Analysis
-
max time kernel
110s -
max time network
132s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
21/04/2023, 05:02
Static task
static1
Behavioral task
behavioral1
Sample
8737f97e795a928c9a00a630158951d587b132471ff711ed0e62b919b9d4b4b8.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
8737f97e795a928c9a00a630158951d587b132471ff711ed0e62b919b9d4b4b8.exe
Resource
win10v2004-20230221-en
General
-
Target
8737f97e795a928c9a00a630158951d587b132471ff711ed0e62b919b9d4b4b8.exe
-
Size
2.5MB
-
MD5
86d7b0c2265e1ed2f1408c0931c6daff
-
SHA1
67dff0c0e64f3ae80a02237b53b30f9b6c586de0
-
SHA256
8737f97e795a928c9a00a630158951d587b132471ff711ed0e62b919b9d4b4b8
-
SHA512
9e7a3e1933a623d39bdf0930d7fe53684efedc7cabab4d79863085e1e942a2e126dba51af9f7645ba63b093cf97e9022302fc1a0083379d6180aec780c14c034
-
SSDEEP
24576:7qdLVhwI+W9cqMAGn9YJet2VA8nUxpqIwXX3dYBBe5GnySF3PX0Fw0z:74LVhwI+wcqMAGn9YYAVA8HX0nLdPX07
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 5928 regsvr32.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\u2ftext.dll 8737f97e795a928c9a00a630158951d587b132471ff711ed0e62b919b9d4b4b8.exe File opened for modification C:\Windows\SysWOW64\NT88.dll 8737f97e795a928c9a00a630158951d587b132471ff711ed0e62b919b9d4b4b8.exe File opened for modification C:\Windows\SysWOW64\MSMAPI32.OCX 8737f97e795a928c9a00a630158951d587b132471ff711ed0e62b919b9d4b4b8.exe File opened for modification C:\Windows\SysWOW64\SYSINFO.OCX 8737f97e795a928c9a00a630158951d587b132471ff711ed0e62b919b9d4b4b8.exe File opened for modification C:\Windows\SysWOW64\DATLSCHS.dll 8737f97e795a928c9a00a630158951d587b132471ff711ed0e62b919b9d4b4b8.exe File opened for modification C:\Windows\SysWOW64\MSDATLST.OCX 8737f97e795a928c9a00a630158951d587b132471ff711ed0e62b919b9d4b4b8.exe File opened for modification C:\Windows\SysWOW64\PCCLPCHS.dll 8737f97e795a928c9a00a630158951d587b132471ff711ed0e62b919b9d4b4b8.exe File opened for modification C:\Windows\SysWOW64\QRCodeFont.dll 8737f97e795a928c9a00a630158951d587b132471ff711ed0e62b919b9d4b4b8.exe File opened for modification C:\Windows\SysWOW64\GAPI32.dll 8737f97e795a928c9a00a630158951d587b132471ff711ed0e62b919b9d4b4b8.exe File opened for modification C:\Windows\SysWOW64\MSCC2CHS.dll 8737f97e795a928c9a00a630158951d587b132471ff711ed0e62b919b9d4b4b8.exe File opened for modification C:\Windows\SysWOW64\MSHFGCHS.dll 8737f97e795a928c9a00a630158951d587b132471ff711ed0e62b919b9d4b4b8.exe File opened for modification C:\Windows\SysWOW64\MSMPICHS.dll 8737f97e795a928c9a00a630158951d587b132471ff711ed0e62b919b9d4b4b8.exe File opened for modification C:\Windows\SysWOW64\KeyCode.dll 8737f97e795a928c9a00a630158951d587b132471ff711ed0e62b919b9d4b4b8.exe File opened for modification C:\Windows\SysWOW64\ufmanager.dll 8737f97e795a928c9a00a630158951d587b132471ff711ed0e62b919b9d4b4b8.exe File opened for modification C:\Windows\SysWOW64\Comdlg32.OCX 8737f97e795a928c9a00a630158951d587b132471ff711ed0e62b919b9d4b4b8.exe File opened for modification C:\Windows\SysWOW64\FLXGDCHS.dll 8737f97e795a928c9a00a630158951d587b132471ff711ed0e62b919b9d4b4b8.exe File opened for modification C:\Windows\SysWOW64\MCICHS.dll 8737f97e795a928c9a00a630158951d587b132471ff711ed0e62b919b9d4b4b8.exe File opened for modification C:\Windows\SysWOW64\SYSINCHS.dll 8737f97e795a928c9a00a630158951d587b132471ff711ed0e62b919b9d4b4b8.exe File opened for modification C:\Windows\SysWOW64\crviewer9.dll 8737f97e795a928c9a00a630158951d587b132471ff711ed0e62b919b9d4b4b8.exe File opened for modification C:\Windows\SysWOW64\CMCT3CHS.dll 8737f97e795a928c9a00a630158951d587b132471ff711ed0e62b919b9d4b4b8.exe File opened for modification C:\Windows\SysWOW64\MSCOMM32.OCX 8737f97e795a928c9a00a630158951d587b132471ff711ed0e62b919b9d4b4b8.exe File opened for modification C:\Windows\SysWOW64\RICHTX32.OCX 8737f97e795a928c9a00a630158951d587b132471ff711ed0e62b919b9d4b4b8.exe File opened for modification C:\Windows\SysWOW64\TABCTL32.OCX 8737f97e795a928c9a00a630158951d587b132471ff711ed0e62b919b9d4b4b8.exe File opened for modification C:\Windows\SysWOW64\INETCHS.dll 8737f97e795a928c9a00a630158951d587b132471ff711ed0e62b919b9d4b4b8.exe File opened for modification C:\Windows\SysWOW64\VB5DB.dll 8737f97e795a928c9a00a630158951d587b132471ff711ed0e62b919b9d4b4b8.exe File opened for modification C:\Windows\SysWOW64\MCI32.OCX 8737f97e795a928c9a00a630158951d587b132471ff711ed0e62b919b9d4b4b8.exe File opened for modification C:\Windows\SysWOW64\MSFLXGRD.OCX 8737f97e795a928c9a00a630158951d587b132471ff711ed0e62b919b9d4b4b8.exe File opened for modification C:\Windows\SysWOW64\RCHTXCHS.dll 8737f97e795a928c9a00a630158951d587b132471ff711ed0e62b919b9d4b4b8.exe File opened for modification C:\Windows\SysWOW64\WINSKCHS.dll 8737f97e795a928c9a00a630158951d587b132471ff711ed0e62b919b9d4b4b8.exe File opened for modification C:\Windows\SysWOW64\ExportModeller.dll 8737f97e795a928c9a00a630158951d587b132471ff711ed0e62b919b9d4b4b8.exe File opened for modification C:\Windows\SysWOW64\crxf_rtf.dll 8737f97e795a928c9a00a630158951d587b132471ff711ed0e62b919b9d4b4b8.exe File opened for modification C:\Windows\SysWOW64\sscsdk80.dll 8737f97e795a928c9a00a630158951d587b132471ff711ed0e62b919b9d4b4b8.exe File opened for modification C:\Windows\SysWOW64\MSCOMCT2.OCX 8737f97e795a928c9a00a630158951d587b132471ff711ed0e62b919b9d4b4b8.exe File opened for modification C:\Windows\SysWOW64\RDOCURS.dll 8737f97e795a928c9a00a630158951d587b132471ff711ed0e62b919b9d4b4b8.exe File opened for modification C:\Windows\SysWOW64\MSDATGRD.OCX 8737f97e795a928c9a00a630158951d587b132471ff711ed0e62b919b9d4b4b8.exe File opened for modification C:\Windows\SysWOW64\MSCHRT20.OCX 8737f97e795a928c9a00a630158951d587b132471ff711ed0e62b919b9d4b4b8.exe File opened for modification C:\Windows\SysWOW64\CMDLGCHS.dll 8737f97e795a928c9a00a630158951d587b132471ff711ed0e62b919b9d4b4b8.exe File opened for modification C:\Windows\SysWOW64\DATGDCHS.dll 8737f97e795a928c9a00a630158951d587b132471ff711ed0e62b919b9d4b4b8.exe File opened for modification C:\Windows\SysWOW64\MSMSKCHS.dll 8737f97e795a928c9a00a630158951d587b132471ff711ed0e62b919b9d4b4b8.exe File opened for modification C:\Windows\SysWOW64\MSRDO20.dll 8737f97e795a928c9a00a630158951d587b132471ff711ed0e62b919b9d4b4b8.exe File opened for modification C:\Windows\SysWOW64\VB6STKIT.dll 8737f97e795a928c9a00a630158951d587b132471ff711ed0e62b919b9d4b4b8.exe File opened for modification C:\Windows\SysWOW64\vsflexgrid8.ocx 8737f97e795a928c9a00a630158951d587b132471ff711ed0e62b919b9d4b4b8.exe File opened for modification C:\Windows\SysWOW64\COMCT332.OCX 8737f97e795a928c9a00a630158951d587b132471ff711ed0e62b919b9d4b4b8.exe File opened for modification C:\Windows\SysWOW64\craxdrt9.dll 8737f97e795a928c9a00a630158951d587b132471ff711ed0e62b919b9d4b4b8.exe File opened for modification C:\Windows\SysWOW64\mwrf32.dll 8737f97e795a928c9a00a630158951d587b132471ff711ed0e62b919b9d4b4b8.exe File opened for modification C:\Windows\SysWOW64\jmail.dll 8737f97e795a928c9a00a630158951d587b132471ff711ed0e62b919b9d4b4b8.exe File opened for modification C:\Windows\SysWOW64\htcom.dll 8737f97e795a928c9a00a630158951d587b132471ff711ed0e62b919b9d4b4b8.exe File opened for modification C:\Windows\SysWOW64\MSADODC.OCX 8737f97e795a928c9a00a630158951d587b132471ff711ed0e62b919b9d4b4b8.exe File opened for modification C:\Windows\SysWOW64\MSCOMCTL.OCX 8737f97e795a928c9a00a630158951d587b132471ff711ed0e62b919b9d4b4b8.exe File opened for modification C:\Windows\SysWOW64\mshflxgd.OCX 8737f97e795a928c9a00a630158951d587b132471ff711ed0e62b919b9d4b4b8.exe File opened for modification C:\Windows\SysWOW64\MSWINSCK.OCX 8737f97e795a928c9a00a630158951d587b132471ff711ed0e62b919b9d4b4b8.exe File opened for modification C:\Windows\SysWOW64\VB6CHS.dll 8737f97e795a928c9a00a630158951d587b132471ff711ed0e62b919b9d4b4b8.exe File opened for modification C:\Windows\SysWOW64\crtslv.dll 8737f97e795a928c9a00a630158951d587b132471ff711ed0e62b919b9d4b4b8.exe File opened for modification C:\Windows\SysWOW64\biokey.OCX 8737f97e795a928c9a00a630158951d587b132471ff711ed0e62b919b9d4b4b8.exe File opened for modification C:\Windows\SysWOW64\MSRDC20.OCX 8737f97e795a928c9a00a630158951d587b132471ff711ed0e62b919b9d4b4b8.exe File opened for modification C:\Windows\SysWOW64\msbind.dll 8737f97e795a928c9a00a630158951d587b132471ff711ed0e62b919b9d4b4b8.exe File opened for modification C:\Windows\SysWOW64\MSCH2CHS.dll 8737f97e795a928c9a00a630158951d587b132471ff711ed0e62b919b9d4b4b8.exe File opened for modification C:\Windows\SysWOW64\RDO20CHS.dll 8737f97e795a928c9a00a630158951d587b132471ff711ed0e62b919b9d4b4b8.exe File opened for modification C:\Windows\SysWOW64\TABCTCHS.dll 8737f97e795a928c9a00a630158951d587b132471ff711ed0e62b919b9d4b4b8.exe File opened for modification C:\Windows\SysWOW64\crdb_ado.dll 8737f97e795a928c9a00a630158951d587b132471ff711ed0e62b919b9d4b4b8.exe File opened for modification C:\Windows\SysWOW64\crxf_pdf.dll 8737f97e795a928c9a00a630158951d587b132471ff711ed0e62b919b9d4b4b8.exe File opened for modification C:\Windows\SysWOW64\MSMASK32.OCX 8737f97e795a928c9a00a630158951d587b132471ff711ed0e62b919b9d4b4b8.exe File opened for modification C:\Windows\SysWOW64\crxf_pdf_res_chs.dll 8737f97e795a928c9a00a630158951d587b132471ff711ed0e62b919b9d4b4b8.exe File opened for modification C:\Windows\SysWOW64\crxf_wordw_res_chs.dll 8737f97e795a928c9a00a630158951d587b132471ff711ed0e62b919b9d4b4b8.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\Fonts\MW6Matrix.TTF 8737f97e795a928c9a00a630158951d587b132471ff711ed0e62b919b9d4b4b8.exe File opened for modification C:\Windows\Fonts\code128.TTF 8737f97e795a928c9a00a630158951d587b132471ff711ed0e62b919b9d4b4b8.exe -
Modifies Control Panel 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\INTERNATIONAL 8737f97e795a928c9a00a630158951d587b132471ff711ed0e62b919b9d4b4b8.exe Set value (str) \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\ILZERO = "1" 8737f97e795a928c9a00a630158951d587b132471ff711ed0e62b919b9d4b4b8.exe Set value (str) \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\SSHORTDATE = "yyyy-MM-dd" 8737f97e795a928c9a00a630158951d587b132471ff711ed0e62b919b9d4b4b8.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{B89D0E7A-0F5B-40EE-8AF3-08FA2ED9534F}\TypeLib\Version = "4.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{10E321CC-683E-4060-B938-4F53234D9593}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\aspfile\ScriptHostEncode\ = "{0CF774D1-F077-11D1-B1BC-00C04F86C324}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{81CA5571-C109-47AE-BE1C-2DF9CB8999FF}\TypeLib\ = "{AED3A6B0-2171-11D2-B77C-0008C73ACA8F}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{45046D60-08CA-11CF-A90F-00AA0062BB4C}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{0C21B3B1-2B11-45F2-8A9E-DCC5032DE98A}\ = "IMailMerge" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{AED3A6B3-2171-11D2-B77C-0008C73ACA8F}\ProgID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{22F55881-280B-11D0-A8A9-00A0C90C2004} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{B196B286-BAB4-101A-B69C-00AA00341D07}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C4D651F0-7697-11D1-A1E9-00A0C90F2731}\TypeLib\ = "{EA544A21-C82D-11D1-A3E4-00A0C90AEA82}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{AED3A6B3-2171-11D2-B77C-0008C73ACA8F}\Version regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{EB41E8C1-4442-11D1-8906-00A0C9110049}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{14E61A41-8846-11D2-B7E4-0008C73ACA8F}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{05A0BDDF-8823-4CB7-95BE-7B3D6292A745}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F812B147-0E26-4222-8EE4-9F753CD2B39C}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{55272A00-42CB-11CE-8135-00AA004BB851}\NumMethods regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{1CF2B120-547D-101B-8E65-08002B2BD119} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{BE8F9800-2AAA-11CF-AD67-00AA00614F3E}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E5FF9F62-0E7C-4372-8AD5-DA7D2418070C}\ = "Message Object" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{10E321CC-683E-4060-B938-4F53234D9593}\TypeLib\ = "{AED3A6B0-2171-11D2-B77C-0008C73ACA8F}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{684130B2-2B8A-4E8D-BE71-8F4052882076}\ = "IMessages" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{14E61A41-8846-11D2-B7E4-0008C73ACA8F}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\jmail.Message\Clsid regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E5FF9F62-0E7C-4372-8AD5-DA7D2418070C}\ProgID\ = "jmail.Message" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E05AEA1E-BCB1-473A-8B2A-4829D9E1AD23}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{81CA5571-C109-47AE-BE1C-2DF9CB8999FF} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{888A5A60-B283-11CF-8AD5-00A0C90AEA82}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E43FD401-8715-11D1-98E7-00A0C9702442}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{53DECA78-C334-4235-9165-1FE7D8912A76}\ProgID\ = "jmail.Attachment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{FC4801A3-2BA9-11CF-A229-00AA003D7352} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{FC4801A3-2BA9-11CF-A229-00AA003D7352}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{607A06FE-2FDA-4ADC-854D-D016D98D83DB}\TypeLib\ = "{AED3A6B0-2171-11D2-B77C-0008C73ACA8F}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{23E86816-772B-4B28-A924-A135CFF6469A}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{B89D0E7A-0F5B-40EE-8AF3-08FA2ED9534F}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{B89D0E7A-0F5B-40EE-8AF3-08FA2ED9534F}\ProxyStubClsid32 regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\VBSFILE\SCRIPTHOSTENCODE regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0D43FE01-F093-11CF-8940-00A0C9054228}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{14E61A41-8846-11D2-B7E4-0008C73ACA8F}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{08B9999C-DAD2-4353-B25B-8CCAFFCA4D16}\ = "IPGPDecodeResults" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{22F55882-280B-11D0-A8A9-00A0C90C2004}\NumMethods regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{AED3A6B1-2171-11D2-B77C-0008C73ACA8F}\TypeLib\Version = "4.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EE09B103-97E0-11CF-978F-00A02463E06F}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\jmail.SMTPMail\Clsid\ = "{AED3A6B3-2171-11D2-B77C-0008C73ACA8F}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{A7ABA9C1-8983-11CF-8F20-00805F2CD064}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A4C466B8-499F-101B-BB78-00AA00383CBB}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{65C53BE7-ED21-4C25-B189-DA0E8FAD5231}\TypeLib\ = "{AED3A6B0-2171-11D2-B77C-0008C73ACA8F}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A4C46780-499F-101B-BB78-00AA00383CBB}\TypeLib\ = "{000204EF-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C4D651F0-7697-11D1-A1E9-00A0C90F2731} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{EB41E8C1-4442-11D1-8906-00A0C9110049} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{EB41E8C5-4442-11D1-8906-00A0C9110049} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{55980BA0-35AA-11CF-B671-00AA004CD6D8}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{684130B2-2B8A-4E8D-BE71-8F4052882076}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C4D651F0-7697-11D1-A1E9-00A0C90F2731}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\jmail.POP3 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{BEF6E003-A874-101A-8BBA-00AA00300CAB} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{7FD52380-4E07-101B-AE2D-08002B2EC713}\NumMethods regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{41A7D760-6018-11CF-9016-00AA0068841E}\ = "DataObject" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Scripting.FileSystemObject\CLSID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{81CA5571-C109-47AE-BE1C-2DF9CB8999FF}\ProgID\ = "jmail.PGPDecodeResult" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{46763EE0-CAB2-11CE-8C20-00AA0051E5D4}\CLSID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C4D651F0-7697-11D1-A1E9-00A0C90F2731}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{B196B286-BAB4-101A-B69C-00AA00341D07} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{3AF24292-0C96-11CE-A0CF-00AA00600AB8}\NumMethods\ = "15" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{AED3A6B0-2171-11D2-B77C-0008C73ACA8F}\4.0 regsvr32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4100 8737f97e795a928c9a00a630158951d587b132471ff711ed0e62b919b9d4b4b8.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4100 wrote to memory of 1508 4100 8737f97e795a928c9a00a630158951d587b132471ff711ed0e62b919b9d4b4b8.exe 85 PID 4100 wrote to memory of 1508 4100 8737f97e795a928c9a00a630158951d587b132471ff711ed0e62b919b9d4b4b8.exe 85 PID 4100 wrote to memory of 1508 4100 8737f97e795a928c9a00a630158951d587b132471ff711ed0e62b919b9d4b4b8.exe 85 PID 4100 wrote to memory of 1428 4100 8737f97e795a928c9a00a630158951d587b132471ff711ed0e62b919b9d4b4b8.exe 86 PID 4100 wrote to memory of 1428 4100 8737f97e795a928c9a00a630158951d587b132471ff711ed0e62b919b9d4b4b8.exe 86 PID 4100 wrote to memory of 1428 4100 8737f97e795a928c9a00a630158951d587b132471ff711ed0e62b919b9d4b4b8.exe 86 PID 4100 wrote to memory of 1436 4100 8737f97e795a928c9a00a630158951d587b132471ff711ed0e62b919b9d4b4b8.exe 87 PID 4100 wrote to memory of 1436 4100 8737f97e795a928c9a00a630158951d587b132471ff711ed0e62b919b9d4b4b8.exe 87 PID 4100 wrote to memory of 1436 4100 8737f97e795a928c9a00a630158951d587b132471ff711ed0e62b919b9d4b4b8.exe 87 PID 4100 wrote to memory of 2476 4100 8737f97e795a928c9a00a630158951d587b132471ff711ed0e62b919b9d4b4b8.exe 107 PID 4100 wrote to memory of 2476 4100 8737f97e795a928c9a00a630158951d587b132471ff711ed0e62b919b9d4b4b8.exe 107 PID 4100 wrote to memory of 2476 4100 8737f97e795a928c9a00a630158951d587b132471ff711ed0e62b919b9d4b4b8.exe 107 PID 4100 wrote to memory of 3472 4100 8737f97e795a928c9a00a630158951d587b132471ff711ed0e62b919b9d4b4b8.exe 106 PID 4100 wrote to memory of 3472 4100 8737f97e795a928c9a00a630158951d587b132471ff711ed0e62b919b9d4b4b8.exe 106 PID 4100 wrote to memory of 3472 4100 8737f97e795a928c9a00a630158951d587b132471ff711ed0e62b919b9d4b4b8.exe 106 PID 4100 wrote to memory of 3268 4100 8737f97e795a928c9a00a630158951d587b132471ff711ed0e62b919b9d4b4b8.exe 104 PID 4100 wrote to memory of 3268 4100 8737f97e795a928c9a00a630158951d587b132471ff711ed0e62b919b9d4b4b8.exe 104 PID 4100 wrote to memory of 3268 4100 8737f97e795a928c9a00a630158951d587b132471ff711ed0e62b919b9d4b4b8.exe 104 PID 4100 wrote to memory of 3140 4100 8737f97e795a928c9a00a630158951d587b132471ff711ed0e62b919b9d4b4b8.exe 103 PID 4100 wrote to memory of 3140 4100 8737f97e795a928c9a00a630158951d587b132471ff711ed0e62b919b9d4b4b8.exe 103 PID 4100 wrote to memory of 3140 4100 8737f97e795a928c9a00a630158951d587b132471ff711ed0e62b919b9d4b4b8.exe 103 PID 4100 wrote to memory of 3712 4100 8737f97e795a928c9a00a630158951d587b132471ff711ed0e62b919b9d4b4b8.exe 102 PID 4100 wrote to memory of 3712 4100 8737f97e795a928c9a00a630158951d587b132471ff711ed0e62b919b9d4b4b8.exe 102 PID 4100 wrote to memory of 3712 4100 8737f97e795a928c9a00a630158951d587b132471ff711ed0e62b919b9d4b4b8.exe 102 PID 4100 wrote to memory of 1268 4100 8737f97e795a928c9a00a630158951d587b132471ff711ed0e62b919b9d4b4b8.exe 100 PID 4100 wrote to memory of 1268 4100 8737f97e795a928c9a00a630158951d587b132471ff711ed0e62b919b9d4b4b8.exe 100 PID 4100 wrote to memory of 1268 4100 8737f97e795a928c9a00a630158951d587b132471ff711ed0e62b919b9d4b4b8.exe 100 PID 4100 wrote to memory of 1364 4100 8737f97e795a928c9a00a630158951d587b132471ff711ed0e62b919b9d4b4b8.exe 99 PID 4100 wrote to memory of 1364 4100 8737f97e795a928c9a00a630158951d587b132471ff711ed0e62b919b9d4b4b8.exe 99 PID 4100 wrote to memory of 1364 4100 8737f97e795a928c9a00a630158951d587b132471ff711ed0e62b919b9d4b4b8.exe 99 PID 4100 wrote to memory of 1276 4100 8737f97e795a928c9a00a630158951d587b132471ff711ed0e62b919b9d4b4b8.exe 98 PID 4100 wrote to memory of 1276 4100 8737f97e795a928c9a00a630158951d587b132471ff711ed0e62b919b9d4b4b8.exe 98 PID 4100 wrote to memory of 1276 4100 8737f97e795a928c9a00a630158951d587b132471ff711ed0e62b919b9d4b4b8.exe 98 PID 4100 wrote to memory of 1336 4100 8737f97e795a928c9a00a630158951d587b132471ff711ed0e62b919b9d4b4b8.exe 97 PID 4100 wrote to memory of 1336 4100 8737f97e795a928c9a00a630158951d587b132471ff711ed0e62b919b9d4b4b8.exe 97 PID 4100 wrote to memory of 1336 4100 8737f97e795a928c9a00a630158951d587b132471ff711ed0e62b919b9d4b4b8.exe 97 PID 4100 wrote to memory of 4648 4100 8737f97e795a928c9a00a630158951d587b132471ff711ed0e62b919b9d4b4b8.exe 95 PID 4100 wrote to memory of 4648 4100 8737f97e795a928c9a00a630158951d587b132471ff711ed0e62b919b9d4b4b8.exe 95 PID 4100 wrote to memory of 4648 4100 8737f97e795a928c9a00a630158951d587b132471ff711ed0e62b919b9d4b4b8.exe 95 PID 4100 wrote to memory of 3392 4100 8737f97e795a928c9a00a630158951d587b132471ff711ed0e62b919b9d4b4b8.exe 94 PID 4100 wrote to memory of 3392 4100 8737f97e795a928c9a00a630158951d587b132471ff711ed0e62b919b9d4b4b8.exe 94 PID 4100 wrote to memory of 3392 4100 8737f97e795a928c9a00a630158951d587b132471ff711ed0e62b919b9d4b4b8.exe 94 PID 4100 wrote to memory of 3592 4100 8737f97e795a928c9a00a630158951d587b132471ff711ed0e62b919b9d4b4b8.exe 91 PID 4100 wrote to memory of 3592 4100 8737f97e795a928c9a00a630158951d587b132471ff711ed0e62b919b9d4b4b8.exe 91 PID 4100 wrote to memory of 3592 4100 8737f97e795a928c9a00a630158951d587b132471ff711ed0e62b919b9d4b4b8.exe 91 PID 4100 wrote to memory of 2088 4100 8737f97e795a928c9a00a630158951d587b132471ff711ed0e62b919b9d4b4b8.exe 90 PID 4100 wrote to memory of 2088 4100 8737f97e795a928c9a00a630158951d587b132471ff711ed0e62b919b9d4b4b8.exe 90 PID 4100 wrote to memory of 2088 4100 8737f97e795a928c9a00a630158951d587b132471ff711ed0e62b919b9d4b4b8.exe 90 PID 4100 wrote to memory of 2608 4100 8737f97e795a928c9a00a630158951d587b132471ff711ed0e62b919b9d4b4b8.exe 89 PID 4100 wrote to memory of 2608 4100 8737f97e795a928c9a00a630158951d587b132471ff711ed0e62b919b9d4b4b8.exe 89 PID 4100 wrote to memory of 2608 4100 8737f97e795a928c9a00a630158951d587b132471ff711ed0e62b919b9d4b4b8.exe 89 PID 4100 wrote to memory of 4772 4100 8737f97e795a928c9a00a630158951d587b132471ff711ed0e62b919b9d4b4b8.exe 88 PID 4100 wrote to memory of 4772 4100 8737f97e795a928c9a00a630158951d587b132471ff711ed0e62b919b9d4b4b8.exe 88 PID 4100 wrote to memory of 4772 4100 8737f97e795a928c9a00a630158951d587b132471ff711ed0e62b919b9d4b4b8.exe 88 PID 4100 wrote to memory of 4876 4100 8737f97e795a928c9a00a630158951d587b132471ff711ed0e62b919b9d4b4b8.exe 93 PID 4100 wrote to memory of 4876 4100 8737f97e795a928c9a00a630158951d587b132471ff711ed0e62b919b9d4b4b8.exe 93 PID 4100 wrote to memory of 4876 4100 8737f97e795a928c9a00a630158951d587b132471ff711ed0e62b919b9d4b4b8.exe 93 PID 4100 wrote to memory of 3188 4100 8737f97e795a928c9a00a630158951d587b132471ff711ed0e62b919b9d4b4b8.exe 92 PID 4100 wrote to memory of 3188 4100 8737f97e795a928c9a00a630158951d587b132471ff711ed0e62b919b9d4b4b8.exe 92 PID 4100 wrote to memory of 3188 4100 8737f97e795a928c9a00a630158951d587b132471ff711ed0e62b919b9d4b4b8.exe 92 PID 4100 wrote to memory of 3016 4100 8737f97e795a928c9a00a630158951d587b132471ff711ed0e62b919b9d4b4b8.exe 96 PID 4100 wrote to memory of 3016 4100 8737f97e795a928c9a00a630158951d587b132471ff711ed0e62b919b9d4b4b8.exe 96 PID 4100 wrote to memory of 3016 4100 8737f97e795a928c9a00a630158951d587b132471ff711ed0e62b919b9d4b4b8.exe 96 PID 4100 wrote to memory of 1652 4100 8737f97e795a928c9a00a630158951d587b132471ff711ed0e62b919b9d4b4b8.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\8737f97e795a928c9a00a630158951d587b132471ff711ed0e62b919b9d4b4b8.exe"C:\Users\Admin\AppData\Local\Temp\8737f97e795a928c9a00a630158951d587b132471ff711ed0e62b919b9d4b4b8.exe"1⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Control Panel
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4100 -
C:\Windows\SysWOW64\cmd.execmd.exe /c regsvr32 C:\Windows\system32\biokey.OCX /s2⤵PID:1508
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 C:\Windows\system32\biokey.OCX /s3⤵PID:2164
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c regsvr32 C:\Windows\system32\COMCT332.OCX /s2⤵PID:1428
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 C:\Windows\system32\COMCT332.OCX /s3⤵PID:5184
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c regsvr32 C:\Windows\system32\Comdlg32.OCX /s2⤵PID:1436
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 C:\Windows\system32\Comdlg32.OCX /s3⤵PID:4604
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c regsvr32 C:\Windows\system32\MSRDC20.OCX /s2⤵PID:4772
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 C:\Windows\system32\MSRDC20.OCX /s3⤵PID:5640
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c regsvr32 C:\Windows\system32\MSMASK32.OCX /s2⤵PID:2608
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 C:\Windows\system32\MSMASK32.OCX /s3⤵PID:5708
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c regsvr32 C:\Windows\system32\MSMAPI32.OCX /s2⤵PID:2088
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 C:\Windows\system32\MSMAPI32.OCX /s3⤵PID:5760
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c regsvr32 C:\Windows\system32\MSINET.OCX /s2⤵PID:3592
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 C:\Windows\system32\MSINET.OCX /s3⤵PID:5656
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c regsvr32 C:\Windows\system32\phonic_usb.OCX /s2⤵PID:3188
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 C:\Windows\system32\phonic_usb.OCX /s3⤵PID:4196
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c regsvr32 C:\Windows\system32\MSWINSCK.OCX /s2⤵PID:4876
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 C:\Windows\system32\MSWINSCK.OCX /s3⤵PID:5488
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c regsvr32 C:\Windows\system32\mshflxgd.OCX /s2⤵PID:3392
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 C:\Windows\system32\mshflxgd.OCX /s3⤵PID:5936
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c regsvr32 C:\Windows\system32\MSFLXGRD.OCX /s2⤵PID:4648
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 C:\Windows\system32\MSFLXGRD.OCX /s3⤵PID:5648
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c regsvr32 C:\Windows\system32\PICCLP32.OCX /s2⤵PID:3016
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 C:\Windows\system32\PICCLP32.OCX /s3⤵PID:3848
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c regsvr32 C:\Windows\system32\msdxm.OCX /s2⤵PID:1336
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 C:\Windows\system32\msdxm.OCX /s3⤵PID:5668
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c regsvr32 C:\Windows\system32\MSDATLST.OCX /s2⤵PID:1276
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 C:\Windows\system32\MSDATLST.OCX /s3⤵PID:5336
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c regsvr32 C:\Windows\system32\MSDATGRD.OCX /s2⤵PID:1364
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 C:\Windows\system32\MSDATGRD.OCX /s3⤵PID:6132
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c regsvr32 C:\Windows\system32\MSCOMM32.OCX /s2⤵PID:1268
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 C:\Windows\system32\MSCOMM32.OCX /s3⤵PID:5328
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c regsvr32 C:\Windows\system32\RICHTX32.OCX /s2⤵PID:1652
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 C:\Windows\system32\RICHTX32.OCX /s3⤵PID:5736
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c regsvr32 C:\Windows\system32\MSCOMCTL.OCX /s2⤵PID:3712
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 C:\Windows\system32\MSCOMCTL.OCX /s3⤵PID:5684
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c regsvr32 C:\Windows\system32\MSCOMCT2.OCX /s2⤵PID:3140
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 C:\Windows\system32\MSCOMCT2.OCX /s3⤵PID:5968
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c regsvr32 C:\Windows\system32\MSCHRT20.OCX /s2⤵PID:3268
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 C:\Windows\system32\MSCHRT20.OCX /s3⤵PID:5728
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c regsvr32 C:\Windows\system32\SYSINFO.OCX /s2⤵PID:236
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 C:\Windows\system32\SYSINFO.OCX /s3⤵PID:5920
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c regsvr32 C:\Windows\system32\MSADODC.OCX /s2⤵PID:3472
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 C:\Windows\system32\MSADODC.OCX /s3⤵PID:6088
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c regsvr32 C:\Windows\system32\MCI32.OCX /s2⤵PID:2476
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 C:\Windows\system32\MCI32.OCX /s3⤵PID:5480
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c regsvr32 C:\Windows\system32\TABCTL32.OCX /s2⤵PID:2124
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 C:\Windows\system32\TABCTL32.OCX /s3⤵PID:3092
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c regsvr32 C:\Windows\system32\KeyCode.dll /s2⤵PID:2820
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 C:\Windows\system32\KeyCode.dll /s3⤵PID:1672
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c regsvr32 C:\Windows\system32\jmail.dll /s2⤵PID:3360
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 C:\Windows\system32\jmail.dll /s3⤵
- Loads dropped DLL
- Modifies registry class
PID:5928
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c regsvr32 C:\Windows\system32\ExportModeller.dll /s2⤵PID:4700
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 C:\Windows\system32\ExportModeller.dll /s3⤵PID:3516
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c regsvr32 C:\Windows\system32\crtslv.dll /s2⤵PID:4588
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 C:\Windows\system32\crtslv.dll /s3⤵PID:6120
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c regsvr32 C:\Windows\system32\craxdrt9.dll /s2⤵PID:556
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 C:\Windows\system32\craxdrt9.dll /s3⤵PID:4760
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c regsvr32 C:\Windows\system32\crviewer9.dll /s2⤵PID:3132
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 C:\Windows\system32\crviewer9.dll /s3⤵PID:1580
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c regsvr32 C:\Windows\system32\crqe.dll /s2⤵PID:4836
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 C:\Windows\system32\crqe.dll /s3⤵PID:2456
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c regsvr32 C:\Windows\system32\msxml3.dll /s2⤵PID:2024
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 C:\Windows\system32\msxml3.dll /s3⤵PID:6044
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c regsvr32 C:\Windows\system32\szhto.ocx /s2⤵PID:2972
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 C:\Windows\system32\szhto.ocx /s3⤵PID:5944
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c regsvr32 C:\Windows\system32\vsflexgrid8.ocx /s2⤵PID:1356
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 C:\Windows\system32\vsflexgrid8.ocx /s3⤵PID:5792
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c regsvr32 C:\Windows\system32\scrrun.dll /s2⤵PID:2780
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 C:\Windows\system32\scrrun.dll /s3⤵
- Modifies registry class
PID:6008
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c regsvr32 C:\Windows\system32\MSRDO20.dll /s2⤵PID:3948
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 C:\Windows\system32\MSRDO20.dll /s3⤵PID:6016
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c regsvr32 C:\Windows\system32\CMCT3CHS.dll /s2⤵PID:2272
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 C:\Windows\system32\CMCT3CHS.dll /s3⤵PID:5784
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c regsvr32 C:\Windows\system32\msjet40.dll /s2⤵PID:3448
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 C:\Windows\system32\msjet40.dll /s3⤵PID:5812
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c regsvr32 C:\Windows\system32\msrd2x40.dll /s2⤵PID:5012
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 C:\Windows\system32\msrd2x40.dll /s3⤵PID:5664
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c regsvr32 C:\Windows\system32\msrd3x40.dll /s2⤵PID:3548
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 C:\Windows\system32\msrd3x40.dll /s3⤵PID:6032
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c regsvr32 C:\Windows\system32\msjtes40.dll /s2⤵PID:3728
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 C:\Windows\system32\msjtes40.dll /s3⤵PID:5952
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c regsvr32 C:\Windows\system32\msstdfmt.dll /s2⤵PID:4256
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 C:\Windows\system32\msstdfmt.dll /s3⤵PID:5776
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c regsvr32 C:\Windows\system32\msvbvm60.dll /s2⤵PID:3408
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 C:\Windows\system32\msvbvm60.dll /s3⤵
- Modifies registry class
PID:5896
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c regsvr32 C:\Windows\system32\msbind.dll /s2⤵PID:1284
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 C:\Windows\system32\msbind.dll /s3⤵PID:5912
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c regsvr32 C:\Windows\system32\oleaut32.dll /s2⤵PID:1152
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 C:\Windows\system32\oleaut32.dll /s3⤵
- Modifies registry class
PID:1448
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c regsvr32 C:\Windows\system32\olepro32.dll /s2⤵PID:4756
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 C:\Windows\system32\olepro32.dll /s3⤵PID:3740
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c regsvr32 C:\Windows\system32\comcat.dll /s2⤵PID:2496
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 C:\Windows\system32\comcat.dll /s3⤵PID:5904
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
24KB
MD591ff0dac5df86e798bfef5e573536b08
SHA1ebdd38b69cd5b9f2d00d273c981e16960fbbb4f7
SHA256de676bae28a480011d3d012db14bef539324e62a841a9627863c689bea168af3
SHA512f9c2cbda26d1c3e32f54625b5488f7d51dbe59f6cb742ce98b5f9e9ced089e65327fc381284f7f287b513c1b860b6898a53ca46df3cc4926ba0eb339f3c29bd3
-
Filesize
406KB
MD51f4fc9eee21d92d9438c7c13ea0abbdf
SHA153a91116ed3114ea45b3a9d6994faf44b7007160
SHA256a1dcb931c7aa5860a147faf19f50eb361a7570e3776ea0c3bb3396339a227d86
SHA512835b9cdf15c059ec292160285afd1d3e787d97b868903c9a0803eedfba11ed5a42618bfde1e36efcafdf056603bfe680ede74c9fac36a82441d176e680ab97d3
-
Filesize
137KB
MD5f69b7a803e13fde5d2200bba287c7eab
SHA15a9b9c87100b4a5b7da101d7ec431b5967c7e333
SHA25629fcd92cc94bf722d0aaa0da15066e83b1ed848867331ceb1a55ecd43747a057
SHA5120cc49888ce7b3dba7e0a23f1b2490aa09a2f0fc434225ad8b8b925be53d1fbbed0d7762cb52239cadbafaab39c6164985d059ab9bc792a7e1f9ea245cb3f96d3
-
Filesize
484KB
MD52bbe18d182ed09a827301aa60e0bd8a1
SHA1159600b2fc4284a7e2ed3918540a73f39bab9887
SHA256efd3948a702ae31eb4b06bf8caf6639df927b352a243e00d7b8e0c9e9caa31ff
SHA5129dd87e4725ecf9665a570440368e898f69e7b0b2438c2a36a1f446d00415d6b44a5711c15514428bd81bc970e5941f3b17f02866cb2306651d8adb07b25bc005
-
Filesize
216KB
MD5055e96aa9594edb66083d04cc1cbad1f
SHA13d38ae07103893c1b7175450c07a0dcd6d992f01
SHA256ee961e92ad4f21f2180e880c05620c4c651170bd8d906a75b56b3b3f3c2d4182
SHA51242d81ce89eb5ecc0eed1960c6274d55a871981928e283f56b07749599dba5ad6ed5c33cf89aa11ee93af0d93d29c1447c34b94ffb59f9828a80529a42bb3fa3b
-
Filesize
194KB
MD567c8f6614f1beedf16e41028ae765889
SHA1564d10285ba99f470db15cb9efdf24ec67d2801d
SHA256799d8808a012ceb3ed37d5cd788f05e870192a2fd473d06f98a8b22fd1e61d01
SHA512d203d923126368a8b7b8f2de0807138b1be0d90475e6971f57ac475968d6addb232bfc6cff880b70f46d5cfbdce684898e78ddb2ea4243fba33d7c33c6cfca90
-
Filesize
116KB
MD54c7dbe21a458f7ab8cdc7013a53a6b51
SHA16f2caa082d941f6569f70db8a58c0939dfa3856d
SHA256cc4c36fb35d18740d66a6694a5a6c9d6f4dadd9d89855e89a0322d6c6a95e9e6
SHA512bcfd988495d27d30f47a99f08709f7ef7d794feb573da7537544ed1ee2704b876c96f3490e49e3fe1701f992127eccb163d7bddfb130d738047748b0d9a7921d
-
Filesize
116KB
MD54c7dbe21a458f7ab8cdc7013a53a6b51
SHA16f2caa082d941f6569f70db8a58c0939dfa3856d
SHA256cc4c36fb35d18740d66a6694a5a6c9d6f4dadd9d89855e89a0322d6c6a95e9e6
SHA512bcfd988495d27d30f47a99f08709f7ef7d794feb573da7537544ed1ee2704b876c96f3490e49e3fe1701f992127eccb163d7bddfb130d738047748b0d9a7921d
-
Filesize
987KB
MD5a6934449ade6764978fec7f2bd30c1a0
SHA1538d1700d751f217d77701bc0d420126827a9636
SHA256fa5dca399f6a0d4de47d6f74c7e0ad6b067579d3f7a7975ccbf1e8ffbf35f5da
SHA5122321c50802e724b8327ec072c356bf439602277ad2896d6f5a0dd86f1ae7a2a37036bc2008c31f6943b97bd72421dfa262ffa9671fef5975b99b060fd287af57
-
Filesize
646KB
MD5cfb1303bc50df3b67a8a7e3e12f54a04
SHA10a23f19a642c4c5828d2cd4db6e7616e806da94f
SHA256a6e9cf54a1dfe7449fe952bf7498ddbe28d666118c9a290b3419fa542c70981d
SHA5129f3d998ce4d8f4db3427a9b5ee82ea546ecf1bd63c112d54606228d841bc079a2407667c4bf2d05d89ef24e7dfd515f58345bf60f4b22fabff041f525a3d2362
-
Filesize
1.0MB
MD5097e1ad11dce09929c9256c05b8f9104
SHA121f8dc549c536b51a174027d011d581bbc04f057
SHA2560dd9c8efaccd7b99abce4deb6b3b49d124a46b149d062ac4bce196c852d30d85
SHA5127c90ee1bd03ff20b457e72d8a2b8fb7732590eecf843565f082f3e0102f96f29e0cb87d2de9325746275c4b1d7f7d5264ec9a0ffed26aa9c29e7cab8c9b8f19c
-
Filesize
101KB
MD5d0f9c348b6b4366b55536a4be450dcb5
SHA10cef43f1afbebc5daccdc96312b99a0b2f1d6300
SHA25635584bb2d42b686dd9c9a140f2491585fe28398333614a8c939b6a5275e50a0f
SHA5123565d73bb53774b18583b970080620625301329af702200ba3ea051e8ccc74d81297f0c6928d0cd9d5c2538dc7bf09fb8200d51ba65c3cf064363d7cd4937eab
-
Filesize
256KB
MD5e8eca47c1d299c96d1f4f836cd794605
SHA13b3685bdb75310916cb10a2ba8cd00f218a0586d
SHA256615f5e010c6f0109f7a70041a30973ea0cbff8dbb41f8441876dbaa8bf9a14fd
SHA512385ca52e147b3bb245298036b284d8d6d5949d2fcc5e7ea676b0d1fd1c31037fa2978d919bc9dfb39bcdeb06912d8e8aac86230abc77ec7a0bea1b4e138412ca
-
Filesize
227KB
MD5531bd70e3cb4d2c706833d8118adb6f2
SHA1781c071a7fc3bad3941ac7ee2ec3433641c8c3e4
SHA256402d90b163499908749a548cd47967a49c6e926800f5efc8b5f81f4462037ea5
SHA512ae71585f898f3d373bcb23982d712f7f97739ee62e1c7e876bf05d4da86be7c965c49223b49d8bed12b260b622a01c36b528641e425fe198b9f6d056257a778e
-
Filesize
254KB
MD54d4d7cf5ec97af0f4627dc099150b821
SHA17aec1f58f22475917215259e539db3201167ae2c
SHA2560a0f8aaf44f49f63259ad395c89f8e45b0f9e1a8c5053928ae88cd0e58396180
SHA5128590b353c0f588efadfe196aa7ab0f7d772115d8a9e16e1ed53a4c365ba2634e0c5fe12a3849a68960b20e9d31fce9362bb76fef685e3002d84322a1a6e7e3a4
-
Filesize
129KB
MD54e97f315d1b16de7c80718603e1ed557
SHA1021b850334e325833ff6234f92196c7be690f06e
SHA2563c5d86719b4023ad5fc82ca718b5af8617a9be5c581b7f4772ad562901201544
SHA512d3856cc28b778f6fc9700a7b325d239932cb14c1f7dd945649c845d570e38faefbe51e00ff4ba0b476cb1497a63dbffcc81d3cdb139c6690edd5d56ca2ad334f
-
Filesize
133KB
MD5ed8ad9dd26189240768d75c8480d6a6c
SHA188ae150dddb8b86777db22bdcc284235782444e1
SHA256f5ebdddfcd4f136b29e82e55ee237547e710823222d95f0fdd35b0e5f378a5e4
SHA512c3229403456ecda04b77d8a758a0cb446529986c13317169c670a695a39c608f10a480190de82dd02b9ab48ea449fa5fb573c83ad7fd6840250554b1ce79cd5a
-
Filesize
164KB
MD5f297fafccd255ade79291c1545158ec6
SHA1c90232cc6a82e477453f8a66f8542372d2955f49
SHA25617d4cc8369bb47fc89b60940813275a5b627b36d427fb671ecdc1e14d1f7b7ff
SHA512444e1e612b617d67bca8508711cc50a3d78286f9c0f2408a27724bf8911650099e5000850d4e8c9587d1f5aaff41640451056ef760706464be9a9ef16ff4e84f
-
Filesize
174KB
MD555d06e17224536782335cf2091d4355f
SHA1f9b7a768db85639b220140ea3d930278a1435e6b
SHA25605125463cfdee4b5db5f52f0cbdecb7280a6fd18f8db8e112e93643d7370bd3d
SHA51273d2ed41f1c62feec09cd200f0ec81b47c2e2ea557c076c10e9f7e09f0f137e41e5bd54df304c0f6707dfb03825e3c6d81b4063f442dc099fc00e39e8accf9b1
-
Filesize
388KB
MD555264b1eae6ba625e879110e26d8fd8a
SHA1892d03644a886dc74084e8ed327f880c320054a0
SHA256ec2359fe4a8a70dafd7461bbc883e3c72312da49ee8c8bfb7b58f513cb7928ec
SHA512db936f69cb494ceb80803c0dc02ae16b9860d08aad78bf24c00852fbf3cb330205d48c20cb49282490f70a99a3dae2c68a25136e7eab5511d7220e84f57d3b74
-
Filesize
121KB
MD5d181180bfc1633444d61622db2b858b4
SHA1301b0327b37c618185737689a73a767e614633f9
SHA2569204f4105d88dc4773cff12d34904f5b4437e24b83b19d55c0ce342703b9560f
SHA512b2598c6f0d3ab9bf7a19912f44e8e8c8f46f96c6f346052ed2037fa0a7a1ccdba16f8958ec00eec957e9f36849932610b1490fe09bba0895c5f438994681988c
-
Filesize
82KB
MD54fbae2242358c71a554b427044ff77c0
SHA1686f8e0fc5e47cf7ef059ab1de9631c92c8c4d66
SHA2564ce92bfdacf90455952c14a61454a4a7fdc8a14089239d87ca4410e48441c9ac
SHA51206085b7b1757b594aa104676f478a8218634ca9ca0562aa23a4b24ae4fec00f321cc3ae22ac39220435135c8020e078fca8ff0c695749201f5a11150b0ff24e3
-
Filesize
207KB
MD54d9bed91ba6d9452d38a10c3b17124ae
SHA1082a24bc6eeddcb8193878462071114a1297f1d2
SHA256f70027cc93ff21891a3a8c680f5d0c413ebc0c9465db95e7f1aa1d26c93bc98e
SHA5123a80c43c1691a3e27bbc4ff251b178a5ac18860ea6a391abf0ef3afe6f804220c60298ba6f419b700cbf2fe59f68cabfab53c37724495d373f5757b8349872aa
-
Filesize
65KB
MD565a74460efad54bb8a0dcd156e4df66e
SHA178191a423672eab7361f44e2120f90362843eb87
SHA256a0b9226a5db5e8455ee7aeed7addee2073beb2bb376a25b5990e347fd562f050
SHA5125c59f37b556a25cee28c49cfb81169b49eda6ce9a1b40b6f0a69fccc27c129dbe23809039be02af67ffdaf9501026aa140b4689dd28985103304d3305dffbe55
-
Filesize
218KB
MD56aaa30fd92fef3307e282555a38e5e04
SHA13418a6c1dbcffcc17b1d43731b09b49b04bad3bb
SHA2567e89b25780139897170a74f1e4fda0e48b85b98fc8adb80ab1e3ffce29abc859
SHA512ab0f51a5fc07b90e5f4c7822f7134040780275767509fd02b25d69e7eb2e7ce69cbc9d4baa8ac1c8a0c53e90f53e11d3d0a82f65cb9fb9fcdba2f2c9b8cadc47
-
Filesize
856KB
MD57766517b346d4f13b89e9d959261f61a
SHA1dd6faa512801ebc8386312d9a27cac27adb0cfc0
SHA2561e8f8524f71560bb144ce6e83380e1282cd514d00dbca4c51a0c7b0a5649e86f
SHA512dee4bfe427a0119d61d04817c0bf50f481d431cca16f839336fab597a482f68fb495b18381c7fc17467eecb7166186b7cc6fc188e3e07fc74a51d614efca8f44
-
Filesize
5.9MB
MD51bc2de9e235c057f8451262f5ff7d8d2
SHA1824bedac10367357f169f1777c4ef706176c7132
SHA2560cee321a00395d514c850e013e2cfd2690d98b805ae18084e180e27551138801
SHA5127cbbfd64922769c056527c7ea6891460b23372086dafc1bd33bc37ff7a710f8fb26390afe5bec0bc18b14d5dea0c9a359e983d45854c8870a105ff731646c65a
-
Filesize
1.4MB
MD5d0abc02b765ddff1e1b0db10e3b48789
SHA1dbc28c94791ffd01a8cfc0f3bd4d9d1473fffab6
SHA256fe89df5151f03bd68e2e1b111e8da8ce98c8c1bd9f9f04d6416cfa0c4d16d228
SHA512996771e485e1adc297539bcc9504d77ff063f526a94ec4a50363509a77a02c4552342fcd838be61f4e97be2271af6cc22e148e930c062727cb91aec6f24b9496
-
Filesize
30KB
MD56e452ff49c6e47534d1309c6473524a6
SHA1fa9f9fc10b467a0522e9dca9e9ac99d175570cd1
SHA256e2d2f749bd0abffadae4da794f0590352a4fd6b4db50995728fcfd9bcd7dcfb3
SHA512d99fa53fd7416e18818c7b17aee38bd1e9ce894d6c1a21c5ecfe2828916b5559a3944af73785b3fc39950bea4afecb5df3b8191ea8c574c2c8764798e8363ce1
-
Filesize
752KB
MD52e9e634db1c88627ce28cb280cbf69a2
SHA18bd3e12e8778db4da7bdeec3061a6a85bb76de78
SHA2563fd8fe4d49a4ac47888ddb470f6ed4d46070760c1ed55a7d7943bf3c04bf65db
SHA512fe32ef904505df599e0591a844e923dca5953e8cce1caf1dc82b2bf7cbff0942ba7f5890a4d740f7c2b72b0a0c27e6b6a4a2403e586274825ba4e4584eb3f2c8
-
Filesize
314KB
MD52e3a4a1dce3fe450dd7ec4f97cfc789f
SHA1c2f524520c8f49e51efd464bad8199d8b4a8f908
SHA2566b711549469fcb4cb7af36f912197c6d0c97fea2f5d67e1af8f3524065ec46f0
SHA5126c0d9115fff8de7e008c0c88469ac88486251de2c78b1579effcc60f8e6ff413a86eea59a2cf8b6421bfa82c61d87f2376048bc0185ef9b35466c096272745d2
-
Filesize
314KB
MD52e3a4a1dce3fe450dd7ec4f97cfc789f
SHA1c2f524520c8f49e51efd464bad8199d8b4a8f908
SHA2566b711549469fcb4cb7af36f912197c6d0c97fea2f5d67e1af8f3524065ec46f0
SHA5126c0d9115fff8de7e008c0c88469ac88486251de2c78b1579effcc60f8e6ff413a86eea59a2cf8b6421bfa82c61d87f2376048bc0185ef9b35466c096272745d2
-
Filesize
77KB
MD57e2f5b69bd4b20ac940cddd9852f7e67
SHA16ecd10f5bb15f8e8c13b0ddc36386824599a6ba4
SHA25672239dbff34a434d214057d004404d21411e8140d69d42bd37d2db662548b3b5
SHA5126ab53b5e15dff5eb5c2fd901f0aca3068613c308f6702a88be15fcccf11dc227cb5c8b9c3c76161951c3ecd66d41fceab5a70bb181e5bdf62f37d66b2cd0eca1
-
Filesize
428KB
MD5292202ebfce6c54ce65879a37ffccc24
SHA189647c4af04aab99d7d0f468e82362aef66c0f07
SHA2561fee274693906866bc1c2859448bb195657f681e9a054976f04a4ba69f99805c
SHA51202c56d0a996af80ff32b05cc0f3e8d063254f766ba76355b5c532702614d3ed4fa5d72fa15175261ebaa662ef15c32ce2806b773ae067c69546faa434177a68d
-
Filesize
116KB
MD5b6f9fbb39009ed9a13d4be04a49fea98
SHA1c5f93f13a9569c987c2b2a3055f601e1de772938
SHA2563645a04b3f853f324732ffb9779ee1c95b01f6e5f68c6a07968ecbedaad552c1
SHA5124c6c7eced3d1e25f86dc49eadc2fe2e9ec3dcc0d869604d8ee7aad77d4f2b4ebf4159e4222a54020d95475149e3c8652489a18a3ebd2adbb7ccc502f955603ab
-
Filesize
369KB
MD56d9217b276d66c503af7792eb3fc1e32
SHA108b4851b1bc1c1575e7d1bc687b95da7cbdc35f9
SHA25602d26ef61c5312116c8ba25dbed3559a411ae8950911386f2248cee589fdb8f7
SHA512995931969985f38277bbfaec18bbc1f137482d9f7a6165c83f3c1b47f0c0d20400cc6ac9b12c47feb199731912949905a1f76499f46fde0d3e46b91758097eca
-
Filesize
16KB
MD5b85599ef9f6db3e9f889cf59f3c3247e
SHA169a4def43639ac26de9ed54c33ed0c1ce5c7bac0
SHA256099bd307d1be80c242008b22d3f1fabab6d26f88eaa0b914e667bff4969be9ff
SHA512a9851e205c3f6c106744776a15d06f0a3f9253748323dcfedb1d16f792fc58df2c1e86e2b792a3d420421a17423a7f3186dd93bab8d5d1b1cbe0598d88aa94df
-
Filesize
621KB
MD5e99f2fc854f895a237ca07db54a711cb
SHA152aacced9aa71cdf8793bd2fe07a3428a4e082dc
SHA256f2ee03b668fc4406449cff7056acb73de30a0eeec44b0b377df9440836640267
SHA51270c353ec4e1eb4c7e49bdca6d2d8e9a8e1d9ddbddab2a4b172f45adcb5ddb8aa496ad88c706631bd9c6e5e152eda3dd5b29bf1d4d00e46a6c9f95a55a2434cbd