.385630751.000000000578C000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.387429953.00000000057B0000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000002.394545937.00000000057CA000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.387506954.00000000057C2000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://efirma.sglwebs.com/img/2mmLuv7SxhhYFRVn/8
Source: wscript.exe, 0000000A.00000003.388829355.000000000589B000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000002.394701314.00000000058A2000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://hypernite.5v.pl/vendo
Source: wscript.exe, wscript.exe, 0000000A.00000002.394746955.00000000058EE000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.379175657.0000000005359000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.388681276.00000000055AA000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.388352589.00000000057EE000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.384898008.000000000561F000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.382616382.0000000005541000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.387365837.000000000579E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.389287393.0000000005904000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.379710983.0000000005345000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.381147538.0000000005534000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.383882868.000000000566D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.388670695.000000000576D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.393765942.00000000056CF000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.380261353.00000000054B3000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.379756871.0000000005359000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.376996553.0000000002DB5000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.379986129.00000000053BD000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.381405615.0000000005558000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.388829355.000000000589B000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.380405706.000000000545A000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://hypernite.5v.pl/vendor/hvlVMsI9jGafBBTa/
Source: wscript.exe, 0000000A.00000003.387365837.000000000579E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.386373392.0000000005794000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.385630751.000000000578C000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.387429953.00000000057B0000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000002.394545937.00000000057CA000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.387506954.00000000057C2000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://hypernite.5v.pl/vendor/hvlVMsI9jGafBBTa/cw1122
Source: wscript.exe, 0000000A.00000003.392112546.0000000004FDB000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://hypernite.5v.pl/vendor/hvlVMsI9jGafBBTa/zM
Source: wscript.exe, 0000000A.00000003.388829355.000000000589B000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000002.394701314.00000000058A2000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://malli.s4
Source: wscript.exe, wscript.exe, 0000000A.00000003.379175657.0000000005359000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.388681276.00000000055AA000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.388352589.00000000057EE000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.384898008.000000000561F000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.382616382.0000000005541000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.387365837.000000000579E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.389287393.0000000005904000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.379710983.0000000005345000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.381147538.0000000005534000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.383882868.000000000566D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.388670695.000000000576D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.393765942.00000000056CF000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.380261353.00000000054B3000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.379756871.0000000005359000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.376996553.0000000002DB5000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.379986129.00000000053BD000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.381405615.0000000005558000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.388829355.000000000589B000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.380405706.000000000545A000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.392433354.0000000003324000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://malli.su:80/img/PXN5J/
Source: wscript.exe, 0000000A.00000003.392112546.0000000004FDB000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://malli.su:80/img/PXN5J/tM
Source: wscript.exe, 0000000A.00000003.388829355.000000000589B000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000002.394701314.00000000058A2000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://semedacara.com.br/ava/a
Source: wscript.exe, 0000000A.00000003.388829355.000000000589B000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.380405706.000000000545A000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.382922576.000000000564F000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.381734544.0000000005502000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.391066699.00000000059A5000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.380726054.0000000005502000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.381193898.00000000054BF000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.389552765.00000000058D1000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.381193898.00000000054D6000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.381071407.0000000005518000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.391066699.00000000059A7000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.386373392.0000000005794000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.380565209.00000000054D6000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.384344893.000000000569B000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.380087000.0000000005498000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.385194824.00000000056D8000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.393045342.00000000056E6000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.380087000.000000000545A000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.381296278.0000000005577000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.385805896.000000000575C000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.378645005.0000000002DF1000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://semedacara.com.br/ava/ahhz/
Source: wscript.exe, 0000000A.00000003.392112546.0000000004FDB000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://semedacara.com.br/ava/ahhz/yM
Source: wscript.exe, 0000000A.00000003.388829355.000000000589B000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000002.394701314.00000000058A2000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://staging-demo.com/public_html/wT
Source: wscript.exe, wscript.exe, 0000000A.00000003.379175657.0000000005359000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.388681276.00000000055AA000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.388352589.00000000057EE000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.384898008.000000000561F000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.382616382.0000000005541000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.387365837.000000000579E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.389287393.0000000005904000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.379710983.0000000005345000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.381147538.0000000005534000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.383882868.000000000566D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.388670695.000000000576D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.393765942.00000000056CF000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.380261353.00000000054B3000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.379756871.0000000005359000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.376996553.0000000002DB5000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.379986129.00000000053BD000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.381405615.0000000005558000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.388829355.000000000589B000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.380405706.000000000545A000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.382922576.000000000564F000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://staging-demo.com/public_html/wTG/
Source: wscript.exe, 0000000A.00000003.392112546.0000000004FDB000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://staging-demo.com/public_html/wTG/xM
Source: wscript.exe, 0000000A.00000003.388829355.000000000589B000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000002.394701314.00000000058A2000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://uk-eurodom.co
Source: wscript.exe, wscript.exe, 0000000A.00000002.394746955.00000000058EE000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.379175657.0000000005359000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.388681276.00000000055AA000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.388352589.00000000057EE000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.384898008.000000000561F000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.382616382.0000000005541000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.387365837.000000000579E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.389287393.0000000005904000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.379710983.0000000005345000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000002.394765226.0000000005917000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.381147538.0000000005534000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.383882868.000000000566D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.388670695.000000000576D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.393765942.00000000056CF000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.380261353.00000000054B3000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.379756871.0000000005359000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.379986129.00000000053BD000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.381405615.0000000005558000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.388829355.000000000589B000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.380405706.000000000545A000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://uk-eurodom.com/bitrix/9HrzPY66D1F/
Source: wscript.exe, 0000000A.00000003.381296278.0000000005577000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.381439650.000000000557E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.382616382.000000000558C000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000002.394341142.000000000558C000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://uk-eurodom.com/bitrix/9HrzPY66D1F/24Q
Source: wscript.exe, 0000000A.00000003.388681276.00000000055AA000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.382444301.00000000055A3000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.386310650.00000000055A9000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.382820492.00000000055A3000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000002.394355887.00000000055AB000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.383863308.00000000055A3000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://www.polarkh-crewing.com/aboutu
Source: wscript.exe, wscript.exe, 0000000A.00000002.394746955.00000000058EE000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.379175657.0000000005359000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.388681276.00000000055AA000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.388352589.00000000057EE000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.384898008.000000000561F000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.382616382.0000000005541000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.387365837.000000000579E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.389287393.0000000005904000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.379710983.0000000005345000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.381147538.0000000005534000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.383882868.000000000566D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.388670695.000000000576D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.393765942.00000000056CF000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.380261353.00000000054B3000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.379756871.0000000005359000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.376996553.0000000002DB5000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.379986129.00000000053BD000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.381405615.0000000005558000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.388829355.000000000589B000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.380405706.000000000545A000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://www.polarkh-crewing.com/aboutus/EUzMzX7yXpP/
Source: wscript.exe, 0000000A.00000003.387365837.000000000579E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.386373392.0000000005794000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.385630751.000000000578C000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.387429953.00000000057B0000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000002.394545937.00000000057CA000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.387506954.00000000057C2000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: http://www.polarkh-crewing.com/aboutus/EUzMzX7yXpP/69ou
Source: regsvr32.exe, 0000000F.00000002.572181479.0000000000788000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://115.178.55.22:80/
Source: regsvr32.exe, 0000000F.00000002.572181479.0000000000788000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://115.178.55.22:80/l
Source: regsvr32.exe, 0000000F.00000002.572181479.0000000000788000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://115.178.55.22:80/tcbvserkm/kigv/rbwmds/
Source: regsvr32.exe, 0000000F.00000002.572181479.00000000007C3000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://115.178.55.22:80/tcbvserkm/kigv/rbwmds/0
Source: regsvr32.exe, 0000000F.00000002.572181479.00000000007C3000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://115.178.55.22:80/tcbvserkm/kigv/rbwmds/rw
Source: regsvr32.exe, 0000000F.00000002.572181479.00000000006EA000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://138.197.14.67:8080/
Source: regsvr32.exe, 0000000F.00000002.572181479.00000000006EA000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000F.00000002.572181479.0000000000762000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://138.197.14.67:8080/tcbvserkm/kigv/rbwmds/
Source: regsvr32.exe, 0000000F.00000002.572181479.00000000006EA000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://138.197.14.67:8080/tcbvserkm/kigv/rbwmds/a
Source: regsvr32.exe, 0000000F.00000002.572181479.0000000000788000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://193.194.92.175/
Source: regsvr32.exe, 0000000F.00000002.572181479.000000000073C000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://198.38.121.17/
Source: regsvr32.exe, 0000000F.00000002.572181479.0000000000788000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://218.38.121.17/
Source: regsvr32.exe, 0000000F.00000002.572181479.0000000000788000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000F.00000002.572181479.000000000077A000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://218.38.121.17/tcbvserkm/kigv/rbwmds/
Source: regsvr32.exe, 0000000F.00000002.572181479.00000000007C3000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://218.38.121.17/tcbvserkm/kigv/rbwmds/T(
Source: regsvr32.exe, 0000000F.00000002.572181479.0000000000788000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://218.38.121.17/tcbvserkm/kigv/rbwmds/wn
Source: regsvr32.exe, 0000000F.00000002.572181479.0000000000788000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://218.38.121.17:443/tcbvserkm/kigv/rbwmds/
Source: wscript.exe, 0000000A.00000003.388829355.000000000589B000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.380405706.000000000545A000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.382922576.000000000564F000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.381734544.0000000005502000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.391066699.00000000059A5000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.380726054.0000000005502000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.381193898.00000000054BF000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.389552765.00000000058D1000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.381193898.00000000054D6000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.381071407.0000000005518000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.391066699.00000000059A7000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.386373392.0000000005794000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.380565209.00000000054D6000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.384344893.000000000569B000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.380087000.0000000005498000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.385194824.00000000056D8000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.393045342.00000000056E6000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.380087000.000000000545A000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.381296278.0000000005577000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.385805896.000000000575C000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.378645005.0000000002DF1000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://4fly.su:443/search/OfGA/
Source: wscript.exe, 0000000A.00000003.379175657.0000000005359000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.379756871.00000000053A3000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.380055179.00000000053A3000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.379248511.0000000005397000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000002.394303780.00000000053A9000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://4fly.su:443/search/OfGA/ata
Source: wscript.exe, 0000000A.00000003.392112546.0000000004FDB000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://4fly.su:443/search/OfGA/wM
Source: regsvr32.exe, 0000000F.00000002.572181479.0000000000788000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://93.84.115.205:7080/T
Source: wscript.exe, 0000000A.00000003.388829355.000000000589B000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000002.394701314.00000000058A2000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://kts.group
Source: wscript.exe, wscript.exe, 0000000A.00000003.379175657.0000000005359000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.388681276.00000000055AA000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.388352589.00000000057EE000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.384898008.000000000561F000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.382616382.0000000005541000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.387365837.000000000579E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.389287393.0000000005904000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.379710983.0000000005345000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.381147538.0000000005534000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.383882868.000000000566D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.388670695.000000000576D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.393765942.00000000056CF000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.380261353.00000000054B3000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.379756871.0000000005359000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.376996553.0000000002DB5000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.379986129.00000000053BD000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.381405615.0000000005558000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.388829355.000000000589B000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.380405706.000000000545A000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.392433354.0000000003324000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://kts.group/35ccbf2003/jKgk8/
Source: wscript.exe, 0000000A.00000003.392112546.0000000004FDB000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://kts.group/35ccbf2003/jKgk8/uM
Source: wscript.exe, 0000000A.00000003.392888867.0000000004FD2000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.392584081.0000000004FB7000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000002.394237064.0000000004FD3000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.392354536.0000000004FB4000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.392777257.0000000004FCC000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.392625530.0000000004FBD000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.392754360.0000000004FC8000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.392789218.0000000004FCF000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://olgaperezporro.com
Source: wscript.exe, 0000000A.00000003.375930591.0000000005A12000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.393332313.0000000005A5E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000002.395019547.0000000005A20000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://olgaperezporro.com/
Source: wscript.exe, wscript.exe, 0000000A.00000003.379175657.0000000005359000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.388681276.00000000055AA000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.388352589.00000000057EE000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.393736917.0000000005A1F000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.384898008.000000000561F000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.382616382.0000000005541000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.387365837.000000000579E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.393578356.0000000005A02000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.389287393.0000000005904000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.379710983.0000000005345000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.381147538.0000000005534000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.383882868.000000000566D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.388670695.000000000576D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.393765942.00000000056CF000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.380261353.00000000054B3000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.379756871.0000000005359000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.376996553.0000000002DB5000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.379986129.00000000053BD000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.381405615.0000000005558000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.388829355.000000000589B000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://olgaperezporro.com/js/ExGBiCZdkkw0GBAuHNZ/
Source: wscript.exe, 0000000A.00000003.387365837.000000000579E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.386373392.0000000005794000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.385630751.000000000578C000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.387429953.00000000057B0000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000002.394545937.00000000057CA000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.387506954.00000000057C2000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://olgaperezporro.com/js/ExGBiCZdkkw0GBAuHNZ/6
Source: wscript.exe, 0000000A.00000003.387365837.000000000579E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.386373392.0000000005794000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.385630751.000000000578C000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.387429953.00000000057B0000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000002.394545937.00000000057CA000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.387506954.00000000057C2000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://olgaperezporro.com/js/ExGBiCZdkkw0GBAuHNZ/esqu
Source: wscript.exe, 0000000A.00000003.392112546.0000000004FDB000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://olgaperezporro.com/js/ExGBiCZdkkw0GBAuHNZ/vM
Source: wscript.exe, wscript.exe, 0000000A.00000002.394746955.00000000058EE000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.379175657.0000000005359000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.388681276.00000000055AA000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.388352589.00000000057EE000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.384898008.000000000561F000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.382616382.0000000005541000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.387365837.000000000579E000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.389287393.0000000005904000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.379710983.0000000005345000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000002.394765226.0000000005917000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.381147538.0000000005534000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.383882868.000000000566D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.388670695.000000000576D000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.393765942.00000000056CF000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.380261353.00000000054B3000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.379756871.0000000005359000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.379986129.00000000053BD000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.381405615.0000000005558000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.388829355.000000000589B000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.380405706.000000000545A000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://thailandcan.org/assets/ulRa/
Source: wscript.exe, 0000000A.00000003.388829355.000000000589B000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.388916629.00000000058A4000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000002.394717076.00000000058AB000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://thailandcan.org/assets/ulRa/P
Source: unknown DNS traffic detected: queries for: malli.su
Source: global traffic HTTP traffic detected: GET /35ccbf2003/jKgk8/ HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: kts.group
Source: global traffic HTTP traffic detected: GET /js/ExGBiCZdkkw0GBAuHNZ/ HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: olgaperezporro.com
Source: unknown HTTPS traffic detected: 31.31.196.93:443 -> 192.168.2.3:49702 version: TLS 1.2
Source: unknown HTTPS traffic detected: 40.115.116.248:443 -> 192.168.2.3:49703 version: TLS 1.2
Source: unknown HTTPS traffic detected: 218.38.121.17:443 -> 192.168.2.3:49710 version: TLS 1.2

E-Banking Fraud

barindex
Source: Yara match File source: 0000000F.00000002.572181479.00000000006EA000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 15.2.regsvr32.exe.2030000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 15.2.regsvr32.exe.2030000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 14.2.regsvr32.exe.e00000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 14.2.regsvr32.exe.e00000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 0000000F.00000002.573776336.0000000002030000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000F.00000002.573888713.0000000002061000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000E.00000002.373894564.0000000002601000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000E.00000002.373814331.0000000000E00000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
Source: 0000000A.00000003.386000568.0000000005771000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY Matched rule: WEBSHELL_asp_generic date = 2021-03-07, author = Arnim Rupp, description = Generic ASP webshell which uses any eval/exec function indirectly on user input or writes a file, score = a8c63c418609c1c291b3e731ca85ded4b3e0fba83f3489c21a3199173b176a75, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, modified = 2023-01-06
Source: 0000000A.00000003.393189517.0000000005915000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY Matched rule: webshell_asp_obfuscated date = 2021/01/12, author = Arnim Rupp, description = ASP webshell obfuscated, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, modified = 2023-01-06
Source: 0000000A.00000003.393189517.0000000005915000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY Matched rule: WEBSHELL_asp_generic date = 2021-03-07, author = Arnim Rupp, description = Generic ASP webshell which uses any eval/exec function indirectly on user input or writes a file, score = a8c63c418609c1c291b3e731ca85ded4b3e0fba83f3489c21a3199173b176a75, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, modified = 2023-01-06
Source: 0000000A.00000003.385846809.0000000005765000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY Matched rule: WEBSHELL_asp_generic date = 2021-03-07, author = Arnim Rupp, description = Generic ASP webshell which uses any eval/exec function indirectly on user input or writes a file, score = a8c63c418609c1c291b3e731ca85ded4b3e0fba83f3489c21a3199173b176a75, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, modified = 2023-01-06
Source: C:\Windows\System32\regsvr32.exe File created: C:\Windows\system32\JMgyzwrCUAZpIA\ Jump to behavior
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_0000000180020030 14_2_0000000180020030
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_0000000180040080 14_2_0000000180040080
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_00000001800202FC 14_2_00000001800202FC
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_00000001800463DC 14_2_00000001800463DC
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_0000000180008458 14_2_0000000180008458
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_0000000180048480 14_2_0000000180048480
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_000000018003C4D0 14_2_000000018003C4D0
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_000000018003A564 14_2_000000018003A564
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_00000001800205DC 14_2_00000001800205DC
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_000000018001E8A8 14_2_000000018001E8A8
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_000000018002E908 14_2_000000018002E908
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_000000018003C950 14_2_000000018003C950
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_000000018003696C 14_2_000000018003696C
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_000000018002E908 14_2_000000018002E908
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_0000000180030B24 14_2_0000000180030B24
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_000000018001EB24 14_2_000000018001EB24
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_000000018003ABF8 14_2_000000018003ABF8
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_0000000180042C2C 14_2_0000000180042C2C
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_0000000180036CC8 14_2_0000000180036CC8
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_000000018002ED44 14_2_000000018002ED44
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_000000018003ED8C 14_2_000000018003ED8C
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_000000018001EDB4 14_2_000000018001EDB4
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_0000000180030B24 14_2_0000000180030B24
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_000000018001F030 14_2_000000018001F030
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_000000018003D0E0 14_2_000000018003D0E0
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_000000018001F2AC 14_2_000000018001F2AC
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_0000000180011314 14_2_0000000180011314
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_000000018001F53C 14_2_000000018001F53C
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_000000018001F7B8 14_2_000000018001F7B8
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_000000018001FA84 14_2_000000018001FA84
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_0000000180041BE4 14_2_0000000180041BE4
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_000000018001FD64 14_2_000000018001FD64
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_000000018003BF60 14_2_000000018003BF60
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_00C00000 14_2_00C00000
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_0261708C 14_2_0261708C
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_0260F578 14_2_0260F578
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_0261F5E8 14_2_0261F5E8
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_026015AC 14_2_026015AC
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_02617B38 14_2_02617B38
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_026098C8 14_2_026098C8
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_02620880 14_2_02620880
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_0261AFF8 14_2_0261AFF8
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_02610C08 14_2_02610C08
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_02615264 14_2_02615264
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_02611244 14_2_02611244
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_02602210 14_2_02602210
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_026212E8 14_2_026212E8
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_02628368 14_2_02628368
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_0261F370 14_2_0261F370
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_0260B374 14_2_0260B374
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_0260A37C 14_2_0260A37C
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_0260134C 14_2_0260134C
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_0262234C 14_2_0262234C
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_02609320 14_2_02609320
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_02604308 14_2_02604308
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_02619318 14_2_02619318
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_026163E4 14_2_026163E4
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_026253EC 14_2_026253EC
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_026063C0 14_2_026063C0
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_0260C3DC 14_2_0260C3DC
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_026273A4 14_2_026273A4
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_02608388 14_2_02608388
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_02606040 14_2_02606040
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_0260A0C0 14_2_0260A0C0
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_026130CC 14_2_026130CC
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_0260D0D4 14_2_0260D0D4
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_026280A8 14_2_026280A8
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_0262308C 14_2_0262308C
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_0261C09C 14_2_0261C09C
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_0262612C 14_2_0262612C
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_02625108 14_2_02625108
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_0261911C 14_2_0261911C
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_026231AC 14_2_026231AC
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_0261E184 14_2_0261E184
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_02601194 14_2_02601194
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_02609198 14_2_02609198
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_0261866C 14_2_0261866C
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_02617674 14_2_02617674
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_02609634 14_2_02609634
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_02606618 14_2_02606618
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_0260A6C4 14_2_0260A6C4
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_026196C8 14_2_026196C8
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_026136D4 14_2_026136D4
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_0261E680 14_2_0261E680
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_02620680 14_2_02620680
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_026117C4 14_2_026117C4
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_026187D0 14_2_026187D0
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_02617788 14_2_02617788
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_02614790 14_2_02614790
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_0260B79C 14_2_0260B79C
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_026204F4 14_2_026204F4
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_026214C4 14_2_026214C4
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_026154A8 14_2_026154A8
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_02601480 14_2_02601480
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_02609490 14_2_02609490
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_02614498 14_2_02614498
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_02602564 14_2_02602564
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_02625564 14_2_02625564
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_0261D524 14_2_0261D524
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_026115C0 14_2_026115C0
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_0260A5A0 14_2_0260A5A0
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_026225B0 14_2_026225B0
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_02608590 14_2_02608590
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_02625A68 14_2_02625A68
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_02617A28 14_2_02617A28
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_0261CA28 14_2_0261CA28
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_02616A0C 14_2_02616A0C
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_0260EACC 14_2_0260EACC
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_02625B74 14_2_02625B74
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_02604B58 14_2_02604B58
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_0261CB5C 14_2_0261CB5C
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_0260CB2C 14_2_0260CB2C
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_02624B38 14_2_02624B38
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_0261BB00 14_2_0261BB00
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_02603BC0 14_2_02603BC0
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_02622BD8 14_2_02622BD8
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_02623BB8 14_2_02623BB8
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_0260E846 14_2_0260E846
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_0260C830 14_2_0260C830
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_02627838 14_2_02627838
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_026138D8 14_2_026138D8
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_026018A4 14_2_026018A4
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_026178A8 14_2_026178A8
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_0260E888 14_2_0260E888
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_02621888 14_2_02621888
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_02618970 14_2_02618970
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_0260D97C 14_2_0260D97C
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_02610944 14_2_02610944
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_02605920 14_2_02605920
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_0261B9E8 14_2_0261B9E8
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_026119CC 14_2_026119CC
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_026049D8 14_2_026049D8
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_0261E990 14_2_0261E990
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_02609E24 14_2_02609E24
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_02603E0C 14_2_02603E0C
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_0261AE14 14_2_0261AE14
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_0261FE14 14_2_0261FE14
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_02611E1C 14_2_02611E1C
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_0261EEE0 14_2_0261EEE0
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_02626F6C 14_2_02626F6C
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_02625F74 14_2_02625F74
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_0261FF40 14_2_0261FF40
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_02606F44 14_2_02606F44
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_02602F58 14_2_02602F58
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_02610F5C 14_2_02610F5C
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_02611F30 14_2_02611F30
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_0260CF34 14_2_0260CF34
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_02627F00 14_2_02627F00
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_02601FB0 14_2_02601FB0
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_02616F80 14_2_02616F80
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_02601C60 14_2_02601C60
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_02604C6C 14_2_02604C6C
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_0260BC6C 14_2_0260BC6C
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_0260BC5E 14_2_0260BC5E
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_02620C14 14_2_02620C14
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_02605CF4 14_2_02605CF4
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_0261ACCC 14_2_0261ACCC
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_0261FCD0 14_2_0261FCD0
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_02614CD0 14_2_02614CD0
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_02628CA0 14_2_02628CA0
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_02626C84 14_2_02626C84
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_0260CC90 14_2_0260CC90
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_02608D6C 14_2_02608D6C
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_02611D40 14_2_02611D40
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_02619D50 14_2_02619D50
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_0261BD30 14_2_0261BD30
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_02622D34 14_2_02622D34
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_02618D38 14_2_02618D38
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_02613DE0 14_2_02613DE0
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_0260CDD0 14_2_0260CDD0
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_02604D94 14_2_02604D94
Source: C:\Windows\System32\regsvr32.exe Code function: 15_2_00840000 15_2_00840000
Source: C:\Windows\System32\regsvr32.exe Code function: 15_2_02070C08 15_2_02070C08
Source: C:\Windows\System32\regsvr32.exe Code function: 15_2_0206F828 15_2_0206F828
Source: C:\Windows\System32\regsvr32.exe Code function: 15_2_0206745F 15_2_0206745F
Source: C:\Windows\System32\regsvr32.exe Code function: 15_2_02080880 15_2_02080880
Source: C:\Windows\System32\regsvr32.exe Code function: 15_2_0207708C 15_2_0207708C
Source: C:\Windows\System32\regsvr32.exe Code function: 15_2_020698C8 15_2_020698C8
Source: C:\Windows\System32\regsvr32.exe Code function: 15_2_02077B38 15_2_02077B38
Source: C:\Windows\System32\regsvr32.exe Code function: 15_2_02066947 15_2_02066947
Source: C:\Windows\System32\regsvr32.exe Code function: 15_2_02062F58 15_2_02062F58
Source: C:\Windows\System32\regsvr32.exe Code function: 15_2_02085F74 15_2_02085F74
Source: C:\Windows\System32\regsvr32.exe Code function: 15_2_02075778 15_2_02075778
Source: C:\Windows\System32\regsvr32.exe Code function: 15_2_020833B4 15_2_020833B4
Source: C:\Windows\System32\regsvr32.exe Code function: 15_2_0207F5E8 15_2_0207F5E8
Source: C:\Windows\System32\regsvr32.exe Code function: 15_2_02063E0C 15_2_02063E0C
Source: C:\Windows\System32\regsvr32.exe Code function: 15_2_02076A0C 15_2_02076A0C
Source: C:\Windows\System32\regsvr32.exe Code function: 15_2_0207AE14 15_2_0207AE14
Source: C:\Windows\System32\regsvr32.exe Code function: 15_2_0207FE14 15_2_0207FE14
Source: C:\Windows\System32\regsvr32.exe Code function: 15_2_02062210 15_2_02062210
Source: C:\Windows\System32\regsvr32.exe Code function: 15_2_02071E1C 15_2_02071E1C
Source: C:\Windows\System32\regsvr32.exe Code function: 15_2_02080C14 15_2_02080C14
Source: C:\Windows\System32\regsvr32.exe Code function: 15_2_02066618 15_2_02066618
Source: C:\Windows\System32\regsvr32.exe Code function: 15_2_02069E24 15_2_02069E24
Source: C:\Windows\System32\regsvr32.exe Code function: 15_2_02077A28 15_2_02077A28
Source: C:\Windows\System32\regsvr32.exe Code function: 15_2_0207CA28 15_2_0207CA28
Source: C:\Windows\System32\regsvr32.exe Code function: 15_2_02087838 15_2_02087838
Source: C:\Windows\System32\regsvr32.exe Code function: 15_2_02069634 15_2_02069634
Source: C:\Windows\System32\regsvr32.exe Code function: 15_2_0208823C 15_2_0208823C
Source: C:\Windows\System32\regsvr32.exe Code function: 15_2_0206C830 15_2_0206C830
Source: C:\Windows\System32\regsvr32.exe Code function: 15_2_0206E846 15_2_0206E846
Source: C:\Windows\System32\regsvr32.exe Code function: 15_2_02071244 15_2_02071244
Source: C:\Windows\System32\regsvr32.exe Code function: 15_2_02066040 15_2_02066040
Source: C:\Windows\System32\regsvr32.exe Code function: 15_2_02085A68 15_2_02085A68
Source: C:\Windows\System32\regsvr32.exe Code function: 15_2_02075264 15_2_02075264
Source: C:\Windows\System32\regsvr32.exe Code function: 15_2_02061C60 15_2_02061C60
Source: C:\Windows\System32\regsvr32.exe Code function: 15_2_02064C6C 15_2_02064C6C
Source: C:\Windows\System32\regsvr32.exe Code function: 15_2_0206BC6C 15_2_0206BC6C
Source: C:\Windows\System32\regsvr32.exe Code function: 15_2_0207866C 15_2_0207866C
Source: C:\Windows\System32\regsvr32.exe Code function: 15_2_02077674 15_2_02077674
Source: C:\Windows\System32\regsvr32.exe Code function: 15_2_02081888 15_2_02081888
Source: C:\Windows\System32\regsvr32.exe Code function: 15_2_0208308C 15_2_0208308C
Source: C:\Windows\System32\regsvr32.exe Code function: 15_2_02061480 15_2_02061480
Source: C:\Windows\System32\regsvr32.exe Code function: 15_2_0207E680 15_2_0207E680
Source: C:\Windows\System32\regsvr32.exe Code function: 15_2_02080680 15_2_02080680
Source: C:\Windows\System32\regsvr32.exe Code function: 15_2_02086C84 15_2_02086C84
Source: C:\Windows\System32\regsvr32.exe Code function: 15_2_0206E888 15_2_0206E888
Source: C:\Windows\System32\regsvr32.exe Code function: 15_2_02069490 15_2_02069490
Source: C:\Windows\System32\regsvr32.exe Code function: 15_2_0206CC90 15_2_0206CC90
Source: C:\Windows\System32\regsvr32.exe Code function: 15_2_0207C09C 15_2_0207C09C
Source: C:\Windows\System32\regsvr32.exe Code function: 15_2_02074498 15_2_02074498
Source: C:\Windows\System32\regsvr32.exe Code function: 15_2_020880A8 15_2_020880A8
Source: C:\Windows\System32\regsvr32.exe Code function: 15_2_020618A4 15_2_020618A4
Source: C:\Windows\System32\regsvr32.exe Code function: 15_2_02088CA0 15_2_02088CA0
Source: C:\Windows\System32\regsvr32.exe Code function: 15_2_020868A4 15_2_020868A4
Source: C:\Windows\System32\regsvr32.exe Code function: 15_2_020754A8 15_2_020754A8
Source: C:\Windows\System32\regsvr32.exe Code function: 15_2_020778A8 15_2_020778A8
Source: C:\Windows\System32\regsvr32.exe Code function: 15_2_0206A6C4 15_2_0206A6C4
Source: C:\Windows\System32\regsvr32.exe Code function: 15_2_0206A0C0 15_2_0206A0C0
Source: C:\Windows\System32\regsvr32.exe Code function: 15_2_0206EACC 15_2_0206EACC
Source: C:\Windows\System32\regsvr32.exe Code function: 15_2_020730CC 15_2_020730CC
Source: C:\Windows\System32\regsvr32.exe Code function: 15_2_0207ACCC 15_2_0207ACCC
Source: C:\Windows\System32\regsvr32.exe Code function: 15_2_020814C4 15_2_020814C4
Source: C:\Windows\System32\regsvr32.exe Code function: 15_2_020796C8 15_2_020796C8
Source: C:\Windows\System32\regsvr32.exe Code function: 15_2_0206D0D4 15_2_0206D0D4
Source: C:\Windows\System32\regsvr32.exe Code function: 15_2_020736D4 15_2_020736D4
Source: C:\Windows\System32\regsvr32.exe Code function: 15_2_0207FCD0 15_2_0207FCD0
Source: C:\Windows\System32\regsvr32.exe Code function: 15_2_02074CD0 15_2_02074CD0
Source: C:\Windows\System32\regsvr32.exe Code function: 15_2_020738D8 15_2_020738D8
Source: C:\Windows\System32\regsvr32.exe Code function: 15_2_020812E8 15_2_020812E8
Source: C:\Windows\System32\regsvr32.exe Code function: 15_2_0207EEE0 15_2_0207EEE0
Source: C:\Windows\System32\regsvr32.exe Code function: 15_2_02065CF4 15_2_02065CF4
Source: C:\Windows\System32\regsvr32.exe Code function: 15_2_020804F4 15_2_020804F4
Source: C:\Windows\System32\regsvr32.exe Code function: 15_2_02085108 15_2_02085108
Source: C:\Windows\System32\regsvr32.exe Code function: 15_2_0207BB00 15_2_0207BB00
Source: C:\Windows\System32\regsvr32.exe Code function: 15_2_02087F00 15_2_02087F00
Source: C:\Windows\System32\regsvr32.exe Code function: 15_2_02088B00 15_2_02088B00
Source: C:\Windows\System32\regsvr32.exe Code function: 15_2_02064308 15_2_02064308
Source: C:\Windows\System32\regsvr32.exe Code function: 15_2_0207911C 15_2_0207911C
Source: C:\Windows\System32\regsvr32.exe Code function: 15_2_02079318 15_2_02079318
Source: C:\Windows\System32\regsvr32.exe Code function: 15_2_0207D524 15_2_0207D524
Source: C:\Windows\System32\regsvr32.exe Code function: 15_2_0208612C 15_2_0208612C
Source: C:\Windows\System32\regsvr32.exe Code function: 15_2_02065920 15_2_02065920
Source: C:\Windows\System32\regsvr32.exe Code function: 15_2_02069320 15_2_02069320
Source: C:\Windows\System32\regsvr32.exe Code function: 15_2_0206CB2C 15_2_0206CB2C
Source: C:\Windows\System32\regsvr32.exe Code function: 15_2_0206CF34 15_2_0206CF34
Source: C:\Windows\System32\regsvr32.exe Code function: 15_2_0207BD30 15_2_0207BD30
Source: C:\Windows\System32\regsvr32.exe Code function: 15_2_02071F30 15_2_02071F30
Source: C:\Windows\System32\regsvr32.exe Code function: 15_2_02082D34 15_2_02082D34
Source: C:\Windows\System32\regsvr32.exe Code function: 15_2_02078D38 15_2_02078D38
Source: C:\Windows\System32\regsvr32.exe Code function: 15_2_02066F44 15_2_02066F44
Source: C:\Windows\System32\regsvr32.exe Code function: 15_2_02070944 15_2_02070944
Source: C:\Windows\System32\regsvr32.exe Code function: 15_2_0208234C 15_2_0208234C
Source: C:\Windows\System32\regsvr32.exe Code function: 15_2_0207FF40 15_2_0207FF40
Source: C:\Windows\System32\regsvr32.exe Code function: 15_2_02071D40 15_2_02071D40
Source: C:\Windows\System32\regsvr32.exe Code function: 15_2_0206134C 15_2_0206134C
Source: C:\Windows\System32\regsvr32.exe Code function: 15_2_02079D50 15_2_02079D50
Source: C:\Windows\System32\regsvr32.exe Code function: 15_2_0207CB5C 15_2_0207CB5C
Source: C:\Windows\System32\regsvr32.exe Code function: 15_2_02070F5C 15_2_02070F5C
Source: C:\Windows\System32\regsvr32.exe Code function: 15_2_02064B58 15_2_02064B58
Source: C:\Windows\System32\regsvr32.exe Code function: 15_2_02088368 15_2_02088368
Source: C:\Windows\System32\regsvr32.exe Code function: 15_2_02062564 15_2_02062564
Source: C:\Windows\System32\regsvr32.exe Code function: 15_2_02086F6C 15_2_02086F6C
Source: C:\Windows\System32\regsvr32.exe Code function: 15_2_02068D6C 15_2_02068D6C
Source: C:\Windows\System32\regsvr32.exe Code function: 15_2_02085564 15_2_02085564
Source: C:\Windows\System32\regsvr32.exe Code function: 15_2_0206B374 15_2_0206B374
Source: C:\Windows\System32\regsvr32.exe Code function: 15_2_02078970 15_2_02078970
Source: C:\Windows\System32\regsvr32.exe Code function: 15_2_0207F370 15_2_0207F370
Source: C:\Windows\System32\regsvr32.exe Code function: 15_2_0206697C 15_2_0206697C
Source: C:\Windows\System32\regsvr32.exe Code function: 15_2_0206A37C 15_2_0206A37C
Source: C:\Windows\System32\regsvr32.exe Code function: 15_2_0206D97C 15_2_0206D97C
Source: C:\Windows\System32\regsvr32.exe Code function: 15_2_02085B74 15_2_02085B74
Source: C:\Windows\System32\regsvr32.exe Code function: 15_2_0206F578 15_2_0206F578
Source: C:\Windows\System32\regsvr32.exe Code function: 15_2_0207E184 15_2_0207E184
Source: C:\Windows\System32\regsvr32.exe Code function: 15_2_02076F80 15_2_02076F80
Source: C:\Windows\System32\regsvr32.exe Code function: 15_2_02068388 15_2_02068388
Source: C:\Windows\System32\regsvr32.exe Code function: 15_2_02077788 15_2_02077788
Source: C:\Windows\System32\regsvr32.exe Code function: 15_2_02061194 15_2_02061194
Source: C:\Windows\System32\regsvr32.exe Code function: 15_2_02064D94 15_2_02064D94
Source: C:\Windows\System32\regsvr32.exe Code function: 15_2_02068590 15_2_02068590
Source: C:\Windows\System32\regsvr32.exe Code function: 15_2_02074790 15_2_02074790
Source: C:\Windows\System32\regsvr32.exe Code function: 15_2_0207E990 15_2_0207E990
Source: C:\Windows\System32\regsvr32.exe Code function: 15_2_0206B79C 15_2_0206B79C
Source: C:\Windows\System32\regsvr32.exe Code function: 15_2_02069198 15_2_02069198
Source: C:\Windows\System32\regsvr32.exe Code function: 15_2_020831AC 15_2_020831AC
Source: C:\Windows\System32\regsvr32.exe Code function: 15_2_0206A5A0 15_2_0206A5A0
Source: C:\Windows\System32\regsvr32.exe Code function: 15_2_020615AC 15_2_020615AC
Source: C:\Windows\System32\regsvr32.exe Code function: 15_2_020873A4 15_2_020873A4
Source: C:\Windows\System32\regsvr32.exe Code function: 15_2_02083BB8 15_2_02083BB8
Source: C:\Windows\System32\regsvr32.exe Code function: 15_2_02061FB0 15_2_02061FB0
Source: C:\Windows\System32\regsvr32.exe Code function: 15_2_020825B0 15_2_020825B0
Source: C:\Windows\System32\regsvr32.exe Code function: 15_2_020717C4 15_2_020717C4
Source: C:\Windows\System32\regsvr32.exe Code function: 15_2_02063BC0 15_2_02063BC0
Source: C:\Windows\System32\regsvr32.exe Code function: 15_2_020663C0 15_2_020663C0
Source: C:\Windows\System32\regsvr32.exe Code function: 15_2_020715C0 15_2_020715C0
Source: C:\Windows\System32\regsvr32.exe Code function: 15_2_020719CC 15_2_020719CC
Source: C:\Windows\System32\regsvr32.exe Code function: 15_2_02082BD8 15_2_02082BD8
Source: C:\Windows\System32\regsvr32.exe Code function: 15_2_0206CDD0 15_2_0206CDD0
Source: C:\Windows\System32\regsvr32.exe Code function: 15_2_020787D0 15_2_020787D0
Source: C:\Windows\System32\regsvr32.exe Code function: 15_2_0206C3DC 15_2_0206C3DC
Source: C:\Windows\System32\regsvr32.exe Code function: 15_2_020649D8 15_2_020649D8
Source: C:\Windows\System32\regsvr32.exe Code function: 15_2_020763E4 15_2_020763E4
Source: C:\Windows\System32\regsvr32.exe Code function: 15_2_020853EC 15_2_020853EC
Source: C:\Windows\System32\regsvr32.exe Code function: 15_2_02073DE0 15_2_02073DE0
Source: C:\Windows\System32\regsvr32.exe Code function: 15_2_0207B9E8 15_2_0207B9E8
Source: C:\Windows\System32\regsvr32.exe Code function: 15_2_0207AFF8 15_2_0207AFF8
Source: C:\Windows\System32\regsvr32.exe Code function: String function: 000000018002CDF4 appears 36 times
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_0000000180048CF0 ZwOpenSymbolicLinkObject,ZwOpenSymbolicLinkObject,RtlQueueApcWow64Thread,NtTestAlert,ExitProcess, 14_2_0000000180048CF0
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_0000000180048DE0 LdrFindResource_U,LdrAccessResource,atoi,NtAllocateVirtualMemory, 14_2_0000000180048DE0
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_0000000180048F20 ZwOpenSymbolicLinkObject,ZwOpenSymbolicLinkObject, 14_2_0000000180048F20
Source: C:\Windows\SysWOW64\regsvr32.exe Section loaded: sfc.dll Jump to behavior
Source: C:\Windows\System32\regsvr32.exe Section loaded: sfc.dll Jump to behavior
Source: C:\Windows\System32\regsvr32.exe Section loaded: sfc.dll Jump to behavior
Source: malware.one ReversingLabs: Detection: 28%
Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE Key opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\SystemCertificates\CA Jump to behavior
Source: unknown Process created: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE" "C:\Users\user\Desktop\malware.one
Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE Process created: C:\Windows\SysWOW64\wscript.exe C:\Windows\System32\WScript.exe "C:\Users\user\AppData\Local\Temp\click.wsf"
Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE Process created: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTEM.EXE /tsr
Source: unknown Process created: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTEM.EXE "C:\Program Files (x86)\Microsoft Office\Office16\ONENOTEM.EXE" /tsr
Source: C:\Windows\SysWOW64\wscript.exe Process created: C:\Windows\SysWOW64\regsvr32.exe C:\Windows\System32\regsvr32.exe" "C:\Users\user\AppData\Local\Temp\rad66B18.tmp.dll
Source: C:\Windows\SysWOW64\regsvr32.exe Process created: C:\Windows\System32\regsvr32.exe "C:\Users\user\AppData\Local\Temp\rad66B18.tmp.dll"
Source: C:\Windows\System32\regsvr32.exe Process created: C:\Windows\System32\regsvr32.exe C:\Windows\system32\regsvr32.exe "C:\Windows\system32\JMgyzwrCUAZpIA\OfEg.dll"
Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE Process created: C:\Windows\SysWOW64\wscript.exe C:\Windows\System32\WScript.exe "C:\Users\user\AppData\Local\Temp\click.wsf" Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE Process created: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTEM.EXE /tsr Jump to behavior
Source: C:\Windows\SysWOW64\wscript.exe Process created: C:\Windows\SysWOW64\regsvr32.exe C:\Windows\System32\regsvr32.exe" "C:\Users\user\AppData\Local\Temp\rad66B18.tmp.dll Jump to behavior
Source: C:\Windows\SysWOW64\regsvr32.exe Process created: C:\Windows\System32\regsvr32.exe "C:\Users\user\AppData\Local\Temp\rad66B18.tmp.dll" Jump to behavior
Source: C:\Windows\System32\regsvr32.exe Process created: C:\Windows\System32\regsvr32.exe C:\Windows\system32\regsvr32.exe "C:\Windows\system32\JMgyzwrCUAZpIA\OfEg.dll" Jump to behavior
Source: C:\Windows\SysWOW64\wscript.exe Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{06290BD0-48AA-11D2-8432-006008C3FBFC}\InprocServer32 Jump to behavior
Source: Send to OneNote.lnk.0.dr LNK file: ..\..\..\..\..\..\..\..\..\Program Files (x86)\Microsoft Office\Office16\ONENOTEM.EXE
Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE File created: C:\Users\user\Documents\{1EAA3540-8CC4-4BDA-8352-7C887469FFAC} Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE File created: C:\Users\user\AppData\Local\Temp\{139C41D2-9C6B-4FD2-B347-E0B7E41E4B18} - OProcSessId.dat Jump to behavior
Source: classification engine Classification label: mal100.troj.expl.evad.winONE@12/696@3/43
Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE File read: C:\Program Files (x86)\desktop.ini Jump to behavior
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_026098C8 FindCloseChangeNotification,Process32FirstW,CreateToolhelp32Snapshot, 14_2_026098C8
Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTEM.EXE Mutant created: \Sessions\1\BaseNamedObjects\OneNoteM:AppShared
Source: C:\Windows\SysWOW64\wscript.exe File read: C:\Windows\System32\drivers\etc\hosts Jump to behavior
Source: C:\Windows\SysWOW64\wscript.exe File read: C:\Windows\System32\drivers\etc\hosts Jump to behavior
Source: C:\Windows\System32\regsvr32.exe File read: C:\Windows\System32\drivers\etc\hosts Jump to behavior
Source: Window Recorder Window detected: More than 3 window changes detected
Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE Key opened: HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages Jump to behavior
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_00C00F21 push eax; iretd 14_2_00C00F22
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_0261066D push ebp; iretd 14_2_0261066E
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_02623517 push eax; iretd 14_2_0262351B
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_0260E5FA push esi; iretd 14_2_0260E5FB
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_026235B5 push eax; retf 0000h 14_2_026235B9
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_0260FAD7 push ebp; ret 14_2_0260FAD8
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_02623B1E push eax; ret 14_2_02623B1F
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_02615F5A push ebp; iretd 14_2_02615F5B
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_0260FFFE push ebp; retf 14_2_0260FFFF
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_0260FD5D push C128DDF7h; ret 14_2_0260FD62
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_02607DA1 push ecx; retf 14_2_02607DA8
Source: C:\Windows\System32\regsvr32.exe Code function: 15_2_00840F21 push eax; iretd 15_2_00840F22
Source: C:\Windows\System32\regsvr32.exe Code function: 15_2_0206E5FA push esi; iretd 15_2_0206E5FB
Source: C:\Windows\SysWOW64\wscript.exe Process created: C:\Windows\SysWOW64\regsvr32.exe C:\Windows\System32\regsvr32.exe" "C:\Users\user\AppData\Local\Temp\rad66B18.tmp.dll
Source: C:\Windows\SysWOW64\wscript.exe File created: C:\Users\user\AppData\Local\Temp\rad66B18.tmp.dll Jump to dropped file
Source: C:\Windows\System32\regsvr32.exe File created: C:\Windows\System32\JMgyzwrCUAZpIA\OfEg.dll (copy) Jump to dropped file
Source: C:\Windows\System32\regsvr32.exe File created: C:\Windows\System32\JMgyzwrCUAZpIA\OfEg.dll (copy) Jump to dropped file
Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE File created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Send to OneNote.lnk Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE File created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Send to OneNote.lnk Jump to behavior

Hooking and other Techniques for Hiding and Protection

barindex
Source: C:\Windows\System32\regsvr32.exe File opened: C:\Windows\system32\JMgyzwrCUAZpIA\OfEg.dll:Zone.Identifier read attributes | delete Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTE.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\wscript.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\wscript.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\wscript.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files (x86)\Microsoft Office\Office16\ONENOTEM.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\wscript.exe TID: 2388 Thread sleep time: -30000s >= -30000s Jump to behavior
Source: C:\Windows\System32\regsvr32.exe TID: 1952 Thread sleep time: -120000s >= -30000s Jump to behavior
Source: C:\Windows\System32\regsvr32.exe API coverage: 8.0 %
Source: C:\Windows\SysWOW64\wscript.exe Window found: window name: WSH-Timer Jump to behavior
Source: C:\Windows\System32\regsvr32.exe Process information queried: ProcessInformation Jump to behavior
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_000000018002ED44 memset,FindFirstFileExA, 14_2_000000018002ED44
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_000000018002F114 memset,FindFirstFileExW,FindClose,FindNextFileW, 14_2_000000018002F114
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_000000018002F2C4 FindFirstFileExA, 14_2_000000018002F2C4
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_000000018002F2F0 FindFirstFileExW, 14_2_000000018002F2F0
Source: C:\Windows\System32\regsvr32.exe File Volume queried: C:\ FullSizeInformation Jump to behavior
Source: wscript.exe, 0000000A.00000003.365300906.00000000067D0000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.363410044.0000000005A73000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.365708406.00000000067DD000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.391640204.0000000006904000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.365546187.00000000067D2000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.365393503.0000000006867000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.365227368.0000000006860000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.365163750.00000000067D1000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.365478196.00000000068FA000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.365631758.0000000006867000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000E.00000002.374302852.000000018004A000.00000002.00000001.01000000.0000000A.sdmp Binary or memory string: MTGestures.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
Source: wscript.exe, 0000000A.00000003.393578356.0000000005A12000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.375930591.0000000005A12000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000002.394983782.0000000005A12000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000F.00000002.572181479.000000000072D000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000F.00000002.572181479.000000000077A000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V RAW
Source: wscript.exe, 0000000A.00000003.375930591.0000000005A64000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000002.395053887.0000000005A64000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.393332313.0000000005A64000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: MTGestures.dllAFxNCNDhpJUjLGSUBdyJAlirWAPgLpQbnGOFgAaVQghYMoDvlcIkoDhwOzmAbGiqsZapYXQEJBQNrWjAcIMOdUMWKfNaHjlQaJhaKDTvvAjmdNJiPaRsRtAqadcjQnlCAvvAmhroJJBvgsvkBdxxRGsBgAFcJiBlIVCeEMUhTYUniUkHlJscBBleGyOkIaepldUiBoepXZDDjhOrSbcuQncJBBpzeaEnGaBwCjRpCFIstcxCJsqCnAMpjCNPpdSVcuSzviIZhvCWSTfhZCOOXnQoQSaTGSpWIAaSzoCSUruSgGDFRVUvVHcTuCTCQAClHYzuiPWfwqyQYVCeHgsCxOuoDTDrPCpbkGyHjPVYKKbevwuabtfosDIczDdVVlDDXtcAMkZFBDahoeOjCyDdmfNyLzGBEZdhjuVaLnGLACDllRegisterServerEDirxlezljynQMbEJrkYuGqWKJxcbkEWFxWujEOCBExEDvmpuiTSdISaFTJpbnDERdHSxbrluXBmlgEWqRXzEYZJPwDvIiOCEbquiojgkxAHEjCrzKFSJZHjqXtVCcouBFmgnZSsFwGMzFvmlRhqfdgYjGEakZdngEgkQEMUwGIucseXHMrRrXPFeKwGNoduqRICMxxYLScjzRRGTdkEFQtZIyifVPtMwGUUIOYFVBkCRKKGPMGabGyYGlmIPNFEUxGfzccoGbGvtGqxGeRkjCFWGrnXAGGsRUyGCvRhXYbBNdoXgMoDGyQSbTrVGUQXgOfZOvlwGGJOZHCaLEQxCPhokiggZcHETlXzHRQNzHLCNHYjXYHbOXELXYCISKZiApGwwqfPxyvDEIcSKMpKalYoTBtNCIprhqRmUjfLjdAvaVSyhIsZFDjJYWWGraQqQsCIojuoPIItCdjvWTgdRQjq
Source: wscript.exe, 0000000A.00000003.365300906.00000000067D0000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.363410044.0000000005A73000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.365708406.00000000067DD000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.391640204.0000000006904000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.375930591.0000000005A64000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.365546187.00000000067D2000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.365393503.0000000006867000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.365227368.0000000006860000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000002.395053887.0000000005A64000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.365163750.00000000067D1000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.393332313.0000000005A64000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: GEakZdngEgkQEMUw
Source: wscript.exe, 0000000A.00000003.379175657.0000000005359000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.379756871.00000000053A3000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.380055179.00000000053A3000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000003.379248511.0000000005397000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 0000000A.00000002.394303780.00000000053A9000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V RAW`
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_000000018002E2B0 memset,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, 14_2_000000018002E2B0
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_00000001800315BC GetProcessHeap, 14_2_00000001800315BC
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_0000000180048DE0 LdrFindResource_U,LdrAccessResource,atoi,NtAllocateVirtualMemory, 14_2_0000000180048DE0
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_0000000180002108 SetUnhandledExceptionFilter, 14_2_0000000180002108
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_000000018002E2B0 memset,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, 14_2_000000018002E2B0
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_00000001800019D4 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, 14_2_00000001800019D4
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_0000000180001F20 IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, 14_2_0000000180001F20

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Windows\System32\regsvr32.exe Network Connect: 115.178.55.22 80 Jump to behavior
Source: C:\Windows\System32\regsvr32.exe Network Connect: 193.194.92.175 443 Jump to behavior
Source: C:\Windows\System32\regsvr32.exe Network Connect: 93.84.115.205 7080 Jump to behavior
Source: C:\Windows\SysWOW64\wscript.exe Network Connect: 195.2.88.86 80 Jump to behavior
Source: C:\Windows\SysWOW64\wscript.exe Network Connect: 31.31.196.93 443 Jump to behavior
Source: C:\Windows\SysWOW64\wscript.exe Domain query: olgaperezporro.com
Source: C:\Windows\SysWOW64\wscript.exe Network Connect: 40.115.116.248 443 Jump to behavior
Source: C:\Windows\System32\regsvr32.exe Network Connect: 218.38.121.17 443 Jump to behavior
Source: C:\Windows\SysWOW64\wscript.exe Domain query: malli.su
Source: C:\Windows\SysWOW64\wscript.exe Domain query: kts.group
Source: C:\Windows\System32\regsvr32.exe Network Connect: 138.197.14.67 8080 Jump to behavior
Source: C:\Windows\SysWOW64\wscript.exe Process created: C:\Windows\SysWOW64\regsvr32.exe C:\Windows\System32\regsvr32.exe" "C:\Users\user\AppData\Local\Temp\rad66B18.tmp.dll Jump to behavior
Source: C:\Windows\System32\regsvr32.exe Queries volume information: C:\ VolumeInformation Jump to behavior
Source: C:\Windows\System32\regsvr32.exe Code function: EnumSystemLocalesW, 14_2_000000018002C718
Source: C:\Windows\System32\regsvr32.exe Code function: TranslateName,TranslateName,IsValidCodePage,wcschr,wcschr,GetLocaleInfoW, 14_2_0000000180040750
Source: C:\Windows\System32\regsvr32.exe Code function: EnumSystemLocalesW, 14_2_000000018002C838
Source: C:\Windows\System32\regsvr32.exe Code function: EnumSystemLocalesW, 14_2_000000018002C8A8
Source: C:\Windows\System32\regsvr32.exe Code function: EnumSystemLocalesW, 14_2_0000000180040A5C
Source: C:\Windows\System32\regsvr32.exe Code function: EnumSystemLocalesW, 14_2_0000000180040AE0
Source: C:\Windows\System32\regsvr32.exe Code function: EnumSystemLocalesW, 14_2_0000000180040BB0
Source: C:\Windows\System32\regsvr32.exe Code function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW, 14_2_0000000180040C70
Source: C:\Windows\System32\regsvr32.exe Code function: GetLocaleInfoW, 14_2_0000000180040EB4
Source: C:\Windows\System32\regsvr32.exe Code function: GetLocaleInfoW,GetLocaleInfoW,GetACP, 14_2_0000000180041000
Source: C:\Windows\System32\regsvr32.exe Code function: GetLocaleInfoW, 14_2_00000001800410D8
Source: C:\Windows\System32\regsvr32.exe Code function: EnumSystemLocalesW,GetUserDefaultLCID,ProcessCodePage,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW, 14_2_0000000180041210
Source: C:\Windows\System32\regsvr32.exe Code function: GetLocaleInfoW, 14_2_000000018002D69C
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_00000001800455F0 cpuid 14_2_00000001800455F0
Source: C:\Windows\SysWOW64\wscript.exe Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid Jump to behavior
Source: C:\Windows\System32\regsvr32.exe Code function: 14_2_000000018000217C GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter, 14_2_000000018000217C

Stealing of Sensitive Information

barindex
Source: Yara match File source: malware.one, type: SAMPLE
Source: Yara match File source: C:\Users\user\Desktop\malware.one, type: DROPPED
Source: Yara match File source: 0000000F.00000002.572181479.00000000006EA000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 15.2.regsvr32.exe.2030000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 15.2.regsvr32.exe.2030000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 14.2.regsvr32.exe.e00000.0.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 14.2.regsvr32.exe.e00000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 0000000F.00000002.573776336.0000000002030000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000F.00000002.573888713.0000000002061000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000E.00000002.373894564.0000000002601000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 0000000E.00000002.373814331.0000000000E00000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY

Remote Access Functionality

barindex
Source: Yara match File source: malware.one, type: SAMPLE
Source: Yara match File source: C:\Users\user\Desktop\malware.one, type: DROPPED
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs