Loading ...

Play interactive tourEdit tour

Analysis Report yxghUyIGb4

Overview

General Information

Sample Name:yxghUyIGb4 (renamed file extension from none to exe)
Analysis ID:377029
MD5:ecbc4b40dcfec4ed1b2647b217da0441
SHA1:e08eb07c69d8fc8e75927597767288a21d6ed7f6
SHA256:878d5137e0c9a072c83c596b4e80f2aa52a8580ef214e5ba0d59daa5036a92f8
Infos:

Most interesting Screenshot:

Detection

Emotet
Score:96
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected Emotet
Changes security center settings (notifications, updates, antivirus, firewall)
Creates files in the system32 config directory
Drops executables to the windows directory (C:\Windows) and starts them
Found evasive API chain (may stop execution after checking mutex)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Machine Learning detection for sample
AV process strings found (often used to terminate AV products)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains capabilities to detect virtual machines
Contains functionality to dynamically determine API calls
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates files inside the system directory
Deletes files inside the Windows folder
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files to the windows directory (C:\Windows)
Drops certificate files (DER)
Found large amount of non-executed APIs
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries disk information (often used to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Tries to load missing DLLs
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Yara signature match

Classification

Startup

  • System is w10x64
  • yxghUyIGb4.exe (PID: 676 cmdline: 'C:\Users\user\Desktop\yxghUyIGb4.exe' MD5: ECBC4B40DCFEC4ED1B2647B217DA0441)
    • yxghUyIGb4.exe (PID: 4552 cmdline: C:\Users\user\Desktop\yxghUyIGb4.exe MD5: ECBC4B40DCFEC4ED1B2647B217DA0441)
  • windowdcom.exe (PID: 5508 cmdline: C:\Windows\SysWOW64\windowdcom.exe MD5: ECBC4B40DCFEC4ED1B2647B217DA0441)
    • windowdcom.exe (PID: 5860 cmdline: C:\Windows\SysWOW64\windowdcom.exe MD5: ECBC4B40DCFEC4ED1B2647B217DA0441)
  • svchost.exe (PID: 2408 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 5568 cmdline: c:\windows\system32\svchost.exe -k localservice -p -s CDPSvc MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 4544 cmdline: c:\windows\system32\svchost.exe -k networkservice -p -s DoSvc MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 4788 cmdline: C:\Windows\System32\svchost.exe -k NetworkService -p MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • SgrmBroker.exe (PID: 5380 cmdline: C:\Windows\system32\SgrmBroker.exe MD5: D3170A3F3A9626597EEE1888686E3EA6)
  • svchost.exe (PID: 1260 cmdline: c:\windows\system32\svchost.exe -k localservicenetworkrestricted -p -s wscsvc MD5: 32569E403279B3FD2EDB7EBD036273FA)
    • MpCmdRun.exe (PID: 6072 cmdline: 'C:\Program Files\Windows Defender\mpcmdrun.exe' -wdenable MD5: A267555174BFA53844371226F482B86B)
      • conhost.exe (PID: 2132 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • svchost.exe (PID: 5968 cmdline: C:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 1708 cmdline: C:\Windows\system32\svchost.exe -k netsvcs -p -s wisvc MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

Initial Sample

SourceRuleDescriptionAuthorStrings
yxghUyIGb4.exeJoeSecurity_EmotetYara detected EmotetJoe Security
    yxghUyIGb4.exeEmotetEmotet Payloadkevoreilly
    • 0x16f0:$snippet1: FF 15 F8 C1 40 00 83 C4 0C 68 40 00 00 F0 6A 18
    • 0x1732:$snippet2: 6A 13 68 01 00 01 00 FF 15 C4 C0 40 00 85 C0

    Memory Dumps

    SourceRuleDescriptionAuthorStrings
    00000001.00000000.196238760.0000000000821000.00000020.00020000.sdmpJoeSecurity_EmotetYara detected EmotetJoe Security
      00000003.00000000.202814564.0000000000821000.00000020.00020000.sdmpJoeSecurity_EmotetYara detected EmotetJoe Security
        00000003.00000002.1275643184.0000000000821000.00000020.00020000.sdmpJoeSecurity_EmotetYara detected EmotetJoe Security
          00000002.00000002.203168982.0000000000821000.00000020.00020000.sdmpJoeSecurity_EmotetYara detected EmotetJoe Security
            00000000.00000000.195274651.0000000000821000.00000020.00020000.sdmpJoeSecurity_EmotetYara detected EmotetJoe Security
              Click to see the 3 entries

              Unpacked PEs

              SourceRuleDescriptionAuthorStrings
              2.0.windowdcom.exe.820000.0.unpackJoeSecurity_EmotetYara detected EmotetJoe Security
                2.0.windowdcom.exe.820000.0.unpackEmotetEmotet Payloadkevoreilly
                • 0x16f0:$snippet1: FF 15 F8 C1 82 00 83 C4 0C 68 40 00 00 F0 6A 18
                • 0x1732:$snippet2: 6A 13 68 01 00 01 00 FF 15 C4 C0 82 00 85 C0
                1.0.yxghUyIGb4.exe.820000.0.unpackJoeSecurity_EmotetYara detected EmotetJoe Security
                  1.0.yxghUyIGb4.exe.820000.0.unpackEmotetEmotet Payloadkevoreilly
                  • 0x16f0:$snippet1: FF 15 F8 C1 82 00 83 C4 0C 68 40 00 00 F0 6A 18
                  • 0x1732:$snippet2: 6A 13 68 01 00 01 00 FF 15 C4 C0 82 00 85 C0
                  0.0.yxghUyIGb4.exe.820000.0.unpackJoeSecurity_EmotetYara detected EmotetJoe Security
                    Click to see the 11 entries

                    Sigma Overview

                    No Sigma rule has matched

                    Signature Overview

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection:

                    barindex
                    Antivirus / Scanner detection for submitted sampleShow sources
                    Source: yxghUyIGb4.exeAvira: detected
                    Multi AV Scanner detection for submitted fileShow sources
                    Source: yxghUyIGb4.exeVirustotal: Detection: 83%Perma Link
                    Source: yxghUyIGb4.exeReversingLabs: Detection: 96%
                    Machine Learning detection for sampleShow sources
                    Source: yxghUyIGb4.exeJoe Sandbox ML: detected
                    Source: yxghUyIGb4.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
                    Source: unknownHTTPS traffic detected: 167.114.153.153:443 -> 192.168.2.3:49744 version: TLS 1.2
                    Source: yxghUyIGb4.exeStatic PE information: TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                    Source: global trafficTCP traffic: 192.168.2.3:49723 -> 193.169.54.12:8080
                    Source: global trafficTCP traffic: 192.168.2.3:49740 -> 173.230.145.224:8080
                    Source: global trafficTCP traffic: 192.168.2.3:49742 -> 80.86.91.232:7080
                    Source: global trafficTCP traffic: 192.168.2.3:49745 -> 80.82.115.164:4143
                    Source: global trafficTCP traffic: 192.168.2.3:49746 -> 71.244.60.231:4143
                    Source: global trafficTCP traffic: 192.168.2.3:49753 -> 186.103.199.252:4143
                    Source: global trafficTCP traffic: 192.168.2.3:49755 -> 159.203.94.198:4143
                    Source: Joe Sandbox ViewIP Address: 178.62.39.238 178.62.39.238
                    Source: Joe Sandbox ViewIP Address: 80.86.91.232 80.86.91.232
                    Source: Joe Sandbox ViewJA3 fingerprint: 51c64c77e60f3980eea90869b68c58a8
                    Source: global trafficHTTP traffic detected: POST / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: 79.172.249.82:443Content-Length: 420Connection: Keep-AliveCache-Control: no-cacheData Raw: 64 15 bd 9f bb 28 80 55 87 52 c0 ff d4 3c f7 e5 97 ae be b6 09 51 9c 77 77 ed 38 f6 d4 fe 22 da bb 96 3d 22 9d 57 37 0a 2f d4 3a 4d 6b 8b 5e e0 6c 13 21 be eb fe 2e c7 be ec 03 1d bc ba 6d 46 62 22 26 ae ef 33 53 6e 58 83 77 67 d9 64 ba 64 88 59 af 59 02 7d 74 2b 4f 12 54 7d c3 73 ae 77 98 e8 12 cd bc 7c 26 a1 ad a4 b2 5d fa 3f fc 1f 4a 1d 22 61 4c 5b cc 04 e6 69 91 ce f5 53 a1 08 f5 f8 bc 9c 11 8b 02 ef 02 0d 69 d6 83 69 6d b2 b6 6b 01 b7 a6 74 f0 e0 b0 2a 10 ff 0c 33 d8 ec fb e2 2f 41 a9 d7 c9 61 16 c2 64 d0 76 b6 85 3a a5 2a 13 55 ca 95 8c e9 03 76 00 7c 40 1e a0 57 9d cc 90 e4 92 fd 48 9f 73 94 06 15 63 bb bf df bf 84 bf a8 12 14 da e2 86 1c 57 30 23 29 02 c2 e7 7e 55 1f cc f0 91 f2 bf 93 4f c1 c2 00 7b ba d6 83 59 eb 5c 03 2c f7 43 b1 d8 30 1f 51 d4 42 64 da d9 73 fc e3 01 28 4c ea bf a3 f3 c0 af 9a eb e8 9c 98 57 6e f9 ac 4e ed 8f aa b7 96 37 2f 0a 4e 7d 2d 5d e6 3a 3f 1c 7b d4 fc 5e c2 d5 91 15 20 57 66 34 99 68 d0 15 6a 85 f0 dc d7 0c 4c 83 9f 3e 5a eb bb 0c b9 20 7c eb 42 75 73 76 c2 d2 0d 52 62 d0 55 85 9c 0a 89 eb 51 79 a9 07 0d bb 82 6f ef 51 8c 02 d5 8a e3 e5 23 63 d4 6a be ef f1 2f aa 4b be 00 45 b6 df 03 4a d2 b5 f4 c7 e5 41 97 66 94 3e af 67 6c 5a c1 b9 ab 2d 3d 4e 8e 85 c4 e9 89 63 4a 4a 3e aa 04 52 c8 1d 6b dc fd 7b 0b 9d Data Ascii: d(UR<Qww8"="W7/:Mk^l!.mFb"&3SnXwgddYY}t+OT}sw|&]?J"aL[iSiimkt*3/Aadv:*Uv|@WHscW0#)~UO{Y\,C0QBds(LWnN7/N}-]:?{^ Wf4hjL>Z |BusvRbUQyoQ#cj/KEJAf>glZ-=NcJJ>Rk{
                    Source: global trafficHTTP traffic detected: POST / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: 167.114.153.153Content-Length: 420Connection: Keep-AliveCache-Control: no-cacheData Raw: 1a d7 59 41 dc 17 11 dd a9 1c 01 8b 75 e0 96 cc 3c 04 50 4c 59 8e b3 38 e9 f3 3d 5c 70 4e 51 38 5e 81 6e dd 3d 4d b0 1e 4d e1 df 18 22 1b 8a ec b9 40 3c fc 6c 1e e8 2b 8b 2f e6 d9 6a ba 68 92 5c e4 8e 8b 74 06 11 57 4c 51 22 6b 4d d9 12 3f a2 ca 4d 8c 4c 72 4c d5 ae 06 50 f2 0b ff 93 10 3c 4c dd a6 1d 7c cb 0b 3e 5c 5b e8 52 7d 11 af 7f 57 1b db 09 ae d0 28 4f 8c 6e f4 be b5 aa 77 cb 7a 77 0a 12 8d 45 39 28 1a 81 c9 69 57 fd 1f d7 1e c8 cd d2 34 19 b1 9f df 2d 92 a7 0f 2c 07 62 82 58 2a 63 6b f4 f1 c1 76 60 bf 2a bb 71 f3 a2 15 2b 7f a1 b9 ec 3b 7c 3c 58 9f fc ae 67 47 1f 12 1c 1c 0f bc fe 16 f2 9e b3 c5 48 e7 10 e4 42 c3 97 ff db b9 5b 13 4e e0 7c 94 ac ef 64 99 89 a6 c8 0a 23 42 bf c2 2d 4f 7e 64 d1 77 1d 99 f7 23 32 cf 61 a1 90 83 0e 52 e5 1a 72 31 18 7e 1f 45 be 51 9c be 92 86 18 03 45 7f 58 fc 47 96 9f 14 b4 eb 2e f3 9b 74 83 bd 46 4b 11 4a 9a 95 2d e1 88 41 80 96 06 65 67 38 e0 e1 b1 d2 7c 83 9e 0b 84 89 45 52 29 df 21 50 0d fa c9 87 75 8b 64 ec 2f fb 1f ec ef 5d 82 26 98 ef 19 db a9 ca 8b 97 8d 28 73 0e 51 35 57 3c f1 ee 39 e2 28 7f 7c 33 45 7c 56 c9 7b 6d f7 7a d1 ef 8c 87 54 7f d0 b5 12 4a 00 77 53 30 bb 6f 14 04 ed 64 6e 6a 7c 34 0a c5 ff 58 84 7b 27 0b 86 b2 b4 be 17 2f fa 5e e8 e5 16 93 f4 d0 47 5d 41 d1 2d a2 69 39 87 a3 86 66 Data Ascii: YAu<PLY8=\pNQ8^n=MM"@<l+/jh\tWLQ"kM?MLrLP<L|>\[R}W(OnwzwE9(iW4-,bX*ckv`*q+;|<XgGHB[N|d#B-O~dw#2aRr1~EQEXG.tFKJ-Aeg8|ER)!Pud/]&(sQ5W<9(|3E|V{mzTJwS0odnj|4X{'/^G]A-i9f
                    Source: global trafficHTTP traffic detected: POST / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: 178.62.39.238:443Content-Length: 404Connection: Keep-AliveCache-Control: no-cacheData Raw: 7f ff 1f d0 a2 75 6e 6e 1f 92 d6 a6 dc e8 90 7e 4c 38 25 02 95 1d e0 e8 c7 57 09 e6 75 35 bc a5 fc ca 35 cc 54 c6 b2 5a 2a dc 5d de 03 44 14 67 e8 83 f3 c0 fc b9 0f cd de ce 7a 46 e1 41 52 48 ec 17 a5 82 29 da df b6 ab f6 47 41 74 f9 d8 5d 16 1c 3f 41 fc 59 87 97 ed e5 d9 0a 61 6e 19 01 42 94 eb 94 0a 6d a6 be 56 d0 ff bc 2b 8d ff 66 38 df cc 08 94 15 c8 4f cf 78 25 b2 8a 68 82 28 36 34 c0 65 5c 92 e0 6e 5d f5 3d 3f 5b 1b 00 87 95 34 09 8f e0 16 58 cb 70 75 ee 53 38 33 71 bc 5c 86 af a6 4b 5a 27 3f 9b 6e da c2 fb 82 de ca af 70 0d 6a 70 89 98 e0 6d 8b f3 38 ce f6 d1 c7 06 54 7b 3a f8 b1 21 2d 14 50 bf 62 16 e1 0c 01 e7 fa c7 44 ac 51 5b cc 45 2c fd 53 d1 a2 05 66 ea 60 d7 b8 fc ce cf 28 53 8f 50 af f7 3d 02 2b cf a1 11 e5 9c f2 71 d1 21 2e 98 6a 08 fb b2 d7 a2 dd cd 7b dd 5c 10 38 a3 da f0 b8 59 71 61 2f a1 cc d5 ff 5e 10 8d 91 a1 d2 85 16 68 a9 e2 b8 60 a3 2a 66 3e 7e 42 18 4c 38 44 a4 d0 e6 54 0c 95 0d 02 05 19 80 96 8c c1 39 8d 90 cc 0d 04 7f 2d 03 da 7a 2a 8c a0 99 74 43 e4 15 d6 de fd 78 1a 59 64 38 ba a7 6f a4 06 0d 1b 11 81 79 eb 46 03 8c 65 6f 6e d7 8f f0 dc b2 32 e6 71 24 69 21 42 0a 11 6d f9 29 5f 3b 90 86 91 cb a0 64 05 ed 94 52 2d 04 88 7a c7 fb 1b be 0d 1e ac 06 e7 6d e8 05 79 1e Data Ascii: unn~L8%Wu55TZ*]DgzFARH)GAt]?AYanBmV+f8Ox%h(64e\n]=?[4XpuS83q\KZ'?npjpm8T{:!-PbDQ[E,Sf`(SP=+q!.j{\8Yqa/^h`*f>~BL8DT9-z*tCxYd8oyFeon2q$i!Bm)_;dR-zmy
                    Source: global trafficHTTP traffic detected: POST / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: 79.172.249.82:443Content-Length: 388Connection: Keep-AliveCache-Control: no-cacheData Raw: 11 1e 7c 5e b6 2e f2 1f 58 9d c0 f2 81 bd 05 3d 92 21 e7 5f 8f 87 5a 10 3c b5 f3 13 d4 93 1d c4 1a 8b 67 ff e9 26 d8 03 e4 08 44 19 af 2c 38 1c 74 98 02 a8 d1 85 e0 8b 5f c8 d6 36 02 ba 4e 89 93 1e d7 6b d1 63 aa 2d f5 10 a0 d0 40 51 8d 91 e0 a5 c4 71 fb 8a a1 0b 84 51 47 0b dc 7b 7e 8f a6 1a 6e 9d c2 bd 64 86 fe d0 22 43 6d 50 24 5d 54 fa cf d3 18 c1 1e 46 62 a3 70 49 86 72 06 ee 36 21 8a 37 b0 14 89 5a 79 aa 59 cd 4e 8d 24 50 6c 8f 11 0f c9 7c e4 c7 cd de 63 00 d4 3c 08 9d a6 19 a4 ac a5 c0 d2 e1 3d f7 7a d1 2d 50 b1 0a 57 46 92 a7 a6 4c 98 e0 e9 48 9f 37 70 93 e2 47 55 8b 79 d6 bc 28 67 cb a4 12 b4 9c b4 55 5e b1 e6 3e 6d 0f 87 bb a7 08 6b c6 47 6a 0c bd 60 85 d3 7b 6b cb 04 c1 04 6d ac 73 a3 c4 c3 32 23 7d 54 d9 a9 93 36 ab 8c 21 3a 0c 53 6f f3 5b b9 68 79 bc 0b 05 be f8 ca 18 e9 e1 db 1c 12 58 2c e8 a1 9e d0 17 84 e2 0a ac 61 49 ea b8 8d 43 95 49 46 ff c5 13 25 64 0d 21 f6 e6 a8 d0 27 df cf bb 3d c8 ce 07 87 51 94 b2 27 18 f4 2d 87 1e b5 30 b0 b7 b6 d6 9c f0 cd 96 75 80 db 63 39 59 19 11 2b 78 6f a9 a2 ba 7e 0f 62 90 c2 f3 36 73 b8 37 0c 0f 2d 73 9e f5 95 d0 9f e3 63 77 a8 dd 88 85 f3 c7 1b e7 38 d2 17 d0 f2 24 a5 49 f6 da c8 4f 51 f2 6f 4e Data Ascii: |^.X=!_Z<g&D,8t_6Nkc-@QqQG{~nd"CmP$]TFbpIr6!7ZyYN$Pl|c<=z-PWFLH7pGUy(gU^>mkGj`{kms2#}T6!:So[hyX,aICIF%d!'=Q'-0uc9Y+xo~b6s7-scw8$IOQoN
                    Source: unknownTCP traffic detected without corresponding DNS query: 79.172.249.82
                    Source: unknownTCP traffic detected without corresponding DNS query: 79.172.249.82
                    Source: unknownTCP traffic detected without corresponding DNS query: 79.172.249.82
                    Source: unknownTCP traffic detected without corresponding DNS query: 79.172.249.82
                    Source: unknownTCP traffic detected without corresponding DNS query: 79.172.249.82
                    Source: unknownTCP traffic detected without corresponding DNS query: 79.172.249.82
                    Source: unknownTCP traffic detected without corresponding DNS query: 193.169.54.12
                    Source: unknownTCP traffic detected without corresponding DNS query: 193.169.54.12
                    Source: unknownTCP traffic detected without corresponding DNS query: 193.169.54.12
                    Source: unknownTCP traffic detected without corresponding DNS query: 173.230.145.224
                    Source: unknownTCP traffic detected without corresponding DNS query: 173.230.145.224
                    Source: unknownTCP traffic detected without corresponding DNS query: 173.230.145.224
                    Source: unknownTCP traffic detected without corresponding DNS query: 80.86.91.232
                    Source: unknownTCP traffic detected without corresponding DNS query: 80.86.91.232
                    Source: unknownTCP traffic detected without corresponding DNS query: 80.86.91.232
                    Source: unknownTCP traffic detected without corresponding DNS query: 167.114.153.153
                    Source: unknownTCP traffic detected without corresponding DNS query: 167.114.153.153
                    Source: unknownTCP traffic detected without corresponding DNS query: 167.114.153.153
                    Source: unknownTCP traffic detected without corresponding DNS query: 167.114.153.153
                    Source: unknownTCP traffic detected without corresponding DNS query: 167.114.153.153
                    Source: unknownTCP traffic detected without corresponding DNS query: 167.114.153.153
                    Source: unknownTCP traffic detected without corresponding DNS query: 167.114.153.153
                    Source: unknownTCP traffic detected without corresponding DNS query: 167.114.153.153
                    Source: unknownTCP traffic detected without corresponding DNS query: 167.114.153.153
                    Source: unknownTCP traffic detected without corresponding DNS query: 167.114.153.153
                    Source: unknownTCP traffic detected without corresponding DNS query: 167.114.153.153
                    Source: unknownTCP traffic detected without corresponding DNS query: 167.114.153.153
                    Source: unknownTCP traffic detected without corresponding DNS query: 167.114.153.153
                    Source: unknownTCP traffic detected without corresponding DNS query: 80.82.115.164
                    Source: unknownTCP traffic detected without corresponding DNS query: 167.114.153.153
                    Source: unknownTCP traffic detected without corresponding DNS query: 80.82.115.164
                    Source: unknownTCP traffic detected without corresponding DNS query: 80.82.115.164
                    Source: unknownTCP traffic detected without corresponding DNS query: 71.244.60.231
                    Source: unknownTCP traffic detected without corresponding DNS query: 71.244.60.231
                    Source: unknownTCP traffic detected without corresponding DNS query: 71.244.60.231
                    Source: unknownTCP traffic detected without corresponding DNS query: 186.103.199.252
                    Source: unknownTCP traffic detected without corresponding DNS query: 186.103.199.252
                    Source: unknownTCP traffic detected without corresponding DNS query: 186.103.199.252
                    Source: unknownTCP traffic detected without corresponding DNS query: 37.187.4.178
                    Source: unknownTCP traffic detected without corresponding DNS query: 37.187.4.178
                    Source: unknownTCP traffic detected without corresponding DNS query: 37.187.4.178
                    Source: unknownTCP traffic detected without corresponding DNS query: 159.203.94.198
                    Source: unknownTCP traffic detected without corresponding DNS query: 159.203.94.198
                    Source: unknownTCP traffic detected without corresponding DNS query: 159.203.94.198
                    Source: unknownTCP traffic detected without corresponding DNS query: 178.62.39.238
                    Source: unknownTCP traffic detected without corresponding DNS query: 178.62.39.238
                    Source: unknownTCP traffic detected without corresponding DNS query: 178.62.39.238
                    Source: unknownTCP traffic detected without corresponding DNS query: 178.62.39.238
                    Source: unknownTCP traffic detected without corresponding DNS query: 178.62.39.238
                    Source: unknownTCP traffic detected without corresponding DNS query: 178.62.39.238
                    Source: unknownHTTP traffic detected: POST / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: 79.172.249.82:443Content-Length: 420Connection: Keep-AliveCache-Control: no-cacheData Raw: 64 15 bd 9f bb 28 80 55 87 52 c0 ff d4 3c f7 e5 97 ae be b6 09 51 9c 77 77 ed 38 f6 d4 fe 22 da bb 96 3d 22 9d 57 37 0a 2f d4 3a 4d 6b 8b 5e e0 6c 13 21 be eb fe 2e c7 be ec 03 1d bc ba 6d 46 62 22 26 ae ef 33 53 6e 58 83 77 67 d9 64 ba 64 88 59 af 59 02 7d 74 2b 4f 12 54 7d c3 73 ae 77 98 e8 12 cd bc 7c 26 a1 ad a4 b2 5d fa 3f fc 1f 4a 1d 22 61 4c 5b cc 04 e6 69 91 ce f5 53 a1 08 f5 f8 bc 9c 11 8b 02 ef 02 0d 69 d6 83 69 6d b2 b6 6b 01 b7 a6 74 f0 e0 b0 2a 10 ff 0c 33 d8 ec fb e2 2f 41 a9 d7 c9 61 16 c2 64 d0 76 b6 85 3a a5 2a 13 55 ca 95 8c e9 03 76 00 7c 40 1e a0 57 9d cc 90 e4 92 fd 48 9f 73 94 06 15 63 bb bf df bf 84 bf a8 12 14 da e2 86 1c 57 30 23 29 02 c2 e7 7e 55 1f cc f0 91 f2 bf 93 4f c1 c2 00 7b ba d6 83 59 eb 5c 03 2c f7 43 b1 d8 30 1f 51 d4 42 64 da d9 73 fc e3 01 28 4c ea bf a3 f3 c0 af 9a eb e8 9c 98 57 6e f9 ac 4e ed 8f aa b7 96 37 2f 0a 4e 7d 2d 5d e6 3a 3f 1c 7b d4 fc 5e c2 d5 91 15 20 57 66 34 99 68 d0 15 6a 85 f0 dc d7 0c 4c 83 9f 3e 5a eb bb 0c b9 20 7c eb 42 75 73 76 c2 d2 0d 52 62 d0 55 85 9c 0a 89 eb 51 79 a9 07 0d bb 82 6f ef 51 8c 02 d5 8a e3 e5 23 63 d4 6a be ef f1 2f aa 4b be 00 45 b6 df 03 4a d2 b5 f4 c7 e5 41 97 66 94 3e af 67 6c 5a c1 b9 ab 2d 3d 4e 8e 85 c4 e9 89 63 4a 4a 3e aa 04 52 c8 1d 6b dc fd 7b 0b 9d Data Ascii: d(UR<Qww8"="W7/:Mk^l!.mFb"&3SnXwgddYY}t+OT}sw|&]?J"aL[iSiimkt*3/Aadv:*Uv|@WHscW0#)~UO{Y\,C0QBds(LWnN7/N}-]:?{^ Wf4hjL>Z |BusvRbUQyoQ#cj/KEJAf>glZ-=NcJJ>Rk{
                    Source: windowdcom.exe, 00000003.00000002.1275834541.0000000000B78000.00000004.00000020.sdmpString found in binary or memory: http://159.203.94.198:4143/
                    Source: windowdcom.exe, 00000003.00000002.1275834541.0000000000B78000.00000004.00000020.sdmpString found in binary or memory: http://167.114.153.153/
                    Source: windowdcom.exe, 00000003.00000002.1275834541.0000000000B78000.00000004.00000020.sdmpString found in binary or memory: http://178.62.39.238:443/
                    Source: windowdcom.exe, 00000003.00000002.1276048500.0000000000BF0000.00000004.00000020.sdmpString found in binary or memory: http://178.62.39.238:443//
                    Source: windowdcom.exe, 00000003.00000002.1275834541.0000000000B78000.00000004.00000020.sdmpString found in binary or memory: http://186.103.199.252:4143/
                    Source: windowdcom.exe, 00000003.00000002.1275834541.0000000000B78000.00000004.00000020.sdmpString found in binary or memory: http://37.187.4.178/
                    Source: windowdcom.exe, 00000003.00000002.1276048500.0000000000BF0000.00000004.00000020.sdmpString found in binary or memory: http://71.244.60.231:4143/
                    Source: windowdcom.exe, 00000003.00000003.902142006.0000000000BF0000.00000004.00000001.sdmpString found in binary or memory: http://71.244.60.231:4143/%
                    Source: windowdcom.exe, 00000003.00000003.902142006.0000000000BF0000.00000004.00000001.sdmpString found in binary or memory: http://71.244.60.231:4143/AES
                    Source: windowdcom.exe, 00000003.00000002.1276048500.0000000000BF0000.00000004.00000020.sdmpString found in binary or memory: http://71.244.60.231:4143/E
                    Source: windowdcom.exe, 00000003.00000002.1275834541.0000000000B78000.00000004.00000020.sdmp, windowdcom.exe, 00000003.00000003.278462097.0000000000BB2000.00000004.00000001.sdmpString found in binary or memory: http://79.172.249.82:443/
                    Source: windowdcom.exe, 00000003.00000002.1276048500.0000000000BF0000.00000004.00000020.sdmpString found in binary or memory: http://79.172.249.82:443//
                    Source: windowdcom.exe, 00000003.00000002.1276048500.0000000000BF0000.00000004.00000020.sdmpString found in binary or memory: http://79.172.249.82:443//5
                    Source: windowdcom.exe, 00000003.00000002.1276048500.0000000000BF0000.00000004.00000020.sdmpString found in binary or memory: http://79.172.249.82:443/3.94.198:4143/
                    Source: windowdcom.exe, 00000003.00000002.1276048500.0000000000BF0000.00000004.00000020.sdmpString found in binary or memory: http://79.172.249.82:443/=
                    Source: windowdcom.exe, 00000003.00000002.1275834541.0000000000B78000.00000004.00000020.sdmpString found in binary or memory: http://79.172.249.82:443/p%
                    Source: windowdcom.exe, 00000003.00000003.902142006.0000000000BF0000.00000004.00000001.sdmpString found in binary or memory: http://80.82.115.164:4143/
                    Source: windowdcom.exe, 00000003.00000003.902142006.0000000000BF0000.00000004.00000001.sdmpString found in binary or memory: http://80.82.115.164:4143/-
                    Source: windowdcom.exe, 00000003.00000003.902142006.0000000000BF0000.00000004.00000001.sdmpString found in binary or memory: http://80.82.115.164:4143/5
                    Source: svchost.exe, 0000001B.00000003.813605285.00000148F132E000.00000004.00000001.sdmpString found in binary or memory: http://Passport.NET/STS
                    Source: svchost.exe, 0000001B.00000003.822982893.00000148F133B000.00000004.00000001.sdmpString found in binary or memory: http://Passport.NET/STS09/xmldsig#ripledes-cbcices/PPCRLwssecurity-utility-1.0.xsd
                    Source: svchost.exe, 0000001B.00000002.1211409705.00000148F1A02000.00000004.00000001.sdmpString found in binary or memory: http://Passport.NET/tbpose
                    Source: windowdcom.exe, 00000003.00000002.1275834541.0000000000B78000.00000004.00000020.sdmpString found in binary or memory: http://apps.identrust.com/roots/dstrootcax3.p7c0
                    Source: svchost.exe, 0000001B.00000002.1210398171.00000148F0CDC000.00000004.00000001.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0
                    Source: svchost.exe, 0000001B.00000002.1210384278.00000148F0CD6000.00000004.00000001.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2SecureServerCA-2.crt0
                    Source: windowdcom.exe, 00000003.00000002.1275834541.0000000000B78000.00000004.00000020.sdmpString found in binary or memory: http://cps.letsencrypt.org0
                    Source: windowdcom.exe, 00000003.00000002.1275834541.0000000000B78000.00000004.00000020.sdmpString found in binary or memory: http://cps.root-x1.letsencrypt.org0
                    Source: windowdcom.exe, 00000003.00000002.1275834541.0000000000B78000.00000004.00000020.sdmpString found in binary or memory: http://crl.identrust.com/DSTROOTCAX3CRL.crl0
                    Source: svchost.exe, 0000001B.00000002.1210398171.00000148F0CDC000.00000004.00000001.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl07
                    Source: svchost.exe, 0000001B.00000002.1210384278.00000148F0CD6000.00000004.00000001.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertSHA2SecureServerCA.crl0=
                    Source: svchost.exe, 00000006.00000002.598391848.0000013C6860F000.00000004.00000001.sdmpString found in binary or memory: http://crl3.digicert.com/Omniroot2025.crl0
                    Source: svchost.exe, 0000001B.00000002.1210398171.00000148F0CDC000.00000004.00000001.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootCA.crl00
                    Source: svchost.exe, 0000001B.00000002.1210384278.00000148F0CD6000.00000004.00000001.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertSHA2SecureServerCA.crl0
                    Source: svchost.exe, 0000001B.00000002.1210270479.00000148F0C8F000.00000004.00000001.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd
                    Source: svchost.exe, 0000001B.00000002.1210656738.00000148F1364000.00000004.00000001.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsdH
                    Source: svchost.exe, 0000001B.00000002.1210656738.00000148F1364000.00000004.00000001.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsds
                    Source: svchost.exe, 0000001B.00000002.1210270479.00000148F0C8F000.00000004.00000001.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd
                    Source: svchost.exe, 0000001B.00000003.822982893.00000148F133B000.00000004.00000001.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsdP
                    Source: svchost.exe, 0000001B.00000002.1210212208.00000148F0C7F000.00000004.00000001.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/XX/oasis-2004XX-wss-
                    Source: svchost.exe, 0000001B.00000003.1209653226.00000148F0C5A000.00000004.00000001.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/XX/oasis-2004XX-wss-saml-token-profile-1.0#SAMLAssertionID
                    Source: CCFEED7EF3CD3BBD21329435542A98D2_9C2DDAC79C917837883918D6BB58BE90.27.drString found in binary or memory: http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQQX6Z6gAidtSefNc6DC0OInqPHDQQUD4BhHIIxYdUvKOe
                    Source: svchost.exe, 0000001B.00000002.1210398171.00000148F0CDC000.00000004.00000001.sdmpString found in binary or memory: http://ocsp.digicert.com0
                    Source: svchost.exe, 00000006.00000002.598391848.0000013C6860F000.00000004.00000001.sdmpString found in binary or memory: http://ocsp.digicert.com0:
                    Source: svchost.exe, 0000001B.00000002.1210384278.00000148F0CD6000.00000004.00000001.sdmpString found in binary or memory: http://ocsp.digicert.com0H
                    Source: svchost.exe, 0000001B.00000002.1210177736.00000148F0C5D000.00000004.00000001.sdmpString found in binary or memory: http://ocsp.digicert.comhttp://crl3.digicert.com/DigiCertGlobalRootCA.crlhttp://crl4.digicert.com/Di
                    Source: svchost.exe, 0000001B.00000002.1210398171.00000148F0CDC000.00000004.00000001.sdmpString found in binary or memory: http://ocsp.digicert.comhttp://crl3.digicert.com/DigiCertSHA2SecureServerCA.crlhttp://crl4.digicert.
                    Source: svchost.exe, 00000006.00000002.598391848.0000013C6860F000.00000004.00000001.sdmpString found in binary or memory: http://ocsp.msocsp.com0
                    Source: svchost.exe, 0000001B.00000002.1210177736.00000148F0C5D000.00000004.00000001.sdmpString found in binary or memory: http://passport.net/tb
                    Source: windowdcom.exe, 00000003.00000002.1275834541.0000000000B78000.00000004.00000020.sdmpString found in binary or memory: http://r3.i.lencr.org/0-
                    Source: windowdcom.exe, 00000003.00000002.1275834541.0000000000B78000.00000004.00000020.sdmpString found in binary or memory: http://r3.o.lencr.org0
                    Source: svchost.exe, 0000001B.00000003.817470104.00000148F1357000.00000004.00000001.sdmpString found in binary or memory: http://schemas.mi
                    Source: svchost.exe, 0000001B.00000002.1210610354.00000148F1337000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous
                    Source: svchost.exe, 0000001B.00000002.1210270479.00000148F0C8F000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/09/policy
                    Source: svchost.exe, 0000001B.00000002.1210610354.00000148F1337000.00000004.00000001.sdmp, svchost.exe, 0000001B.00000003.817546441.00000148F1362000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/sc
                    Source: svchost.exe, 0000001B.00000002.1210610354.00000148F1337000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/sc2
                    Source: svchost.exe, 0000001B.00000003.822982893.00000148F133B000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/scRL
                    Source: svchost.exe, 0000001B.00000002.1210610354.00000148F1337000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/sc_0
                    Source: svchost.exe, 0000001B.00000002.1210610354.00000148F1337000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/scc8=
                    Source: svchost.exe, 0000001B.00000002.1210610354.00000148F1337000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/scon
                    Source: svchost.exe, 0000001B.00000003.823655029.00000148F1379000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/scr
                    Source: svchost.exe, 0000001B.00000002.1210270479.00000148F0C8F000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust
                    Source: svchost.exe, 0000001B.00000002.1210610354.00000148F1337000.00000004.00000001.sdmp, svchost.exe, 0000001B.00000003.823013548.00000148F1332000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/Issue
                    Source: svchost.exe, 0000001B.00000003.822982893.00000148F133B000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RST/Issue
                    Source: svchost.exe, 0000001B.00000002.1210610354.00000148F1337000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/Issue
                    Source: svchost.exe, 0000001B.00000003.823655029.00000148F1379000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trustpi7
                    Source: svchost.exe, 0000001D.00000002.961089640.0000021C5EF30000.00000002.00000001.sdmpString found in binary or memory: http://wellformedweb.org/CommentAPI/
                    Source: svchost.exe, 00000009.00000002.308009587.0000020842013000.00000004.00000001.sdmpString found in binary or memory: http://www.bingmapsportal.com
                    Source: svchost.exe, 0000001B.00000002.1210384278.00000148F0CD6000.00000004.00000001.sdmpString found in binary or memory: http://www.digicert.com/CPS0~
                    Source: svchost.exe, 00000007.00000002.1275929879.000002544DE43000.00000004.00000001.sdmpString found in binary or memory: https://%s.dnet.xboxlive.com
                    Source: svchost.exe, 00000007.00000002.1275929879.000002544DE43000.00000004.00000001.sdmpString found in binary or memory: https://%s.xboxlive.com
                    Source: windowdcom.exe, 00000003.00000002.1275834541.0000000000B78000.00000004.00000020.sdmpString found in binary or memory: https://167.114.153.153/
                    Source: windowdcom.exe, 00000003.00000002.1275834541.0000000000B78000.00000004.00000020.sdmpString found in binary or memory: https://167.114.153.153/V
                    Source: svchost.exe, 0000001B.00000003.813413159.00000148F134B000.00000004.00000001.sdmpString found in binary or memory: https://account.live.com/InlineSignup.aspx?iww=1&id=80502
                    Source: svchost.exe, 0000001B.00000002.1210131119.00000148F0C46000.00000004.00000001.sdmpString found in binary or memory: https://account.live.com/InlineSignup.aspx?iww=1&id=80502ssuer0
                    Source: svchost.exe, 0000001B.00000003.813413159.00000148F134B000.00000004.00000001.sdmp, svchost.exe, 0000001B.00000003.813343188.00000148F1350000.00000004.00000001.sdmp, svchost.exe, 0000001B.00000003.813301133.00000148F132E000.00000004.00000001.sdmp, svchost.exe, 0000001B.00000003.813421288.00000148F1329000.00000004.00000001.sdmp, svchost.exe, 0000001B.00000002.1210131119.00000148F0C46000.00000004.00000001.sdmp, svchost.exe, 0000001B.00000003.825107674.00000148F0D02000.00000004.00000001.sdmpString found in binary or memory: https://account.live.com/Wizard/Password/Change?id=80601
                    Source: svchost.exe, 0000001B.00000003.813343188.00000148F1350000.00000004.00000001.sdmp, svchost.exe, 0000001B.00000003.813301133.00000148F132E000.00000004.00000001.sdmp, svchost.exe, 0000001B.00000003.813421288.00000148F1329000.00000004.00000001.sdmpString found in binary or memory: https://account.live.com/inlinesignup.aspx?iww=1&amp;id=80600
                    Source: svchost.exe, 0000001B.00000003.813343188.00000148F1350000.00000004.00000001.sdmp, svchost.exe, 0000001B.00000003.813301133.00000148F132E000.00000004.00000001.sdmp, svchost.exe, 0000001B.00000003.813421288.00000148F1329000.00000004.00000001.sdmp, svchost.exe, 0000001B.00000003.825107674.00000148F0D02000.00000004.00000001.sdmpString found in binary or memory: https://account.live.com/inlinesignup.aspx?iww=1&amp;id=80601
                    Source: svchost.exe, 0000001B.00000003.813421288.00000148F1329000.00000004.00000001.sdmp, svchost.exe, 0000001B.00000003.813334291.00000148F1377000.00000004.00000001.sdmpString found in binary or memory: https://account.live.com/inlinesignup.aspx?iww=1&amp;id=80603
                    Source: svchost.exe, 0000001B.00000003.813421288.00000148F1329000.00000004.00000001.sdmp, svchost.exe, 0000001B.00000003.813334291.00000148F1377000.00000004.00000001.sdmpString found in binary or memory: https://account.live.com/inlinesignup.aspx?iww=1&amp;id=80604
                    Source: svchost.exe, 0000001B.00000003.813421288.00000148F1329000.00000004.00000001.sdmp, svchost.exe, 0000001B.00000003.813334291.00000148F1377000.00000004.00000001.sdmpString found in binary or memory: https://account.live.com/inlinesignup.aspx?iww=1&amp;id=80605
                    Source: svchost.exe, 0000001B.00000003.813413159.00000148F134B000.00000004.00000001.sdmp, svchost.exe, 0000001B.00000002.1210131119.00000148F0C46000.00000004.00000001.sdmpString found in binary or memory: https://account.live.com/inlinesignup.aspx?iww=1&id=80600
                    Source: svchost.exe, 0000001B.00000003.813413159.00000148F134B000.00000004.00000001.sdmpString found in binary or memory: https://account.live.com/inlinesignup.aspx?iww=1&id=80601
                    Source: svchost.exe, 0000001B.00000002.1210131119.00000148F0C46000.00000004.00000001.sdmpString found in binary or memory: https://account.live.com/inlinesignup.aspx?iww=1&id=80601I
                    Source: svchost.exe, 0000001B.00000003.813413159.00000148F134B000.00000004.00000001.sdmpString found in binary or memory: https://account.live.com/inlinesignup.aspx?iww=1&id=80603
                    Source: svchost.exe, 0000001B.00000002.1210177736.00000148F0C5D000.00000004.00000001.sdmpString found in binary or memory: https://account.live.com/inlinesignup.aspx?iww=1&id=80604
                    Source: svchost.exe, 0000001B.00000003.813413159.00000148F134B000.00000004.00000001.sdmp, svchost.exe, 0000001B.00000002.1210177736.00000148F0C5D000.00000004.00000001.sdmpString found in binary or memory: https://account.live.com/inlinesignup.aspx?iww=1&id=80605
                    Source: svchost.exe, 0000001B.00000003.813514950.00000148F1348000.00000004.00000001.sdmp, svchost.exe, 0000001B.00000003.813421288.00000148F1329000.00000004.00000001.sdmp, svchost.exe, 0000001B.00000003.813334291.00000148F1377000.00000004.00000001.sdmpString found in binary or memory: https://account.live.com/msangcwam
                    Source: svchost.exe, 0000001B.00000003.825107674.00000148F0D02000.00000004.00000001.sdmpString found in binary or memory: https://account.livex
                    Source: svchost.exe, 00000007.00000002.1275929879.000002544DE43000.00000004.00000001.sdmpString found in binary or memory: https://activity.windows.com
                    Source: svchost.exe, 00000007.00000002.1275929879.000002544DE43000.00000004.00000001.sdmpString found in binary or memory: https://activity.windows.comr
                    Source: svchost.exe, 00000009.00000003.307699187.0000020842060000.00000004.00000001.sdmpString found in binary or memory: https://appexmapsappupdate.blob.core.windows.net
                    Source: svchost.exe, 00000007.00000002.1275929879.000002544DE43000.00000004.00000001.sdmpString found in binary or memory: https://bn2.notify.windows.com/v2/register/xplatform/device
                    Source: svchost.exe, 00000007.00000002.1275929879.000002544DE43000.00000004.00000001.sdmpString found in binary or memory: https://co4-df.notify.windows.com/v2/register/xplatform/device
                    Source: svchost.exe, 00000009.00000003.307704369.0000020842049000.00000004.00000001.sdmpString found in binary or memory: https://dev.ditu.live.com/REST/v1/Imagery/Copyright/
                    Source: svchost.exe, 00000009.00000003.307699187.0000020842060000.00000004.00000001.sdmpString found in binary or memory: https://dev.ditu.live.com/REST/v1/Locations
                    Source: svchost.exe, 00000009.00000002.308058591.000002084203D000.00000004.00000001.sdmpString found in binary or memory: https://dev.ditu.live.com/REST/v1/Routes/
                    Source: svchost.exe, 00000009.00000003.307699187.0000020842060000.00000004.00000001.sdmpString found in binary or memory: https://dev.ditu.live.com/mapcontrol/logging.ashx
                    Source: svchost.exe, 00000009.00000003.307704369.0000020842049000.00000004.00000001.sdmpString found in binary or memory: https://dev.ditu.live.com/mapcontrol/mapconfiguration.ashx?name=native&v=
                    Source: svchost.exe, 00000009.00000003.285964964.0000020842030000.00000004.00000001.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/JsonFilter/VenueMaps/data/
                    Source: svchost.exe, 00000009.00000003.307699187.0000020842060000.00000004.00000001.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Locations
                    Source: svchost.exe, 00000009.00000002.308058591.000002084203D000.00000004.00000001.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Routes/
                    Source: svchost.exe, 00000009.00000003.307699187.0000020842060000.00000004.00000001.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Routes/Driving
                    Source: svchost.exe, 00000009.00000003.307699187.0000020842060000.00000004.00000001.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Routes/Transit
                    Source: svchost.exe, 00000009.00000003.307699187.0000020842060000.00000004.00000001.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Routes/Walking
                    Source: svchost.exe, 00000009.00000003.285964964.0000020842030000.00000004.00000001.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Traffic/Incidents/
                    Source: svchost.exe, 00000009.00000003.307792601.0000020842041000.00000004.00000001.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Transit/Schedules/
                    Source: svchost.exe, 00000009.00000003.307792601.0000020842041000.00000004.00000001.sdmpString found in binary or memory: https://dev.virtualearth.net/mapcontrol/HumanScaleServices/GetBubbles.ashx?n=
                    Source: svchost.exe, 00000009.00000003.307699187.0000020842060000.00000004.00000001.sdmpString found in binary or memory: https://dev.virtualearth.net/mapcontrol/logging.ashx
                    Source: svchost.exe, 00000009.00000003.307704369.0000020842049000.00000004.00000001.sdmpString found in binary or memory: https://dev.virtualearth.net/webservices/v1/LoggingService/LoggingService.svc/Log?
                    Source: svchost.exe, 00000009.00000003.307704369.0000020842049000.00000004.00000001.sdmpString found in binary or memory: https://dynamic.api.tiles.ditu.live.com/odvs/gd?pv=1&r=
                    Source: svchost.exe, 00000009.00000003.307704369.0000020842049000.00000004.00000001.sdmpString found in binary or memory: https://dynamic.api.tiles.ditu.live.com/odvs/gdi?pv=1&r=
                    Source: svchost.exe, 00000009.00000003.307704369.0000020842049000.00000004.00000001.sdmpString found in binary or memory: https://dynamic.api.tiles.ditu.live.com/odvs/gdv?pv=1&r=
                    Source: svchost.exe, 00000009.00000002.308083238.0000020842064000.00000004.00000001.sdmp, svchost.exe, 00000009.00000003.307792601.0000020842041000.00000004.00000001.sdmpString found in binary or memory: https://dynamic.t
                    Source: svchost.exe, 00000009.00000003.307699187.0000020842060000.00000004.00000001.sdmpString found in binary or memory: https://dynamic.t0.tiles.ditu.live.com/comp/gen.ashx
                    Source: svchost.exe, 00000009.00000003.285964964.0000020842030000.00000004.00000001.sdmp, svchost.exe, 00000009.00000002.308058591.000002084203D000.00000004.00000001.sdmpString found in binary or memory: https://ecn.dev.virtualearth.net/REST/v1/Imagery/Copyright/
                    Source: svchost.exe, 00000009.00000003.285964964.0000020842030000.00000004.00000001.sdmpString found in binary or memory: https://ecn.dev.virtualearth.net/mapcontrol/mapconfiguration.ashx?name=native&v=
                    Source: svchost.exe, 0000001B.00000003.825047154.00000148F1A05000.00000004.00000001.sdmp, svchost.exe, 0000001B.00000002.1210270479.00000148F0C8F000.00000004.00000001.sdmpString found in binary or memory: https://login.live.com/
                    Source: svchost.exe, 0000001B.00000003.813310129.00000148F133B000.00000004.00000001.sdmpString found in binary or memory: https://login.live.com/ApproveSession.srf
                    Source: svchost.exe, 0000001B.00000003.813545902.00000148F1369000.00000004.00000001.sdmpString found in binary or memory: https://login.live.com/ApproveSession.srf?iww=1
                    Source: svchost.exe, 0000001B.00000002.1210177736.00000148F0C5D000.00000004.00000001.sdmpString found in binary or memory: https://login.live.com/ApproveSession.srfH
                    Source: svchost.exe, 0000001B.00000003.825107674.00000148F0D02000.00000004.00000001.sdmpString found in binary or memory: https://login.live.com/IfExi
                    Source: svchost.exe, 0000001B.00000003.813301133.00000148F132E000.00000004.00000001.sdmpString found in binary or memory: https://login.live.com/IfExists.srf?uiflavor=4&amp;id=80502
                    Source: svchost.exe, 0000001B.00000003.813343188.00000148F1350000.00000004.00000001.sdmp, svchost.exe, 0000001B.00000003.813301133.00000148F132E000.00000004.00000001.sdmp, svchost.exe, 0000001B.00000003.813421288.00000148F1329000.00000004.00000001.sdmpString found in binary or memory: https://login.live.com/IfExists.srf?uiflavor=4&amp;id=80600
                    Source: svchost.exe, 0000001B.00000003.813343188.00000148F1350000.00000004.00000001.sdmp, svchost.exe, 0000001B.00000003.813301133.00000148F132E000.00000004.00000001.sdmp, svchost.exe, 0000001B.00000003.813421288.00000148F1329000.00000004.00000001.sdmp, svchost.exe, 0000001B.00000003.825107674.00000148F0D02000.00000004.00000001.sdmpString found in binary or memory: https://login.live.com/IfExists.srf?uiflavor=4&amp;id=80601
                    Source: svchost.exe, 0000001B.00000003.813641140.00000148F130E000.00000004.00000001.sdmp, svchost.exe, 0000001B.00000002.1210177736.00000148F0C5D000.00000004.00000001.sdmpString found in binary or memory: https://login.live.com/IfExists.srf?uiflavor=4&id=80502
                    Source: svchost.exe, 0000001B.00000003.813436216.00000148F130E000.00000004.00000001.sdmp, svchost.exe, 0000001B.00000002.1210177736.00000148F0C5D000.00000004.00000001.sdmpString found in binary or memory: https://login.live.com/IfExists.srf?uiflavor=4&id=80600
                    Source: svchost.exe, 0000001B.00000003.813436216.00000148F130E000.00000004.00000001.sdmp, svchost.exe, 0000001B.00000002.1210177736.00000148F0C5D000.00000004.00000001.sdmpString found in binary or memory: https://login.live.com/IfExists.srf?uiflavor=4&id=80601
                    Source: svchost.exe, 0000001B.00000003.813514950.00000148F1348000.00000004.00000001.sdmp, svchost.exe, 0000001B.00000002.1210104992.00000148F0C29000.00000004.00000001.sdmpString found in binary or memory: https://login.live.com/ListSessions.srf
                    Source: svchost.exe, 0000001B.00000002.1210104992.00000148F0C29000.00000004.00000001.sdmp, svchost.exe, 0000001B.00000003.813310129.00000148F133B000.00000004.00000001.sdmp, svchost.exe, 0000001B.00000002.1210177736.00000148F0C5D000.00000004.00000001.sdmpString found in binary or memory: https://login.live.com/ManageApprover.srf
                    Source: svchost.exe, 0000001B.00000003.813310129.00000148F133B000.00000004.00000001.sdmp, svchost.exe, 0000001B.00000003.813545902.00000148F1369000.00000004.00000001.sdmp, svchost.exe, 0000001B.00000002.1210177736.00000148F0C5D000.00000004.00000001.sdmpString found in binary or memory: https://login.live.com/ManageLoginKeys.srf
                    Source: svchost.exe, 0000001B.00000002.1210384278.00000148F0CD6000.00000004.00000001.sdmp, svchost.exe, 0000001B.00000002.1210573981.00000148F1313000.00000004.00000001.sdmp, svchost.exe, 0000001B.00000003.825092954.00000148F0CFD000.00000004.00000001.sdmp, svchost.exe, 0000001B.00000002.1210131119.00000148F0C46000.00000004.00000001.sdmp, svchost.exe, 0000001B.00000002.1210177736.00000148F0C5D000.00000004.00000001.sdmp, svchost.exe, 0000001B.00000003.825107674.00000148F0D02000.00000004.00000001.sdmpString found in binary or memory: https://login.live.com/RST2.srf
                    Source: svchost.exe, 0000001B.00000003.813514950.00000148F1348000.00000004.00000001.sdmp, svchost.exe, 0000001B.00000003.825107674.00000148F0D02000.00000004.00000001.sdmpString found in binary or memory: https://login.live.com/didtou.srf
                    Source: svchost.exe, 0000001B.00000003.813514950.00000148F1348000.00000004.00000001.sdmpString found in binary or memory: https://login.live.com/getrealminfo.srf
                    Source: svchost.exe, 0000001B.00000003.813514950.00000148F1348000.00000004.00000001.sdmpString found in binary or memory: https://login.live.com/getuserrealm.srf
                    Source: svchost.exe, 0000001B.00000003.825107674.00000148F0D02000.00000004.00000001.sdmpString found in binary or memory: https://login.live.com/ppsecunlineLog
                    Source: svchost.exe, 0000001B.00000003.813436216.00000148F130E000.00000004.00000001.sdmp, svchost.exe, 0000001B.00000002.1210131119.00000148F0C46000.00000004.00000001.sdmp, svchost.exe, 0000001B.00000002.1210177736.00000148F0C5D000.00000004.00000001.sdmp, svchost.exe, 0000001B.00000003.825107674.00000148F0D02000.00000004.00000001.sdmpString found in binary or memory: https://login.live.com/ppsecure/DeviceAssociate.srf
                    Source: svchost.exe, 0000001B.00000003.813364124.00000148F1363000.00000004.00000001.sdmp, svchost.exe, 0000001B.00000002.1210177736.00000148F0C5D000.00000004.00000001.sdmp, svchost.exe, 0000001B.00000003.825107674.00000148F0D02000.00000004.00000001.sdmpString found in binary or memory: https://login.live.com/ppsecure/DeviceDisassociate.srf
                    Source: svchost.exe, 0000001B.00000003.813310129.00000148F133B000.00000004.00000001.sdmp, svchost.exe, 0000001B.00000002.1210177736.00000148F0C5D000.00000004.00000001.sdmp, svchost.exe, 0000001B.00000003.825107674.00000148F0D02000.00000004.00000001.sdmpString found in binary or memory: https://login.live.com/ppsecure/DeviceQuery.srf
                    Source: svchost.exe, 0000001B.00000003.813364124.00000148F1363000.00000004.00000001.sdmp, svchost.exe, 0000001B.00000002.1210177736.00000148F0C5D000.00000004.00000001.sdmp, svchost.exe, 0000001B.00000003.825107674.00000148F0D02000.00000004.00000001.sdmpString found in binary or memory: https://login.live.com/ppsecure/DeviceUpdate.srf
                    Source: svchost.exe, 0000001B.00000003.813364124.00000148F1363000.00000004.00000001.sdmp, svchost.exe, 0000001B.00000002.1210177736.00000148F0C5D000.00000004.00000001.sdmp, svchost.exe, 0000001B.00000003.825107674.00000148F0D02000.00000004.00000001.sdmpString found in binary or memory: https://login.live.com/ppsecure/EnumerateDevices.srf
                    Source: svchost.exe, 0000001B.00000002.1210104992.00000148F0C29000.00000004.00000001.sdmp, svchost.exe, 0000001B.00000003.813310129.00000148F133B000.00000004.00000001.sdmp, svchost.exe, 0000001B.00000002.1210177736.00000148F0C5D000.00000004.00000001.sdmpString found in binary or memory: https://login.live.com/ppsecure/GetAppData.srf
                    Source: svchost.exe, 0000001B.00000003.813545902.00000148F1369000.00000004.00000001.sdmpString found in binary or memory: https://login.live.com/ppsecure/GetAppData.srf?
                    Source: svchost.exe, 0000001B.00000002.1210104992.00000148F0C29000.00000004.00000001.sdmpString found in binary or memory: https://login.live.com/ppsecure/GetAppData.srfrfrf6085fid=cplive.com
                    Source: svchost.exe, 0000001B.00000003.813430606.00000148F1335000.00000004.00000001.sdmpString found in binary or memory: https://login.live.com/ppsecure/GetAppData.srfsrfsrf060805&fid=cp.live.com
                    Source: svchost.exe, 0000001B.00000003.813364124.00000148F1363000.00000004.00000001.sdmp, svchost.exe, 0000001B.00000002.1210177736.00000148F0C5D000.00000004.00000001.sdmpString found in binary or memory: https://login.live.com/ppsecure/GetUserKeyData.srf
                    Source: svchost.exe, 0000001B.00000003.813364124.00000148F1363000.00000004.00000001.sdmp, svchost.exe, 0000001B.00000002.1210177736.00000148F0C5D000.00000004.00000001.sdmpString found in binary or memory: https://login.live.com/ppsecure/InlineClientAuth.srf
                    Source: svchost.exe, 0000001B.00000003.825107674.00000148F0D02000.00000004.00000001.sdmpString found in binary or memory: https://login.live.com/ppsecure/InlineConneH
                    Source: svchost.exe, 0000001B.00000003.813413159.00000148F134B000.00000004.00000001.sdmp, svchost.exe, 0000001B.00000003.813343188.00000148F1350000.00000004.00000001.sdmp, svchost.exe, 0000001B.00000003.813301133.00000148F132E000.00000004.00000001.sdmp, svchost.exe, 0000001B.00000003.813421288.00000148F1329000.00000004.00000001.sdmpString found in binary or memory: https://login.live.com/ppsecure/InlineConnect.srf?id=80600
                    Source: svchost.exe, 0000001B.00000003.813413159.00000148F134B000.00000004.00000001.sdmp, svchost.exe, 0000001B.00000003.813343188.00000148F1350000.00000004.00000001.sdmp, svchost.exe, 0000001B.00000003.813301133.00000148F132E000.00000004.00000001.sdmp, svchost.exe, 0000001B.00000003.813421288.00000148F1329000.00000004.00000001.sdmpString found in binary or memory: https://login.live.com/ppsecure/InlineConnect.srf?id=80601
                    Source: svchost.exe, 0000001B.00000003.813413159.00000148F134B000.00000004.00000001.sdmp, svchost.exe, 0000001B.00000003.813421288.00000148F1329000.00000004.00000001.sdmp, svchost.exe, 0000001B.00000002.1210131119.00000148F0C46000.00000004.00000001.sdmp, svchost.exe, 0000001B.00000003.813334291.00000148F1377000.00000004.00000001.sdmpString found in binary or memory: https://login.live.com/ppsecure/InlineConnect.srf?id=80603
                    Source: svchost.exe, 0000001B.00000003.813413159.00000148F134B000.00000004.00000001.sdmp, svchost.exe, 0000001B.00000003.813421288.00000148F1329000.00000004.00000001.sdmp, svchost.exe, 0000001B.00000002.1210177736.00000148F0C5D000.00000004.00000001.sdmp, svchost.exe, 0000001B.00000003.813334291.00000148F1377000.00000004.00000001.sdmpString found in binary or memory: https://login.live.com/ppsecure/InlineConnect.srf?id=80604
                    Source: svchost.exe, 0000001B.00000003.813364124.00000148F1363000.00000004.00000001.sdmp, svchost.exe, 0000001B.00000002.1210177736.00000148F0C5D000.00000004.00000001.sdmpString found in binary or memory: https://login.live.com/ppsecure/InlineDesktop.srf
                    Source: svchost.exe, 0000001B.00000002.1210131119.00000148F0C46000.00000004.00000001.sdmpString found in binary or memory: https://login.live.com/ppsecure/InlineLogin.srf?id=80502
                    Source: svchost.exe, 0000001B.00000003.813413159.00000148F134B000.00000004.00000001.sdmp, svchost.exe, 0000001B.00000003.813301133.00000148F132E000.00000004.00000001.sdmp, svchost.exe, 0000001B.00000002.1210131119.00000148F0C46000.00000004.00000001.sdmpString found in binary or memory: https://login.live.com/ppsecure/InlineLogin.srf?id=80600
                    Source: svchost.exe, 0000001B.00000003.813413159.00000148F134B000.00000004.00000001.sdmp, svchost.exe, 0000001B.00000003.813343188.00000148F1350000.00000004.00000001.sdmp, svchost.exe, 0000001B.00000003.813301133.00000148F132E000.00000004.00000001.sdmp, svchost.exe, 0000001B.00000003.813421288.00000148F1329000.00000004.00000001.sdmp, svchost.exe, 0000001B.00000003.825107674.00000148F0D02000.00000004.00000001.sdmpString found in binary or memory: https://login.live.com/ppsecure/InlineLogin.srf?id=80601
                    Source: svchost.exe, 0000001B.00000003.813413159.00000148F134B000.00000004.00000001.sdmp, svchost.exe, 0000001B.00000003.813421288.00000148F1329000.00000004.00000001.sdmp, svchost.exe, 0000001B.00000002.1210131119.00000148F0C46000.00000004.00000001.sdmp, svchost.exe, 0000001B.00000003.813334291.00000148F1377000.00000004.00000001.sdmpString found in binary or memory: https://login.live.com/ppsecure/InlineLogin.srf?id=80603
                    Source: svchost.exe, 0000001B.00000003.813334291.00000148F1377000.00000004.00000001.sdmpString found in binary or memory: https://login.live.com/ppsecure/InlineLogin.srf?id=80604
                    Source: svchost.exe, 0000001B.00000003.813413159.00000148F134B000.00000004.00000001.sdmp, svchost.exe, 0000001B.00000003.813421288.00000148F1329000.00000004.00000001.sdmp, svchost.exe, 0000001B.00000002.1210177736.00000148F0C5D000.00000004.00000001.sdmp, svchost.exe, 0000001B.00000003.813334291.00000148F1377000.00000004.00000001.sdmpString found in binary or memory: https://login.live.com/ppsecure/InlineLogin.srf?id=80605
                    Source: svchost.exe, 0000001B.00000003.813413159.00000148F134B000.00000004.00000001.sdmp, svchost.exe, 0000001B.00000003.813421288.00000148F1329000.00000004.00000001.sdmp, svchost.exe, 0000001B.00000002.1210177736.00000148F0C5D000.00000004.00000001.sdmp, svchost.exe, 0000001B.00000003.813334291.00000148F1377000.00000004.00000001.sdmpString found in binary or memory: https://login.live.com/ppsecure/InlineLogin.srf?id=80606
                    Source: svchost.exe, 0000001B.00000003.813413159.00000148F134B000.00000004.00000001.sdmp, svchost.exe, 0000001B.00000003.813421288.00000148F1329000.00000004.00000001.sdmp, svchost.exe, 0000001B.00000002.1210177736.00000148F0C5D000.00000004.00000001.sdmp, svchost.exe, 0000001B.00000003.813334291.00000148F1377000.00000004.00000001.sdmpString found in binary or memory: https://login.live.com/ppsecure/InlineLogin.srf?id=80607
                    Source: svchost.exe, 0000001B.00000003.813413159.00000148F134B000.00000004.00000001.sdmp, svchost.exe, 0000001B.00000003.813421288.00000148F1329000.00000004.00000001.sdmp, svchost.exe, 0000001B.00000002.1210177736.00000148F0C5D000.00000004.00000001.sdmp, svchost.exe, 0000001B.00000003.813334291.00000148F1377000.00000004.00000001.sdmpString found in binary or memory: https://login.live.com/ppsecure/InlineLogin.srf?id=80608
                    Source: svchost.exe, 0000001B.00000003.813343188.00000148F1350000.00000004.00000001.sdmp, svchost.exe, 0000001B.00000003.813301133.00000148F132E000.00000004.00000001.sdmp, svchost.exe, 0000001B.00000003.813421288.00000148F1329000.00000004.00000001.sdmpString found in binary or memory: https://login.live.com/ppsecure/InlinePOPAuth.srf?id=80601&amp;fid=cp
                    Source: svchost.exe, 0000001B.00000002.1210131119.00000148F0C46000.00000004.00000001.sdmpString found in binary or memory: https://login.live.com/ppsecure/InlinePOPAuth.srf?id=80601&fid=cp
                    Source: svchost.exe, 0000001B.00000003.813413159.00000148F134B000.00000004.00000001.sdmp, svchost.exe, 0000001B.00000003.813421288.00000148F1329000.00000004.00000001.sdmp, svchost.exe, 0000001B.00000002.1210177736.00000148F0C5D000.00000004.00000001.sdmp, svchost.exe, 0000001B.00000003.813334291.00000148F1377000.00000004.00000001.sdmpString found in binary or memory: https://login.live.com/ppsecure/InlinePOPAuth.srf?id=80605
                    Source: svchost.exe, 0000001B.00000003.813310129.00000148F133B000.00000004.00000001.sdmp, svchost.exe, 0000001B.00000003.825107674.00000148F0D02000.00000004.00000001.sdmpString found in binary or memory: https://login.live.com/ppsecure/ResolveUser.srf
                    Source: svchost.exe, 0000001B.00000003.813310129.00000148F133B000.00000004.00000001.sdmp, svchost.exe, 0000001B.00000002.1210177736.00000148F0C5D000.00000004.00000001.sdmp, svchost.exe, 0000001B.00000003.825107674.00000148F0D02000.00000004.00000001.sdmpString found in binary or memory: https://login.live.com/ppsecure/SHA1Auth.srf
                    Source: svchost.exe, 0000001B.00000003.813436216.00000148F130E000.00000004.00000001.sdmp, svchost.exe, 0000001B.00000003.825107674.00000148F0D02000.00000004.00000001.sdmpString found in binary or memory: https://login.live.com/ppsecure/deviceaddcredential.srf
                    Source: svchost.exe, 0000001B.00000002.1210131119.00000148F0C46000.00000004.00000001.sdmpString found in binary or memory: https://login.live.com/ppsecure/deviceaddcredential.srfxL
                    Source: svchost.exe, 0000001B.00000002.1210131119.00000148F0C46000.00000004.00000001.sdmp, svchost.exe, 0000001B.00000003.825107674.00000148F0D02000.00000004.00000001.sdmpString found in binary or memory: https://login.live.com/ppsecure/devicechangecredential.srf
                    Source: svchost.exe, 0000001B.00000003.825107674.00000148F0D02000.00000004.00000001.sdmpString found in binary or memory: https://login.live.com/ppsecure/deviceremovecredential.srf
                    Source: svchost.exe, 0000001B.00000002.1210131119.00000148F0C46000.00000004.00000001.sdmpString found in binary or memory: https://login.live.com/ppsecure/deviceremovecredential.srfje
                    Source: svchost.exe, 0000001B.00000003.813514950.00000148F1348000.00000004.00000001.sdmp, svchost.exe, 0000001B.00000003.825107674.00000148F0D02000.00000004.00000001.sdmpString found in binary or memory: https://login.live.com/resetpw.srf
                    Source: svchost.exe, 0000001B.00000003.813514950.00000148F1348000.00000004.00000001.sdmpString found in binary or memory: https://login.live.com/retention.srf
                    Source: svchost.exe, 0000001B.00000002.1210177736.00000148F0C5D000.00000004.00000001.sdmpString found in binary or memory: https://login.live.com:443/RST2.srf
                    Source: svchost.exe, 0000001B.00000003.822982893.00000148F133B000.00000004.00000001.sdmpString found in binary or memory: https://login.live.com:443/RST2.srf256
                    Source: svchost.exe, 0000001B.00000003.813514950.00000148F1348000.00000004.00000001.sdmp, svchost.exe, 0000001B.00000003.813609882.00000148F1331000.00000004.00000001.sdmpString found in binary or memory: https://signup.live.com/signup.aspx
                    Source: svchost.exe, 00000009.00000002.308058591.000002084203D000.00000004.00000001.sdmpString found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/comp/gen.ashx
                    Source: svchost.exe, 00000009.00000002.308058591.000002084203D000.00000004.00000001.sdmp, svchost.exe, 00000009.00000002.308009587.0000020842013000.00000004.00000001.sdmpString found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gd?pv=1&r=
                    Source: svchost.exe, 00000009.00000003.307787079.0000020842045000.00000004.00000001.sdmpString found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdi?pv=1&r=
                    Source: svchost.exe, 00000009.00000003.307787079.0000020842045000.00000004.00000001.sdmpString found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdv?pv=1&r=
                    Source: svchost.exe, 00000009.00000003.285964964.0000020842030000.00000004.00000001.sdmpString found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gri?pv=1&r=
                    Source: svchost.exe, 00000009.00000003.285964964.0000020842030000.00000004.00000001.sdmpString found in binary or memory: https://t0.ssl.ak.tiles.virtualearth.net/tiles/gen
                    Source: svchost.exe, 00000009.00000003.307704369.0000020842049000.00000004.00000001.sdmpString found in binary or memory: https://t0.tiles.ditu.live.com/tiles/gen
                    Source: windowdcom.exe, 00000003.00000003.278462097.0000000000BB2000.00000004.00000001.sdmpString found in binary or memory: https://watson.telemet43/
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49744
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49757 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49758 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49744 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49714 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49714
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49758
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49757
                    Source: unknownHTTPS traffic detected: 167.114.153.153:443 -> 192.168.2.3:49744 version: TLS 1.2

                    E-Banking Fraud:

                    barindex
                    Yara detected EmotetShow sources
                    Source: Yara matchFile source: yxghUyIGb4.exe, type: SAMPLE
                    Source: Yara matchFile source: 00000001.00000000.196238760.0000000000821000.00000020.00020000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000003.00000000.202814564.0000000000821000.00000020.00020000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000003.00000002.1275643184.0000000000821000.00000020.00020000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000002.00000002.203168982.0000000000821000.00000020.00020000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000000.195274651.0000000000821000.00000020.00020000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.196554240.0000000000821000.00000020.00020000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000002.00000000.201989781.0000000000821000.00000020.00020000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.203523658.0000000000821000.00000020.00020000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 2.0.windowdcom.exe.820000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.0.yxghUyIGb4.exe.820000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.0.yxghUyIGb4.exe.820000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 3.0.windowdcom.exe.820000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 3.2.windowdcom.exe.820000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.yxghUyIGb4.exe.820000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.yxghUyIGb4.exe.820000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.2.windowdcom.exe.820000.0.unpack, type: UNPACKEDPE
                    Source: C:\Windows\System32\svchost.exeFile created: C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CCFEED7EF3CD3BBD21329435542A98D2_9C2DDAC79C917837883918D6BB58BE90Jump to dropped file

                    System Summary:

                    barindex
                    Malicious sample detected (through community Yara rule)Show sources
                    Source: yxghUyIGb4.exe, type: SAMPLEMatched rule: Emotet Payload Author: kevoreilly
                    Source: 2.0.windowdcom.exe.820000.0.unpack, type: UNPACKEDPEMatched rule: Emotet Payload Author: kevoreilly
                    Source: 1.0.yxghUyIGb4.exe.820000.0.unpack, type: UNPACKEDPEMatched rule: Emotet Payload Author: kevoreilly
                    Source: 0.0.yxghUyIGb4.exe.820000.0.unpack, type: UNPACKEDPEMatched rule: Emotet Payload Author: kevoreilly
                    Source: 3.0.windowdcom.exe.820000.0.unpack, type: UNPACKEDPEMatched rule: Emotet Payload Author: kevoreilly
                    Source: 3.2.windowdcom.exe.820000.0.unpack, type: UNPACKEDPEMatched rule: Emotet Payload Author: kevoreilly
                    Source: 0.2.yxghUyIGb4.exe.820000.0.unpack, type: UNPACKEDPEMatched rule: Emotet Payload Author: kevoreilly
                    Source: 1.2.yxghUyIGb4.exe.820000.0.unpack, type: UNPACKEDPEMatched rule: Emotet Payload Author: kevoreilly
                    Source: 2.2.windowdcom.exe.820000.0.unpack, type: UNPACKEDPEMatched rule: Emotet Payload Author: kevoreilly
                    Source: C:\Windows\SysWOW64\windowdcom.exeFile created: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCacheJump to behavior
                    Source: C:\Users\user\Desktop\yxghUyIGb4.exeFile deleted: C:\Windows\SysWOW64\windowdcom.exe:Zone.IdentifierJump to behavior
                    Source: C:\Users\user\Desktop\yxghUyIGb4.exeCode function: 0_2_008277F00_2_008277F0
                    Source: C:\Users\user\Desktop\yxghUyIGb4.exeCode function: 0_2_00826E700_2_00826E70
                    Source: yxghUyIGb4.exe, 00000001.00000002.203555324.0000000000920000.00000002.00000001.sdmpBinary or memory string: System.OriginalFileName vs yxghUyIGb4.exe
                    Source: yxghUyIGb4.exe, 00000001.00000002.203590206.0000000000980000.00000002.00000001.sdmpBinary or memory string: originalfilename vs yxghUyIGb4.exe
                    Source: yxghUyIGb4.exe, 00000001.00000002.203590206.0000000000980000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamepropsys.dll.mui@ vs yxghUyIGb4.exe
                    Source: C:\Users\user\Desktop\yxghUyIGb4.exeSection loaded: cldapi.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: xboxlivetitleid.dllJump to behavior
                    Source: C:\Windows\System32\svchost.exeSection loaded: cdpsgshims.dllJump to behavior
                    Source: yxghUyIGb4.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
                    Source: yxghUyIGb4.exe, type: SAMPLEMatched rule: Emotet author = kevoreilly, description = Emotet Payload, cape_type = Emotet Payload
                    Source: 2.0.windowdcom.exe.820000.0.unpack, type: UNPACKEDPEMatched rule: Emotet author = kevoreilly, description = Emotet Payload, cape_type = Emotet Payload
                    Source: 1.0.yxghUyIGb4.exe.820000.0.unpack, type: UNPACKEDPEMatched rule: Emotet author = kevoreilly, description = Emotet Payload, cape_type = Emotet Payload
                    Source: 0.0.yxghUyIGb4.exe.820000.0.unpack, type: UNPACKEDPEMatched rule: Emotet author = kevoreilly, description = Emotet Payload, cape_type = Emotet Payload
                    Source: 3.0.windowdcom.exe.820000.0.unpack, type: UNPACKEDPEMatched rule: Emotet author = kevoreilly, description = Emotet Payload, cape_type = Emotet Payload
                    Source: 3.2.windowdcom.exe.820000.0.unpack, type: UNPACKEDPEMatched rule: Emotet author = kevoreilly, description = Emotet Payload, cape_type = Emotet Payload
                    Source: 0.2.yxghUyIGb4.exe.820000.0.unpack, type: UNPACKEDPEMatched rule: Emotet author = kevoreilly, description = Emotet Payload, cape_type = Emotet Payload
                    Source: 1.2.yxghUyIGb4.exe.820000.0.unpack, type: UNPACKEDPEMatched rule: Emotet author = kevoreilly, description = Emotet Payload, cape_type = Emotet Payload
                    Source: 2.2.windowdcom.exe.820000.0.unpack, type: UNPACKEDPEMatched rule: Emotet author = kevoreilly, description = Emotet Payload, cape_type = Emotet Payload
                    Source: classification engineClassification label: mal96.troj.evad.winEXE@17/8@0/13
                    Source: C:\Users\user\Desktop\yxghUyIGb4.exeCode function: 0_2_00822110 CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,0_2_00822110
                    Source: C:\Windows\SysWOW64\windowdcom.exeMutant created: \BaseNamedObjects\M82F5233F
                    Source: C:\Windows\System32\conhost.exeMutant created: \BaseNamedObjects\Local\SM0:2132:120:WilError_01
                    Source: C:\Users\user\Desktop\yxghUyIGb4.exeMutant created: \Sessions\1\BaseNamedObjects\Global\M6A9F2F98
                    Source: C:\Users\user\Desktop\yxghUyIGb4.exeMutant created: \Sessions\1\BaseNamedObjects\Global\I6A9F2F98
                    Source: C:\Windows\SysWOW64\windowdcom.exeMutant created: \BaseNamedObjects\Global\I6A9F2F98
                    Source: C:\Users\user\Desktop\yxghUyIGb4.exeMutant created: \Sessions\1\BaseNamedObjects\M3273981E
                    Source: yxghUyIGb4.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                    Source: C:\Users\user\Desktop\yxghUyIGb4.exeFile read: C:\Users\desktop.iniJump to behavior
                    Source: C:\Users\user\Desktop\yxghUyIGb4.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: C:\Windows\System32\svchost.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                    Source: C:\Windows\System32\svchost.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                    Source: C:\Windows\System32\svchost.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                    Source: C:\Windows\System32\svchost.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                    Source: C:\Windows\System32\svchost.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                    Source: C:\Windows\System32\svchost.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                    Source: yxghUyIGb4.exeVirustotal: Detection: 83%
                    Source: yxghUyIGb4.exeReversingLabs: Detection: 96%
                    Source: unknownProcess created: C:\Users\user\Desktop\yxghUyIGb4.exe 'C:\Users\user\Desktop\yxghUyIGb4.exe'
                    Source: C:\Users\user\Desktop\yxghUyIGb4.exeProcess created: C:\Users\user\Desktop\yxghUyIGb4.exe C:\Users\user\Desktop\yxghUyIGb4.exe
                    Source: unknownProcess created: C:\Windows\SysWOW64\windowdcom.exe C:\Windows\SysWOW64\windowdcom.exe
                    Source: C:\Windows\SysWOW64\windowdcom.exeProcess created: C:\Windows\SysWOW64\windowdcom.exe C:\Windows\SysWOW64\windowdcom.exe
                    Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
                    Source: unknownProcess created: C:\Windows\System32\svchost.exe c:\windows\system32\svchost.exe -k localservice -p -s CDPSvc
                    Source: unknownProcess created: C:\Windows\System32\svchost.exe c:\windows\system32\svchost.exe -k networkservice -p -s DoSvc
                    Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k NetworkService -p
                    Source: unknownProcess created: C:\Windows\System32\SgrmBroker.exe C:\Windows\system32\SgrmBroker.exe
                    Source: unknownProcess created: C:\Windows\System32\svchost.exe c:\windows\system32\svchost.exe -k localservicenetworkrestricted -p -s wscsvc
                    Source: C:\Windows\System32\svchost.exeProcess created: C:\Program Files\Windows Defender\MpCmdRun.exe 'C:\Program Files\Windows Defender\mpcmdrun.exe' -wdenable
                    Source: C:\Program Files\Windows Defender\MpCmdRun.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc
                    Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k netsvcs -p -s wisvc
                    Source: C:\Users\user\Desktop\yxghUyIGb4.exeProcess created: C:\Users\user\Desktop\yxghUyIGb4.exe C:\Users\user\Desktop\yxghUyIGb4.exeJump to behavior
                    Source: C:\Windows\SysWOW64\windowdcom.exeProcess created: C:\Windows\SysWOW64\windowdcom.exe C:\Windows\SysWOW64\windowdcom.exeJump to behavior
                    Source: C:\Windows\System32\svchost.exeProcess created: C:\Program Files\Windows Defender\MpCmdRun.exe 'C:\Program Files\Windows Defender\mpcmdrun.exe' -wdenableJump to behavior
                    Source: C:\Users\user\Desktop\yxghUyIGb4.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
                    Source: yxghUyIGb4.exeStatic PE information: TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT