Loading ...

Play interactive tourEdit tour

Analysis Report 15b65ccfeced9c5ae3359db9d3a0e68ad0201912b65a0.dll

Overview

General Information

Sample Name:15b65ccfeced9c5ae3359db9d3a0e68ad0201912b65a0.dll
Analysis ID:396165
MD5:df7d50dcaa88a5a3bdfc9a2bd190cc70
SHA1:5e68299152884300f6ac0a51a0be99fc64d8e98f
SHA256:15b65ccfeced9c5ae3359db9d3a0e68ad0201912b65a0578d5dd7a0f7f7b387d
Tags:dllIcedID
Infos:

Most interesting Screenshot:

Detection

IcedID
Score:84
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
System process connects to network (likely due to code injection or exploit)
Yara detected IcedID
C2 URLs / IPs found in malware configuration
Contains functionality to detect hardware virtualization (CPUID execution measurement)
Tries to detect virtualization through RDTSC time measurements
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to call native functions
Contains functionality to dynamically determine API calls
Contains functionality to query network adapater information
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Registers a DLL
Tries to load missing DLLs
Uses code obfuscation techniques (call, push, ret)

Classification

Startup

  • System is w10x64
  • loaddll64.exe (PID: 6276 cmdline: loaddll64.exe 'C:\Users\user\Desktop\15b65ccfeced9c5ae3359db9d3a0e68ad0201912b65a0.dll' MD5: A84133CCB118CF35D49A423CD836D0EF)
    • cmd.exe (PID: 6284 cmdline: cmd.exe /C rundll32.exe 'C:\Users\user\Desktop\15b65ccfeced9c5ae3359db9d3a0e68ad0201912b65a0.dll',#1 MD5: 4E2ACF4F8A396486AB4268C94A6A245F)
      • rundll32.exe (PID: 6312 cmdline: rundll32.exe 'C:\Users\user\Desktop\15b65ccfeced9c5ae3359db9d3a0e68ad0201912b65a0.dll',#1 MD5: 73C519F050C20580F8A62C849D49215A)
    • regsvr32.exe (PID: 6300 cmdline: regsvr32.exe /s C:\Users\user\Desktop\15b65ccfeced9c5ae3359db9d3a0e68ad0201912b65a0.dll MD5: D78B75FC68247E8A63ACBA846182740E)
    • iexplore.exe (PID: 6324 cmdline: C:\Program Files\Internet Explorer\iexplore.exe MD5: 6465CB92B25A7BC1DF8E01D8AC5E7596)
      • iexplore.exe (PID: 6420 cmdline: 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:6324 CREDAT:17410 /prefetch:2 MD5: 071277CC2E3DF41EEEA8013E2AB58D5A)
    • rundll32.exe (PID: 6364 cmdline: rundll32.exe C:\Users\user\Desktop\15b65ccfeced9c5ae3359db9d3a0e68ad0201912b65a0.dll,?hoptq@@YAHXZ MD5: 73C519F050C20580F8A62C849D49215A)
    • rundll32.exe (PID: 6580 cmdline: rundll32.exe C:\Users\user\Desktop\15b65ccfeced9c5ae3359db9d3a0e68ad0201912b65a0.dll,?ioporta@@YAHXZ MD5: 73C519F050C20580F8A62C849D49215A)
    • rundll32.exe (PID: 6624 cmdline: rundll32.exe C:\Users\user\Desktop\15b65ccfeced9c5ae3359db9d3a0e68ad0201912b65a0.dll,DllRegisterServer MD5: 73C519F050C20580F8A62C849D49215A)
    • rundll32.exe (PID: 6676 cmdline: rundll32.exe C:\Users\user\Desktop\15b65ccfeced9c5ae3359db9d3a0e68ad0201912b65a0.dll,PluginInit MD5: 73C519F050C20580F8A62C849D49215A)
  • cleanup

Malware Configuration

Threatname: IcedID

{"C2 url": "grandeprunto.casa"}

Yara Overview

PCAP (Network Traffic)

SourceRuleDescriptionAuthorStrings
dump.pcapJoeSecurity_IcedID_1Yara detected IcedIDJoe Security

    Memory Dumps

    SourceRuleDescriptionAuthorStrings
    00000008.00000002.248961723.00000206676C2000.00000004.00000020.sdmpJoeSecurity_IcedID_1Yara detected IcedIDJoe Security
      00000002.00000003.233210344.00000000011A5000.00000004.00000001.sdmpJoeSecurity_IcedID_1Yara detected IcedIDJoe Security
        00000000.00000002.266211945.00000168EB8F1000.00000004.00000020.sdmpJoeSecurity_IcedID_1Yara detected IcedIDJoe Security
          00000008.00000002.248995795.0000020667718000.00000004.00000020.sdmpJoeSecurity_IcedID_1Yara detected IcedIDJoe Security
            00000009.00000002.256456346.000002944EE04000.00000004.00000020.sdmpJoeSecurity_IcedID_1Yara detected IcedIDJoe Security
              Click to see the 8 entries

              Sigma Overview

              No Sigma rule has matched

              Signature Overview

              Click to jump to signature section

              Show All Signature Results

              AV Detection:

              barindex
              Found malware configurationShow sources
              Source: 2.2.regsvr32.exe.df0000.1.raw.unpackMalware Configuration Extractor: IcedID {"C2 url": "grandeprunto.casa"}
              Multi AV Scanner detection for submitted fileShow sources
              Source: 15b65ccfeced9c5ae3359db9d3a0e68ad0201912b65a0.dllVirustotal: Detection: 22%Perma Link
              Source: 15b65ccfeced9c5ae3359db9d3a0e68ad0201912b65a0.dllReversingLabs: Detection: 58%
              Yara detected IcedIDShow sources
              Source: Yara matchFile source: dump.pcap, type: PCAP
              Source: Yara matchFile source: 00000008.00000002.248961723.00000206676C2000.00000004.00000020.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000003.233210344.00000000011A5000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.266211945.00000168EB8F1000.00000004.00000020.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000008.00000002.248995795.0000020667718000.00000004.00000020.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000002.256456346.000002944EE04000.00000004.00000020.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.235285129.00000000011A5000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000008.00000002.248977002.00000206676E5000.00000004.00000020.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000002.256477930.000002944EE24000.00000004.00000020.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000002.256508994.000002944EE59000.00000004.00000020.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: loaddll64.exe PID: 6276, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 6624, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 6676, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: regsvr32.exe PID: 6300, type: MEMORY
              Source: 15b65ccfeced9c5ae3359db9d3a0e68ad0201912b65a0.dllStatic PE information: certificate valid
              Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeFile opened: C:\Program Files (x86)\Java\jre1.8.0_211\bin\msvcr100.dllJump to behavior
              Source: unknownHTTPS traffic detected: 13.32.16.68:443 -> 192.168.2.5:49713 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 104.20.184.68:443 -> 192.168.2.5:49728 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 104.20.184.68:443 -> 192.168.2.5:49729 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 13.32.16.68:443 -> 192.168.2.5:49735 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 151.101.1.44:443 -> 192.168.2.5:49746 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 151.101.1.44:443 -> 192.168.2.5:49747 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 151.101.1.44:443 -> 192.168.2.5:49745 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 87.248.118.23:443 -> 192.168.2.5:49749 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 87.248.118.23:443 -> 192.168.2.5:49748 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 13.32.16.68:443 -> 192.168.2.5:49750 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 13.32.16.68:443 -> 192.168.2.5:49752 version: TLS 1.2
              Source: 15b65ccfeced9c5ae3359db9d3a0e68ad0201912b65a0.dllStatic PE information: DYNAMIC_BASE, NX_COMPAT, HIGH_ENTROPY_VA

              Networking:

              barindex
              C2 URLs / IPs found in malware configurationShow sources
              Source: Malware configuration extractorURLs: grandeprunto.casa
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1Connection: Keep-AliveCookie: __gads=2919708693:1:5283:122; _gat=10.0.17134.64; _ga=1.329303.0.5; _u=383939353532:616C666F6E73; __io=0; _gid=67AFEDD28876Host: grandeprunto.casa
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1Connection: Keep-AliveCookie: __gads=2919708693:1:5290:122; _gat=10.0.17134.64; _ga=1.329303.0.5; _u=383939353532:616C666F6E73; __io=0; _gid=67AFEDD28876Host: grandeprunto.casa
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1Connection: Keep-AliveCookie: __gads=2919708693:1:5294:121; _gat=10.0.17134.64; _ga=1.329303.0.5; _u=383939353532:616C666F6E73; __io=0; _gid=67AFEDD28876Host: grandeprunto.casa
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1Connection: Keep-AliveCookie: __gads=2919708693:1:5297:122; _gat=10.0.17134.64; _ga=1.329303.0.5; _u=383939353532:616C666F6E73; __io=0; _gid=67AFEDD28876Host: grandeprunto.casa
              Source: Joe Sandbox ViewIP Address: 104.20.184.68 104.20.184.68
              Source: Joe Sandbox ViewIP Address: 13.32.16.68 13.32.16.68
              Source: Joe Sandbox ViewASN Name: DIGITALOCEAN-ASNUS DIGITALOCEAN-ASNUS
              Source: Joe Sandbox ViewJA3 fingerprint: 9e10692f1b7f78228b2d4e424db3a98c
              Source: Joe Sandbox ViewJA3 fingerprint: ce5f3254611a8c095a3d821d44539877
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1Connection: Keep-AliveCookie: __gads=2919708693:1:5283:122; _gat=10.0.17134.64; _ga=1.329303.0.5; _u=383939353532:616C666F6E73; __io=0; _gid=67AFEDD28876Host: grandeprunto.casa
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1Connection: Keep-AliveCookie: __gads=2919708693:1:5290:122; _gat=10.0.17134.64; _ga=1.329303.0.5; _u=383939353532:616C666F6E73; __io=0; _gid=67AFEDD28876Host: grandeprunto.casa
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1Connection: Keep-AliveCookie: __gads=2919708693:1:5294:121; _gat=10.0.17134.64; _ga=1.329303.0.5; _u=383939353532:616C666F6E73; __io=0; _gid=67AFEDD28876Host: grandeprunto.casa
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1Connection: Keep-AliveCookie: __gads=2919708693:1:5297:122; _gat=10.0.17134.64; _ga=1.329303.0.5; _u=383939353532:616C666F6E73; __io=0; _gid=67AFEDD28876Host: grandeprunto.casa
              Source: de-ch[1].htm.6.drString found in binary or memory: <a href="https://www.facebook.com/" target="_blank" data-piitxt="facebooklite" piiurl="https://www.facebook.com/"> equals www.facebook.com (Facebook)
              Source: loaddll64.exe, 00000000.00000002.266307970.00000168EB928000.00000004.00000020.sdmp, regsvr32.exe, 00000002.00000002.235939874.0000000003100000.00000004.00000001.sdmp, rundll32.exe, 00000008.00000002.248995795.0000020667718000.00000004.00000020.sdmp, rundll32.exe, 00000009.00000002.256508994.000002944EE59000.00000004.00000020.sdmpString found in binary or memory: <a class="lb-txt-none lb-txt-p-chromium lb-none-pad lb-none-v-margin lb-txt" style="padding-right:5px;" href="https://www.facebook.com/amazonwebservices" target="_blank" rel="noopener" title="Facebook"> <i class="icon-facebook"></i></a> equals www.facebook.com (Facebook)
              Source: loaddll64.exe, 00000000.00000002.266307970.00000168EB928000.00000004.00000020.sdmp, regsvr32.exe, 00000002.00000002.235939874.0000000003100000.00000004.00000001.sdmp, rundll32.exe, 00000008.00000002.248995795.0000020667718000.00000004.00000020.sdmp, rundll32.exe, 00000009.00000002.256508994.000002944EE59000.00000004.00000020.sdmpString found in binary or memory: <a class="lb-txt-none lb-txt-p-chromium lb-none-pad lb-txt" style="padding-right:5px;" href="https://www.youtube.com/user/AmazonWebServices/Cloud/" target="_blank" rel="noopener" title="YouTube"> <i class="icon-youtube"></i></a> equals www.youtube.com (Youtube)
              Source: msapplication.xml0.4.drString found in binary or memory: <browserconfig><msapplication><config><site src="http://www.facebook.com/"/><date>0xbf6b3380,0x01d73846</date><accdate>0xbf6b3380,0x01d73846</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig> equals www.facebook.com (Facebook)
              Source: msapplication.xml0.4.drString found in binary or memory: <browserconfig><msapplication><config><site src="http://www.facebook.com/"/><date>0xbf6b3380,0x01d73846</date><accdate>0xbf6d95c9,0x01d73846</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Facebook.url"/></tile></msapplication></browserconfig> equals www.facebook.com (Facebook)
              Source: msapplication.xml5.4.drString found in binary or memory: <browserconfig><msapplication><config><site src="http://www.twitter.com/"/><date>0xbf6ff81c,0x01d73846</date><accdate>0xbf6ff81c,0x01d73846</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig> equals www.twitter.com (Twitter)
              Source: msapplication.xml5.4.drString found in binary or memory: <browserconfig><msapplication><config><site src="http://www.twitter.com/"/><date>0xbf6ff81c,0x01d73846</date><accdate>0xbf6ff81c,0x01d73846</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Twitter.url"/></tile></msapplication></browserconfig> equals www.twitter.com (Twitter)
              Source: msapplication.xml7.4.drString found in binary or memory: <browserconfig><msapplication><config><site src="http://www.youtube.com/"/><date>0xbf725a8a,0x01d73846</date><accdate>0xbf725a8a,0x01d73846</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig> equals www.youtube.com (Youtube)
              Source: msapplication.xml7.4.drString found in binary or memory: <browserconfig><msapplication><config><site src="http://www.youtube.com/"/><date>0xbf725a8a,0x01d73846</date><accdate>0xbf725a8a,0x01d73846</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Youtube.url"/></tile></msapplication></browserconfig> equals www.youtube.com (Youtube)
              Source: de-ch[1].htm.6.drString found in binary or memory: <link rel="preconnect" href="img-s-msn-com.akamaized.net" /><link rel="preconnect" href="c.msn.com" /><link rel="preconnect" href="c.msn.cn" /><link rel="preconnect" href="https://www.bing.com" /><link rel="preconnect" href="//web.vortex.data.msn.com" /><link rel="dns-prefetch" href="img-s-msn-com.akamaized.net" /><link rel="dns-prefetch" href="c.msn.com" /><link rel="dns-prefetch" href="c.msn.cn" /><link rel="dns-prefetch" href="https://www.bing.com" /><link rel="dns-prefetch" href="//web.vortex.data.msn.com" /><link rel="canonical" href="https://www.msn.com/de-ch/" /><meta name="msapplication-TileColor" content="#224f7b"/><meta name="msapplication-TileImage" content="//static-global-s-msn-com.akamaized.net/hp-neu/sc/1f/08ced4.png"/><meta name="msapplication-config" content="none"/> <title>MSN Schweiz | Sign in Hotmail, Outlook Login, Windows Live, Office 365</title> equals www.hotmail.com (Hotmail)
              Source: 52-478955-68ddb2ab[1].js.6.drString found in binary or memory: glich.",errorFooterText:"Zu Twitter wechseln",taskLinks:"Benachrichtigungen|https://twitter.com/i/notifications;Ich|#;Abmelden|#"}],xbox:[{header:"Spotlight",content:"",footerText:"Alle anzeigen",footerUrl:"",taskLinks:"me_groove_taskLinks_store|https://www.microsoft.com/store/media/redirect/music?view=hub;me_groove_taskLinks_play|https://aka.ms/Ixhi8e;me_groove_taskLinks_try|https://aka.ms/msvmj1"},{header:"Meine tolle Wiedergabeliste",headerUrl:"https://aka.ms/qeqf5y",content:"",errorMessage:"",taskLinks:"me_groove_taskLinks_store|https://www.microsoft.com/store/media/redirect/music?view=hub;me_groove_taskLinks_play|https://aka.ms/Ixhi8e;me_groove_taskLinks_try|https://aka.ms/msvmj1"}],bingrewards:[{header:"Pr equals www.twitter.com (Twitter)
              Source: de-ch[1].htm.6.drString found in binary or memory: hren, die sich auf Ihren Internetdatenverkehr auswirken.<br/><br/><a href=\""+e.html(f)+'" onclick="window.location.reload(true)">Klicken Sie hier<\/a> um diese Seite erneut zu laden, oder besuchen Sie: <a href="'+i+'">'+i+"<\/a><\/p><\/div><div id='errorref'><span>Ref 1: "+e.html(o(t.clientSettings.aid))+"&nbsp;&nbsp;&nbsp;Ref 2: "+e.html(t.clientSettings.sid||"000000")+"&nbsp;&nbsp;&nbsp;Ref 3: "+e.html((new r.Date).toUTCString())+"<\/span><\/div><\/div>"});ot({errId:1512,errMsg:n})}function ot(n){require(["track"],function(t){var i={errId:n.errId,errMsg:n.errMsg,reportingType:0};t.trackAppErrorEvent(i)})}function tt(){var n=v(arguments);a(l(n,b),n,!0)}function st(){var n=v(arguments);a(l(n,h),n)}function ht(){var n=v(arguments);a(l(n,y),n)}function ct(n){(r.console||{}).timeStamp?console.timeStamp(n):(r.performance||{}).mark&&r.performance.mark(n)}var w=0,it=-1,b=0,h=1,y=2,s=[],p,k,rt,o,d=!1,c=Math.random()*100<=-1;return ut(r,function(n,t,i,r){return w++,n=nt(n,t,i,r," [ENDMESSAGE]"),n&&tt("[SCRIPTERROR] "+n),!0}),c&&require(["jquery","c.deferred"],function(n){k=!0;rt=n;s.length&&g()}),{error:tt,fatalError:et,unhandledErrorCount:function(){return w},perfMark:ct,warning:st,information:ht}});require(["viewAwareInit"],function(n){n({size2row:"(min-height: 48.75em)",size1row:"(max-height: 48.74em)",size4column:"(min-width: 72em)",size3column:"(min-width: 52.313em) and (max-width: 71.99em)",size2column:"(min-width: 43.75em) and (max-width: 52.303em)",size2rowsize4column:"(min-width: 72em) and (min-height: 48.75em)",size2rowsize3column:"(min-width: 52.313em) and (max-width: 71.99em) and (min-height: 48.75em)",size2rowsize2column:"(max-width: 52.303em) and (min-height: 48.75em)",size1rowsize4column:"(min-width: 72em) and (max-height: 48.74em)",size1rowsize3column:"(min-width: 52.313em) and (max-width: 71.99em) and (max-height: 48.74em)",size1rowsize2column:"(max-width: 52.303em) and (max-height: 48.74em)"})});require(["deviceInit"],function(n){n({AllowTransform3d:"false",AllowTransform2d:"true",RtlScrollLeftAdjustment:"none",ShowMoveTouchGestures:"true",SupportFixedPosition:"true",UseCustomMatchMedia:null,Viewport_Behavior:"Default",Viewport_Landscape:null,Viewport:"width=device-width,initial-scale=1.0",IsMobileDevice:"false"})})</script><meta property="sharing_url" content="https://www.msn.com/de-ch"/><meta property="og:url" content="https://www.msn.com/de-ch/"/><meta property="og:title" content="MSN Schweiz | Sign in Hotmail, Outlook Login, Windows Live, Office 365"/><meta property="twitter:card" content="summary_large_image"/><meta property="og:type" content="website"/><meta property="og:site_name" content="MSN"/><meta property="og:image" content="https://static-global-s-msn-com.akamaized.net/hp-neu/sc/c6/519670.jpg"/><link rel="shortcut icon" href="//static-global-s-msn-com.akamaized.net/hp-neu/sc/2b/a5ea21.ico" /><style>@media screen and (max-width:78.99em) and (min-width:58.875em){.layout-none:not(.mod1) .pos2{left:0}}.ie8 .grid .pick4~li.pick
              Source: 52-478955-68ddb2ab[1].js.6.drString found in binary or memory: pfen Sie Ihr Skype-Konto und Ihr Microsoft-Konto.",continueButtonText:"Weiter",learnMoreText:"Hilfe",learnMoreUrl:"https://support.skype.com",callMessageText:"Anruf",fileMessageText:"Datei gesendet",videoMessageText:"Videonachricht",contactMessageText:"Kontakt gesendet"}],jsskype:[{},{}],facebookLite:[{},{likeUrl:"https://www.facebook.com/msnch"}],twitter:[{header:"Twitter",content:"Rufen Sie Ihre Twitter-Updates ab",footerText:"Anmelden",footerUrl:"https://twitter.com",requestTimeout:"10000",taskLinks:""},{header:"Tweets",headerUrl:"https://twitter.com",content:"Laden ...",noContent:"Ihre Timeline ist derzeit leer",errorMessage:"Anmelden bei Twitter nicht m equals www.facebook.com (Facebook)
              Source: 52-478955-68ddb2ab[1].js.6.drString found in binary or memory: pfen Sie Ihr Skype-Konto und Ihr Microsoft-Konto.",continueButtonText:"Weiter",learnMoreText:"Hilfe",learnMoreUrl:"https://support.skype.com",callMessageText:"Anruf",fileMessageText:"Datei gesendet",videoMessageText:"Videonachricht",contactMessageText:"Kontakt gesendet"}],jsskype:[{},{}],facebookLite:[{},{likeUrl:"https://www.facebook.com/msnch"}],twitter:[{header:"Twitter",content:"Rufen Sie Ihre Twitter-Updates ab",footerText:"Anmelden",footerUrl:"https://twitter.com",requestTimeout:"10000",taskLinks:""},{header:"Tweets",headerUrl:"https://twitter.com",content:"Laden ...",noContent:"Ihre Timeline ist derzeit leer",errorMessage:"Anmelden bei Twitter nicht m equals www.twitter.com (Twitter)
              Source: 52-478955-68ddb2ab[1].js.6.drString found in binary or memory: ter erneut.",viewInboxErrorMessage:"Wenn beim Anzeigen Ihres Posteingangs weiterhin ein Problem auftritt, besuchen Sie",taskLinks:"Verfassen|https://outlook.live.com/mail/deeplink/compose;Kalender|https://outlook.live.com/calendar",piiText:"Read Outlook Email",piiUrl:"http://www.hotmail.msn.com/pii/ReadOutlookEmail/"}],office:[{header:"Office",content:"Zeigen Sie Ihre zuletzt verwendeten Dokumente an oder erstellen Sie kostenlos mit Office Online ein neues.",footerText:"Anmelden",footerUrl:"[[signin]]",ssoAutoRefresh:!0,taskLinks:"Word Online|https://office.live.com/start/Word.aspx?WT.mc_id=MSN_site;Excel Online|https://office.live.com/start/Excel.aspx?WT.mc_id=MSN_site;Sway|https://www.sway.com/?WT.mc_id=MSN_site&utm_source=MSN&utm_medium=Topnav&utm_campaign=link;PowerPoint Online|https://office.live.com/start/PowerPoint.aspx?WT.mc_id=MSN_site"},{header:"Aktuelle Dokumente",headerUrl:"https://onedrive.live.com/#qt=mru",content:"Wird geladen ...",noContent:"Dieser Ordner ist leer. Klicken Sie unten, um ein neues Dokument zu erstellen.",errorMessage:"Keine Verbindung mit Office Online m equals www.hotmail.com (Hotmail)
              Source: unknownDNS traffic detected: queries for: aws.amazon.com
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Fri, 23 Apr 2021 04:43:41 GMTContent-Type: text/html; charset=UTF-8Transfer-Encoding: chunkedConnection: keep-aliveData Raw: 31 30 66 0d 0a 09 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 09 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 09 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 09 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 09 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 09 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 09 3c 68 72 3e 0a 09 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 20 53 65 72 76 65 72 20 61 74 20 67 72 61 6e 64 65 70 72 75 6e 74 6f 2e 63 61 73 61 20 50 6f 72 74 20 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 09 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a 30 0d 0a 0d 0a Data Ascii: 10f<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><hr><address>Apache Server at grandeprunto.casa Port 80</address></body></html>0
              Source: 15b65ccfeced9c5ae3359db9d3a0e68ad0201912b65a0.dllString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
              Source: 15b65ccfeced9c5ae3359db9d3a0e68ad0201912b65a0.dllString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDTimestampingCA.crt0
              Source: loaddll64.exe, 00000000.00000002.266044749.00000168EB8A8000.00000004.00000020.sdmp, regsvr32.exe, 00000002.00000003.230833647.00000000011A5000.00000004.00000001.sdmp, rundll32.exe, 00000008.00000002.249701695.0000020669410000.00000004.00000001.sdmp, rundll32.exe, 00000009.00000002.256601243.00000294506C0000.00000004.00000001.sdmpString found in binary or memory: http://crl.rootca1.amazontrust.com/rootca1.crl0
              Source: loaddll64.exe, 00000000.00000002.266147273.00000168EB8DB000.00000004.00000020.sdmp, regsvr32.exe, 00000002.00000003.230833647.00000000011A5000.00000004.00000001.sdmp, rundll32.exe, 00000008.00000002.249701695.0000020669410000.00000004.00000001.sdmp, rundll32.exe, 00000009.00000002.256601243.00000294506C0000.00000004.00000001.sdmpString found in binary or memory: http://crl.rootg2.amazontrust.com/rootg2.crl0
              Source: loaddll64.exe, 00000000.00000002.266044749.00000168EB8A8000.00000004.00000020.sdmp, regsvr32.exe, 00000002.00000003.230833647.00000000011A5000.00000004.00000001.sdmp, rundll32.exe, 00000008.00000002.249701695.0000020669410000.00000004.00000001.sdmp, rundll32.exe, 00000009.00000002.256601243.00000294506C0000.00000004.00000001.sdmpString found in binary or memory: http://crl.sca1b.amazontrust.com/sca1b.crl0
              Source: 15b65ccfeced9c5ae3359db9d3a0e68ad0201912b65a0.dllString found in binary or memory: http://crl.sectigo.com/SectigoRSACodeSigningCA.crl0s
              Source: 15b65ccfeced9c5ae3359db9d3a0e68ad0201912b65a0.dllString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0P
              Source: 15b65ccfeced9c5ae3359db9d3a0e68ad0201912b65a0.dllString found in binary or memory: http://crl3.digicert.com/sha2-assured-ts.crl02
              Source: 15b65ccfeced9c5ae3359db9d3a0e68ad0201912b65a0.dllString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0:
              Source: 15b65ccfeced9c5ae3359db9d3a0e68ad0201912b65a0.dllString found in binary or memory: http://crl4.digicert.com/sha2-assured-ts.crl0
              Source: regsvr32.exe, 00000002.00000003.230833647.00000000011A5000.00000004.00000001.sdmpString found in binary or memory: http://crt.rootR)
              Source: loaddll64.exe, 00000000.00000002.266044749.00000168EB8A8000.00000004.00000020.sdmp, regsvr32.exe, 00000002.00000003.230833647.00000000011A5000.00000004.00000001.sdmp, rundll32.exe, 00000008.00000002.249701695.0000020669410000.00000004.00000001.sdmp, rundll32.exe, 00000009.00000002.256601243.00000294506C0000.00000004.00000001.sdmpString found in binary or memory: http://crt.rootca1.amazontrust.com/rootca1.cer0?
              Source: loaddll64.exe, 00000000.00000002.266147273.00000168EB8DB000.00000004.00000020.sdmp, regsvr32.exe, 00000002.00000003.230833647.00000000011A5000.00000004.00000001.sdmp, rundll32.exe, 00000008.00000002.249701695.0000020669410000.00000004.00000001.sdmp, rundll32.exe, 00000009.00000002.256601243.00000294506C0000.00000004.00000001.sdmpString found in binary or memory: http://crt.rootg2.amazontrust.com/rootg2.cer0=
              Source: loaddll64.exe, 00000000.00000002.266044749.00000168EB8A8000.00000004.00000020.sdmp, regsvr32.exe, 00000002.00000003.230833647.00000000011A5000.00000004.00000001.sdmp, rundll32.exe, 00000008.00000002.249701695.0000020669410000.00000004.00000001.sdmp, rundll32.exe, 00000009.00000002.256601243.00000294506C0000.00000004.00000001.sdmpString found in binary or memory: http://crt.sca1b.amazontrust.com/sca1b.crt0
              Source: 15b65ccfeced9c5ae3359db9d3a0e68ad0201912b65a0.dllString found in binary or memory: http://crt.sectigo.com/SectigoRSACodeSigningCA.crt0#
              Source: rundll32.exe, 00000008.00000002.248944250.00000206676A2000.00000004.00000020.sdmp, rundll32.exe, 00000009.00000002.256422146.000002944EDDC000.00000004.00000020.sdmpString found in binary or memory: http://grandeprunto.casa/
              Source: rundll32.exe, 00000009.00000002.256477930.000002944EE24000.00000004.00000020.sdmpString found in binary or memory: http://grandeprunto.casa/$
              Source: loaddll64.exe, 00000000.00000002.266000014.00000168EB883000.00000004.00000020.sdmpString found in binary or memory: http://grandeprunto.casa/m
              Source: rundll32.exe, 00000009.00000002.256398149.000002944EDBF000.00000004.00000020.sdmpString found in binary or memory: http://grandeprunto.casa/p1
              Source: rundll32.exe, 00000009.00000002.256477930.000002944EE24000.00000004.00000020.sdmpString found in binary or memory: http://grandeprunto.casa/rosoi
              Source: regsvr32.exe, 00000002.00000003.233210344.00000000011A5000.00000004.00000001.sdmpString found in binary or memory: http://grandeprunto.casa/up
              Source: loaddll64.exe, 00000000.00000002.266211945.00000168EB8F1000.00000004.00000020.sdmp, regsvr32.exe, 00000002.00000003.233210344.00000000011A5000.00000004.00000001.sdmp, rundll32.exe, 00000009.00000002.256477930.000002944EE24000.00000004.00000020.sdmpString found in binary or memory: http://grandeprunto.casa:80/
              Source: loaddll64.exe, 00000000.00000002.266211945.00000168EB8F1000.00000004.00000020.sdmp, regsvr32.exe, 00000002.00000003.230833647.00000000011A5000.00000004.00000001.sdmp, rundll32.exe, 00000008.00000002.249701695.0000020669410000.00000004.00000001.sdmp, rundll32.exe, 00000009.00000002.256601243.00000294506C0000.00000004.00000001.sdmpString found in binary or memory: http://o.ss2.us/0
              Source: 15b65ccfeced9c5ae3359db9d3a0e68ad0201912b65a0.dllString found in binary or memory: http://ocsp.digicert.com0C
              Source: 15b65ccfeced9c5ae3359db9d3a0e68ad0201912b65a0.dllString found in binary or memory: http://ocsp.digicert.com0O
              Source: loaddll64.exe, 00000000.00000002.266044749.00000168EB8A8000.00000004.00000020.sdmp, regsvr32.exe, 00000002.00000003.230833647.00000000011A5000.00000004.00000001.sdmp, rundll32.exe, 00000008.00000002.249701695.0000020669410000.00000004.00000001.sdmp, rundll32.exe, 00000009.00000002.256601243.00000294506C0000.00000004.00000001.sdmpString found in binary or memory: http://ocsp.rootca1.amazontrust.com0:
              Source: loaddll64.exe, 00000000.00000002.266147273.00000168EB8DB000.00000004.00000020.sdmp, regsvr32.exe, 00000002.00000003.230833647.00000000011A5000.00000004.00000001.sdmp, rundll32.exe, 00000008.00000002.249701695.0000020669410000.00000004.00000001.sdmp, rundll32.exe, 00000009.00000002.256601243.00000294506C0000.00000004.00000001.sdmpString found in binary or memory: http://ocsp.rootg2.amazontrust.com08
              Source: loaddll64.exe, 00000000.00000002.266044749.00000168EB8A8000.00000004.00000020.sdmp, regsvr32.exe, 00000002.00000003.230833647.00000000011A5000.00000004.00000001.sdmp, rundll32.exe, 00000008.00000002.249701695.0000020669410000.00000004.00000001.sdmp, rundll32.exe, 00000009.00000002.256601243.00000294506C0000.00000004.00000001.sdmpString found in binary or memory: http://ocsp.sca1b.amazontrust.com06
              Source: 15b65ccfeced9c5ae3359db9d3a0e68ad0201912b65a0.dllString found in binary or memory: http://ocsp.sectigo.com0&
              Source: de-ch[1].htm.6.drString found in binary or memory: http://ogp.me/ns#
              Source: de-ch[1].htm.6.drString found in binary or memory: http://ogp.me/ns/fb#
              Source: auction[1].htm.6.drString found in binary or memory: http://popup.taboola.com/german
              Source: regsvr32.exe, 00000002.00000003.230833647.00000000011A5000.00000004.00000001.sdmpString found in binary or memory: http://s.ss2
              Source: loaddll64.exe, 00000000.00000002.266211945.00000168EB8F1000.00000004.00000020.sdmp, regsvr32.exe, 00000002.00000003.230833647.00000000011A5000.00000004.00000001.sdmp, rundll32.exe, 00000008.00000002.249701695.0000020669410000.00000004.00000001.sdmp, rundll32.exe, 00000009.00000002.256601243.00000294506C0000.00000004.00000001.sdmpString found in binary or memory: http://s.ss2.us/r.crl0
              Source: ~DF4D56A94DABA8F170.TMP.4.drString found in binary or memory: http://searchads.msn.net/.cfm?&&kp=1&
              Source: msapplication.xml.4.drString found in binary or memory: http://www.amazon.com/
              Source: 15b65ccfeced9c5ae3359db9d3a0e68ad0201912b65a0.dllString found in binary or memory: http://www.digicert.com/CPS0
              Source: msapplication.xml1.4.drString found in binary or memory: http://www.google.com/
              Source: 52-478955-68ddb2ab[1].js.6.drString found in binary or memory: http://www.hotmail.msn.com/pii/ReadOutlookEmail/
              Source: msapplication.xml2.4.drString found in binary or memory: http://www.live.com/
              Source: msapplication.xml3.4.drString found in binary or memory: http://www.nytimes.com/
              Source: msapplication.xml4.4.drString found in binary or memory: http://www.reddit.com/
              Source: msapplication.xml5.4.drString found in binary or memory: http://www.twitter.com/
              Source: msapplication.xml6.4.drString found in binary or memory: http://www.wikipedia.com/
              Source: msapplication.xml7.4.drString found in binary or memory: http://www.youtube.com/
              Source: loaddll64.exe, 00000000.00000002.266211945.00000168EB8F1000.00000004.00000020.sdmp, regsvr32.exe, 00000002.00000003.230833647.00000000011A5000.00000004.00000001.sdmp, rundll32.exe, 00000008.00000002.249701695.0000020669410000.00000004.00000001.sdmp, rundll32.exe, 00000009.00000002.256601243.00000294506C0000.00000004.00000001.sdmpString found in binary or memory: http://x.ss2.us/x.cer0&
              Source: loaddll64.exe, 00000000.00000002.266211945.00000168EB8F1000.00000004.00000020.sdmpString found in binary or memory: https://a0.awsstatic.co-
              Source: rundll32.exe, 00000009.00000002.256508994.000002944EE59000.00000004.00000020.sdmpString found in binary or memory: https://a0.awsstatic.com
              Source: loaddll64.exe, 00000000.00000003.260974705.00000168EB932000.00000004.00000001.sdmp, regsvr32.exe, 00000002.00000002.235939874.0000000003100000.00000004.00000001.sdmp, rundll32.exe, 00000008.00000002.249744081.0000020669430000.00000004.00000001.sdmp, rundll32.exe, 00000009.00000002.256508994.000002944EE59000.00000004.00000020.sdmpString found in binary or memory: https://a0.awsstatic.com/aws-blog/1.0.46/js
              Source: loaddll64.exe, 00000000.00000002.266307970.00000168EB928000.00000004.00000020.sdmp, regsvr32.exe, 00000002.00000002.235939874.0000000003100000.00000004.00000001.sdmp, rundll32.exe, 00000008.00000002.248995795.0000020667718000.00000004.00000020.sdmp, rundll32.exe, 00000009.00000002.256422146.000002944EDDC000.00000004.00000020.sdmpString found in binary or memory: https://a0.awsstatic.com/da/js/1.0.47/aws-da.js
              Source: loaddll64.exe, 00000000.00000003.260974705.00000168EB932000.00000004.00000001.sdmp, regsvr32.exe, 00000002.00000002.235939874.0000000003100000.00000004.00000001.sdmp, rundll32.exe, 00000008.00000002.249744081.0000020669430000.00000004.00000001.sdmp, rundll32.exe, 00000009.00000002.256508994.000002944EE59000.00000004.00000020.sdmpString found in binary or memory: https://a0.awsstatic.com/g11n-lib/2.0.67
              Source: loaddll64.exe, 00000000.00000003.260974705.00000168EB932000.00000004.00000001.sdmp, regsvr32.exe, 00000002.00000002.235939874.0000000003100000.00000004.00000001.sdmp, rundll32.exe, 00000008.00000002.249744081.0000020669430000.00000004.00000001.sdmp, rundll32.exe, 00000009.00000002.256508994.000002944EE59000.00000004.00000020.sdmpString found in binary or memory: https://a0.awsstatic.com/libra-css/css/1.0.376
              Source: loaddll64.exe, 00000000.00000003.260974705.00000168EB932000.00000004.00000001.sdmp, regsvr32.exe, 00000002.00000002.235939874.0000000003100000.00000004.00000001.sdmp, rundll32.exe, 00000008.00000002.249744081.0000020669430000.00000004.00000001.sdmp, rundll32.exe, 00000009.00000002.256508994.000002944EE59000.00000004.00000020.sdmpString found in binary or memory: https://a0.awsstatic.com/libra-css/css/1.0.376/style-awsm.css
              Source: loaddll64.exe, 00000000.00000003.260974705.00000168EB932000.00000004.00000001.sdmp, regsvr32.exe, 00000002.00000002.235939874.0000000003100000.00000004.00000001.sdmp, regsvr32.exe, 00000002.00000003.230885709.00000000011D6000.00000004.00000001.sdmp, rundll32.exe, 00000008.00000002.249744081.0000020669430000.00000004.00000001.sdmp, rundll32.exe, 00000009.00000002.256508994.000002944EE59000.00000004.00000020.sdmpString found in binary or memory: https://a0.awsstatic.com/libra-css/images
              Source: loaddll64.exe, 00000000.00000002.267431892.00000168ED670000.00000004.00000001.sdmp, regsvr32.exe, 00000002.00000002.235939874.0000000003100000.00000004.00000001.sdmp, rundll32.exe, 00000008.00000002.249020232.0000020667755000.00000004.00000020.sdmp, rundll32.exe, 00000009.00000002.256508994.000002944EE59000.00000004.00000020.sdmpString found in binary or memory: https://a0.awsstatic.com/libra-css/images/gi-map/AWS_Global-Infrastructure-Map.svg
              Source: regsvr32.exe, 00000002.00000003.230833647.00000000011A5000.00000004.00000001.sdmp, rundll32.exe, 00000009.00000002.256477930.000002944EE24000.00000004.00000020.sdmpString found in binary or memory: https://a0.awsstatic.com/libra-css/images/logos
              Source: loaddll64.exe, 00000000.00000003.260974705.00000168EB932000.00000004.00000001.sdmp, regsvr32.exe, 00000002.00000002.235939874.0000000003100000.00000004.00000001.sdmp, rundll32.exe, 00000008.00000002.249744081.0000020669430000.00000004.00000001.sdmp, rundll32.exe, 00000009.00000002.256508994.000002944EE59000.00000004.00000020.sdmpString found in binary or memory: https://a0.awsstatic.com/libra-css/images/logos/aws_logo_smile_1200x630.png
              Source: loaddll64.exe, 00000000.00000003.260974705.00000168EB932000.00000004.00000001.sdmp, regsvr32.exe, 00000002.00000002.235939874.0000000003100000.00000004.00000001.sdmp, rundll32.exe, 00000008.00000002.249744081.0000020669430000.00000004.00000001.sdmp, rundll32.exe, 00000009.00000002.256508994.000002944EE59000.00000004.00000020.sdmpString found in binary or memory: https://a0.awsstatic.com/libra-css/images/logos/aws_logo_smile_179x109.png
              Source: loaddll64.exe, 00000000.00000002.266211945.00000168EB8F1000.00000004.00000020.sdmpString found in binary or memory: https://a0.awsstatic.com/libra-css/images/logostprime.c
              Source: rundll32.exe, 00000009.00000002.256508994.000002944EE59000.00000004.00000020.sdmpString found in binary or memory: https://a0.awsstatic.com/libra-css/images/site/fav/favicon.ico
              Source: rundll32.exe, 00000009.00000002.256508994.000002944EE59000.00000004.00000020.sdmpString found in binary or memory: https://a0.awsstatic.com/libra-css/images/site/touch-icon-ipad-144-smile.png
              Source: rundll32.exe, 00000009.00000002.256508994.000002944EE59000.00000004.00000020.sdmpString found in binary or memory: https://a0.awsstatic.com/libra-css/images/site/touch-icon-iphone-114-smile.png
              Source: loaddll64.exe, 00000000.00000003.260974705.00000168EB932000.00000004.00000001.sdmp, regsvr32.exe, 00000002.00000002.235939874.0000000003100000.00000004.00000001.sdmp, rundll32.exe, 00000008.00000002.249744081.0000020669430000.00000004.00000001.sdmp, rundll32.exe, 00000009.00000002.256508994.000002944EE59000.00000004.00000020.sdmpString found in binary or memory: https://a0.awsstatic.com/libra-search/1.0.13/js
              Source: loaddll64.exe, 00000000.00000003.260974705.00000168EB932000.00000004.00000001.sdmp, regsvr32.exe, 00000002.00000002.235939874.0000000003100000.00000004.00000001.sdmp, rundll32.exe, 00000008.00000002.249744081.0000020669430000.00000004.00000001.sdmp, rundll32.exe, 00000009.00000002.256508994.000002944EE59000.00000004.00000020.sdmpString found in binary or memory: https://a0.awsstatic.com/libra/1.0.377/directories
              Source: loaddll64.exe, 00000000.00000003.260974705.00000168EB932000.00000004.00000001.sdmp, regsvr32.exe, 00000002.00000002.235939874.0000000003100000.00000004.00000001.sdmp, rundll32.exe, 00000008.00000002.249744081.0000020669430000.00000004.00000001.sdmp, rundll32.exe, 00000009.00000002.256508994.000002944EE59000.00000004.00000020.sdmpString found in binary or memory: https://a0.awsstatic.com/libra/1.0.377/libra-cardsui
              Source: loaddll64.exe, 00000000.00000003.260974705.00000168EB932000.00000004.00000001.sdmp, regsvr32.exe, 00000002.00000002.235939874.0000000003100000.00000004.00000001.sdmp, rundll32.exe, 00000008.00000002.249744081.0000020669430000.00000004.00000001.sdmp, rundll32.exe, 00000009.00000002.256508994.000002944EE59000.00000004.00000020.sdmpString found in binary or memory: https://a0.awsstatic.com/libra/1.0.377/libra-head.js
              Source: loaddll64.exe, 00000000.00000003.260974705.00000168EB932000.00000004.00000001.sdmp, regsvr32.exe, 00000002.00000002.235939874.0000000003100000.00000004.00000001.sdmp, rundll32.exe, 00000008.00000002.249744081.0000020669430000.00000004.00000001.sdmp, rundll32.exe, 00000009.00000002.256508994.000002944EE59000.00000004.00000020.sdmpString found in binary or memory: https://a0.awsstatic.com/libra/1.0.377/librastandardlib
              Source: loaddll64.exe, 00000000.00000003.260974705.00000168EB932000.00000004.00000001.sdmp, regsvr32.exe, 00000002.00000002.235939874.0000000003100000.00000004.00000001.sdmp, rundll32.exe, 00000008.00000002.249744081.0000020669430000.00000004.00000001.sdmp, rundll32.exe, 00000009.00000002.256508994.000002944EE59000.00000004.00000020.sdmpString found in binary or memory: https://a0.awsstatic.com/plc/js/1.0.109/plc
              Source: loaddll64.exe, 00000000.00000003.260974705.00000168EB932000.00000004.00000001.sdmp, regsvr32.exe, 00000002.00000002.235939874.0000000003100000.00000004.00000001.sdmp, rundll32.exe, 00000008.00000002.249744081.0000020669430000.00000004.00000001.sdmp, rundll32.exe, 00000009.00000002.256508994.000002944EE59000.00000004.00000020.sdmpString found in binary or memory: https://a0.awsstatic.com/pricing-calculator/js/1.0.2
              Source: loaddll64.exe, 00000000.00000003.260974705.00000168EB932000.00000004.00000001.sdmp, regsvr32.exe, 00000002.00000002.235939874.0000000003100000.00000004.00000001.sdmp, rundll32.exe, 00000008.00000002.249744081.0000020669430000.00000004.00000001.sdmp, rundll32.exe, 00000009.00000002.256508994.000002944EE59000.00000004.00000020.sdmpString found in binary or memory: https://a0.awsstatic.com/pricing-savings-plan/js/1.0.6
              Source: loaddll64.exe, 00000000.00000003.260974705.00000168EB932000.00000004.00000001.sdmp, regsvr32.exe, 00000002.00000002.235939874.0000000003100000.00000004.00000001.sdmp, rundll32.exe, 00000008.00000002.249744081.0000020669430000.00000004.00000001.sdmp, rundll32.exe, 00000009.00000002.256508994.000002944EE59000.00000004.00000020.sdmpString found in binary or memory: https://a0.awsstatic.com/psf/null
              Source: loaddll64.exe, 00000000.00000003.260974705.00000168EB932000.00000004.00000001.sdmp, regsvr32.exe, 00000002.00000002.235939874.0000000003100000.00000004.00000001.sdmp, rundll32.exe, 00000008.00000002.249744081.0000020669430000.00000004.00000001.sdmp, rundll32.exe, 00000009.00000002.256508994.000002944EE59000.00000004.00000020.sdmpString found in binary or memory: https://a0.awsstatic.com/s_code/js/3.0/awshome_s_code.js
              Source: loaddll64.exe, 00000000.00000003.260974705.00000168EB932000.00000004.00000001.sdmp, regsvr32.exe, 00000002.00000002.235939874.0000000003100000.00000004.00000001.sdmp, rundll32.exe, 00000008.00000002.249744081.0000020669430000.00000004.00000001.sdmp, rundll32.exe, 00000009.00000002.256508994.000002944EE59000.00000004.00000020.sdmpString found in binary or memory: https://a0.awsstatic.com/target/1.0.113/aws-target-mediator.js
              Source: regsvr32.exe, 00000002.00000003.230833647.00000000011A5000.00000004.00000001.sdmpString found in binary or memory: https://amazon.com/
              Source: rundll32.exe, 00000008.00000002.248977002.00000206676E5000.00000004.00000020.sdmpString found in binary or memory: https://amazon.com/F
              Source: rundll32.exe, 00000008.00000002.248977002.00000206676E5000.00000004.00000020.sdmpString found in binary or memory: https://amazon.com/h
              Source: loaddll64.exe, 00000000.00000002.266211945.00000168EB8F1000.00000004.00000020.sdmpString found in binary or memory: https://amazon.com/r
              Source: loaddll64.exe, 00000000.00000002.266211945.00000168EB8F1000.00000004.00000020.sdmp, loaddll64.exe, 00000000.00000003.260974705.00000168EB932000.00000004.00000001.sdmp, regsvr32.exe, 00000002.00000002.235939874.0000000003100000.00000004.00000001.sdmp, rundll32.exe, 00000008.00000002.249744081.0000020669430000.00000004.00000001.sdmp, rundll32.exe, 00000009.00000002.256508994.000002944EE59000.00000004.00000020.sdmpString found in binary or memory: https://amazonwebservicesinc.tt.omtrdc.net
              Source: de-ch[1].htm.6.drString found in binary or memory: https://amzn.to/2TTxhNg
              Source: auction[1].htm.6.drString found in binary or memory: https://api.taboola.com/2.0/json/msn-ch-de-home/recommendations.notify-click?app.type=desktop&amp;ap
              Source: de-ch[1].htm.6.drString found in binary or memory: https://apps.apple.com/ch/app/microsoft-news/id945416273?pt=80423&amp;ct=prime_footer&amp;mt=8
              Source: loaddll64.exe, 00000000.00000002.266044749.00000168EB8A8000.00000004.00000020.sdmpString found in binary or memory: https://awndeprunto.casa/
              Source: loaddll64.exe, 00000000.00000002.266211945.00000168EB8F1000.00000004.00000020.sdmpString found in binary or memory: https://aws.am
              Source: loaddll64.exe, 00000000.00000002.266211945.00000168EB8F1000.00000004.00000020.sdmpString found in binary or memory: https://aws.amazon
              Source: rundll32.exe, 00000009.00000002.256508994.000002944EE59000.00000004.00000020.sdmpString found in binary or memory: https://aws.amazon.com/
              Source: regsvr32.exe, 00000002.00000002.235939874.0000000003100000.00000004.00000001.sdmp, rundll32.exe, 00000008.00000002.248995795.0000020667718000.00000004.00000020.sdmp, rundll32.exe, 00000008.00000002.249744081.0000020669430000.00000004.00000001.sdmp, rundll32.exe, 00000009.00000002.256422146.000002944EDDC000.00000004.00000020.sdmp, rundll32.exe, 00000009.00000002.256508994.000002944EE59000.00000004.00000020.sdmpString found in binary or memory: https://aws.amazon.com/?nc1=h_ls
              Source: rundll32.exe, 00000009.00000002.256508994.000002944EE59000.00000004.00000020.sdmpString found in binary or memory: https://aws.amazon.com/?nc2=h_lg
              Source: loaddll64.exe, 00000000.00000002.266000014.00000168EB883000.00000004.00000020.sdmpString found in binary or memory: https://aws.amazon.com/C2
              Source: regsvr32.exe, 00000002.00000002.235202840.0000000001128000.00000004.00000020.sdmpString found in binary or memory: https://aws.amazon.com/S
              Source: rundll32.exe, 00000008.00000002.248909528.000002066767B000.00000004.00000020.sdmpString found in binary or memory: https://aws.amazon.com/Xn
              Source: loaddll64.exe, 00000000.00000003.260974705.00000168EB932000.00000004.00000001.sdmp, regsvr32.exe, 00000002.00000002.235939874.0000000003100000.00000004.00000001.sdmp, rundll32.exe, 00000008.00000002.249744081.0000020669430000.00000004.00000001.sdmp, rundll32.exe, 00000009.00000002.256508994.000002944EE59000.00000004.00000020.sdmpString found in binary or memory: https://aws.amazon.com/ar/
              Source: regsvr32.exe, 00000002.00000003.230833647.00000000011A5000.00000004.00000001.sdmpString found in binary or memory: https://aws.amazon.com/ar/?nc1
              Source: regsvr32.exe, 00000002.00000002.235939874.0000000003100000.00000004.00000001.sdmp, rundll32.exe, 00000008.00000002.248995795.0000020667718000.00000004.00000020.sdmp, rundll32.exe, 00000008.00000002.249744081.0000020669430000.00000004.00000001.sdmp, rundll32.exe, 00000009.00000002.256422146.000002944EDDC000.00000004.00000020.sdmp, rundll32.exe, 00000009.00000002.256508994.000002944EE59000.00000004.00000020.sdmpString found in binary or memory: https://aws.amazon.com/ar/?nc1=h_ls
              Source: rundll32.exe, 00000008.00000002.248977002.00000206676E5000.00000004.00000020.sdmpString found in binary or memory: https://aws.amazon.com/b
              Source: loaddll64.exe, 00000000.00000002.266211945.00000168EB8F1000.00000004.00000020.sdmp, loaddll64.exe, 00000000.00000003.260974705.00000168EB932000.00000004.00000001.sdmp, regsvr32.exe, 00000002.00000002.235939874.0000000003100000.00000004.00000001.sdmp, rundll32.exe, 00000008.00000002.249744081.0000020669430000.00000004.00000001.sdmp, rundll32.exe, 00000009.00000002.256508994.000002944EE59000.00000004.00000020.sdmpString found in binary or memory: https://aws.amazon.com/cn/
              Source: regsvr32.exe, 00000002.00000002.235939874.0000000003100000.00000004.00000001.sdmp, rundll32.exe, 00000008.00000002.248995795.0000020667718000.00000004.00000020.sdmp, rundll32.exe, 00000008.00000002.249744081.0000020669430000.00000004.00000001.sdmp, rundll32.exe, 00000009.00000002.256422146.000002944EDDC000.00000004.00000020.sdmp, rundll32.exe, 00000009.00000002.256508994.000002944EE59000.00000004.00000020.sdmpString found in binary or memory: https://aws.amazon.com/cn/?nc1=h_ls
              Source: loaddll64.exe, 00000000.00000002.266211945.00000168EB8F1000.00000004.00000020.sdmp, loaddll64.exe, 00000000.00000003.260974705.00000168EB932000.00000004.00000001.sdmp, regsvr32.exe, 00000002.00000002.235939874.0000000003100000.00000004.00000001.sdmp, rundll32.exe, 00000008.00000002.249744081.0000020669430000.00000004.00000001.sdmp, rundll32.exe, 00000009.00000002.256508994.000002944EE59000.00000004.00000020.sdmpString found in binary or memory: https://aws.amazon.com/de/
              Source: regsvr32.exe, 00000002.00000002.235939874.0000000003100000.00000004.00000001.sdmp, rundll32.exe, 00000008.00000002.248995795.0000020667718000.00000004.00000020.sdmp, rundll32.exe, 00000008.00000002.249744081.0000020669430000.00000004.00000001.sdmp, rundll32.exe, 00000009.00000002.256422146.000002944EDDC000.00000004.00000020.sdmp, rundll32.exe, 00000009.00000002.256508994.000002944EE59000.00000004.00000020.sdmpString found in binary or memory: https://aws.amazon.com/de/?nc1=h_ls
              Source: loaddll64.exe, 00000000.00000002.266211945.00000168EB8F1000.00000004.00000020.sdmpString found in binary or memory: https://aws.amazon.com/es
              Source: loaddll64.exe, 00000000.00000003.260974705.00000168EB932000.00000004.00000001.sdmp, regsvr32.exe, 00000002.00000002.235939874.0000000003100000.00000004.00000001.sdmp, rundll32.exe, 00000008.00000002.249744081.0000020669430000.00000004.00000001.sdmp, rundll32.exe, 00000009.00000002.256508994.000002944EE59000.00000004.00000020.sdmpString found in binary or memory: https://aws.amazon.com/es/
              Source: regsvr32.exe, 00000002.00000002.235939874.0000000003100000.00000004.00000001.sdmp, rundll32.exe, 00000008.00000002.248995795.0000020667718000.00000004.00000020.sdmp, rundll32.exe, 00000008.00000002.249744081.0000020669430000.00000004.00000001.sdmp, rundll32.exe, 00000009.00000002.256422146.000002944EDDC000.00000004.00000020.sdmp, rundll32.exe, 00000009.00000002.256508994.000002944EE59000.00000004.00000020.sdmpString found in binary or memory: https://aws.amazon.com/es/?nc1=h_ls
              Source: loaddll64.exe, 00000000.00000003.260974705.00000168EB932000.00000004.00000001.sdmp, regsvr32.exe, 00000002.00000002.235939874.0000000003100000.00000004.00000001.sdmp, rundll32.exe, 00000008.00000002.249744081.0000020669430000.00000004.00000001.sdmp, rundll32.exe, 00000009.00000002.256508994.000002944EE59000.00000004.00000020.sdmpString found in binary or memory: https://aws.amazon.com/fr/
              Source: regsvr32.exe, 00000002.00000002.235939874.0000000003100000.00000004.00000001.sdmp, rundll32.exe, 00000008.00000002.248995795.0000020667718000.00000004.00000020.sdmp, rundll32.exe, 00000008.00000002.249744081.0000020669430000.00000004.00000001.sdmp, rundll32.exe, 00000009.00000002.256422146.000002944EDDC000.00000004.00000020.sdmp, rundll32.exe, 00000009.00000002.256508994.000002944EE59000.00000004.00000020.sdmpString found in binary or memory: https://aws.amazon.com/fr/?nc1=h_ls
              Source: loaddll64.exe, 00000000.00000003.260974705.00000168EB932000.00000004.00000001.sdmp, regsvr32.exe, 00000002.00000002.235939874.0000000003100000.00000004.00000001.sdmp, rundll32.exe, 00000008.00000002.249744081.0000020669430000.00000004.00000001.sdmp, rundll32.exe, 00000009.00000002.256508994.000002944EE59000.00000004.00000020.sdmpString found in binary or memory: https://aws.amazon.com/id/
              Source: regsvr32.exe, 00000002.00000002.235939874.0000000003100000.00000004.00000001.sdmp, rundll32.exe, 00000008.00000002.248995795.0000020667718000.00000004.00000020.sdmp, rundll32.exe, 00000008.00000002.249744081.0000020669430000.00000004.00000001.sdmp, rundll32.exe, 00000009.00000002.256422146.000002944EDDC000.00000004.00000020.sdmp, rundll32.exe, 00000009.00000002.256508994.000002944EE59000.00000004.00000020.sdmpString found in binary or memory: https://aws.amazon.com/id/?nc1=h_ls
              Source: loaddll64.exe, 00000000.00000002.266211945.00000168EB8F1000.00000004.00000020.sdmp, loaddll64.exe, 00000000.00000003.260974705.00000168EB932000.00000004.00000001.sdmp, regsvr32.exe, 00000002.00000002.235939874.0000000003100000.00000004.00000001.sdmp, rundll32.exe, 00000008.00000002.249744081.0000020669430000.00000004.00000001.sdmp, rundll32.exe, 00000009.00000002.256508994.000002944EE59000.00000004.00000020.sdmpString found in binary or memory: https://aws.amazon.com/it/
              Source: regsvr32.exe, 00000002.00000002.235939874.0000000003100000.00000004.00000001.sdmp, rundll32.exe, 00000008.00000002.248995795.0000020667718000.00000004.00000020.sdmp, rundll32.exe, 00000008.00000002.249744081.0000020669430000.00000004.00000001.sdmp, rundll32.exe, 00000009.00000002.256422146.000002944EDDC000.00000004.00000020.sdmp, rundll32.exe, 00000009.00000002.256508994.000002944EE59000.00000004.00000020.sdmpString found in binary or memory: https://aws.amazon.com/it/?nc1=h_ls
              Source: loaddll64.exe, 00000000.00000002.266211945.00000168EB8F1000.00000004.00000020.sdmp, loaddll64.exe, 00000000.00000003.260974705.00000168EB932000.00000004.00000001.sdmp, regsvr32.exe, 00000002.00000002.235939874.0000000003100000.00000004.00000001.sdmp, rundll32.exe, 00000008.00000002.249744081.0000020669430000.00000004.00000001.sdmp, rundll32.exe, 00000009.00000002.256508994.000002944EE59000.00000004.00000020.sdmpString found in binary or memory: https://aws.amazon.com/jp/
              Source: regsvr32.exe, 00000002.00000002.235939874.0000000003100000.00000004.00000001.sdmp, rundll32.exe, 00000008.00000002.248995795.0000020667718000.00000004.00000020.sdmp, rundll32.exe, 00000008.00000002.249744081.0000020669430000.00000004.00000001.sdmp, rundll32.exe, 00000009.00000002.256422146.000002944EDDC000.00000004.00000020.sdmp, rundll32.exe, 00000009.00000002.256508994.000002944EE59000.00000004.00000020.sdmpString found in binary or memory: https://aws.amazon.com/jp/?nc1=h_ls
              Source: loaddll64.exe, 00000000.00000003.260974705.00000168EB932000.00000004.00000001.sdmp, regsvr32.exe, 00000002.00000002.235939874.0000000003100000.00000004.00000001.sdmp, rundll32.exe, 00000008.00000002.249744081.0000020669430000.00000004.00000001.sdmp, rundll32.exe, 00000009.00000002.256508994.000002944EE59000.00000004.00000020.sdmpString found in binary or memory: https://aws.amazon.com/ko/
              Source: regsvr32.exe, 00000002.00000002.235939874.0000000003100000.00000004.00000001.sdmp, rundll32.exe, 00000008.00000002.248995795.0000020667718000.00000004.00000020.sdmp, rundll32.exe, 00000008.00000002.249744081.0000020669430000.00000004.00000001.sdmp, rundll32.exe, 00000009.00000002.256422146.000002944EDDC000.00000004.00000020.sdmp, rundll32.exe, 00000009.00000002.256508994.000002944EE59000.00000004.00000020.sdmpString found in binary or memory: https://aws.amazon.com/ko/?nc1=h_ls
              Source: loaddll64.exe, 00000000.00000003.260974705.00000168EB932000.00000004.00000001.sdmp, regsvr32.exe, 00000002.00000002.235939874.0000000003100000.00000004.00000001.sdmp, rundll32.exe, 00000008.00000002.249744081.0000020669430000.00000004.00000001.sdmp, rundll32.exe, 00000009.00000002.256508994.000002944EE59000.00000004.00000020.sdmpString found in binary or memory: https://aws.amazon.com/marketplace/?nc2=h_mo
              Source: loaddll64.exe, 00000000.00000003.260974705.00000168EB932000.00000004.00000001.sdmp, regsvr32.exe, 00000002.00000002.235939874.0000000003100000.00000004.00000001.sdmp, rundll32.exe, 00000008.00000002.249744081.0000020669430000.00000004.00000001.sdmp, rundll32.exe, 00000009.00000002.256508994.000002944EE59000.00000004.00000020.sdmpString found in binary or memory: https://aws.amazon.com/marketplace/?nc2=h_ql_mp
              Source: loaddll64.exe, 00000000.00000002.267431892.00000168ED670000.00000004.00000001.sdmp, regsvr32.exe, 00000002.00000002.235939874.0000000003100000.00000004.00000001.sdmp, rundll32.exe, 00000008.00000002.249744081.0000020669430000.00000004.00000001.sdmp, rundll32.exe, 00000009.00000002.256508994.000002944EE59000.00000004.00000020.sdmpString found in binary or memory: https://aws.amazon.com/marketplace?aws=hp
              Source: rundll32.exe, 00000009.00000002.256443442.000002944EDED000.00000004.00000020.sdmpString found in binary or memory: https://aws.amazon.com/ou
              Source: loaddll64.exe, 00000000.00000002.266307970.00000168EB928000.00000004.00000020.sdmp, regsvr32.exe, 00000002.00000002.235939874.0000000003100000.00000004.00000001.sdmp, rundll32.exe, 00000008.00000002.248995795.0000020667718000.00000004.00000020.sdmp, rundll32.exe, 00000009.00000002.256508994.000002944EE59000.00000004.00000020.sdmpString found in binary or memory: https://aws.amazon.com/podcasts/aws-podcast/
              Source: loaddll64.exe, 00000000.00000002.266307970.00000168EB928000.00000004.00000020.sdmp, regsvr32.exe, 00000002.00000002.235939874.0000000003100000.00000004.00000001.sdmp, rundll32.exe, 00000008.00000002.248995795.0000020667718000.00000004.00000020.sdmp, rundll32.exe, 00000009.00000002.256422146.000002944EDDC000.00000004.00000020.sdmpString found in binary or memory: https://aws.amazon.com/privacy/?nc1=f_pr
              Source: loaddll64.exe, 00000000.00000003.260974705.00000168EB932000.00000004.00000001.sdmp, regsvr32.exe, 00000002.00000002.235939874.0000000003100000.00000004.00000001.sdmp, rundll32.exe, 00000008.00000002.249744081.0000020669430000.00000004.00000001.sdmp, rundll32.exe, 00000009.00000002.256508994.000002944EE59000.00000004.00000020.sdmpString found in binary or memory: https://aws.amazon.com/pt/
              Source: regsvr32.exe, 00000002.00000002.235939874.0000000003100000.00000004.00000001.sdmp, rundll32.exe, 00000008.00000002.248995795.0000020667718000.00000004.00000020.sdmp, rundll32.exe, 00000008.00000002.249744081.0000020669430000.00000004.00000001.sdmp, rundll32.exe, 00000009.00000002.256422146.000002944EDDC000.00000004.00000020.sdmp, rundll32.exe, 00000009.00000002.256508994.000002944EE59000.00000004.00000020.sdmpString found in binary or memory: https://aws.amazon.com/pt/?nc1=h_ls
              Source: loaddll64.exe, 00000000.00000002.266211945.00000168EB8F1000.00000004.00000020.sdmp, loaddll64.exe, 00000000.00000003.260974705.00000168EB932000.00000004.00000001.sdmp, regsvr32.exe, 00000002.00000002.235939874.0000000003100000.00000004.00000001.sdmp, rundll32.exe, 00000008.00000002.249744081.0000020669430000.00000004.00000001.sdmp, rundll32.exe, 00000009.00000002.256508994.000002944EE59000.00000004.00000020.sdmpString found in binary or memory: https://aws.amazon.com/ru/
              Source: regsvr32.exe, 00000002.00000002.235939874.0000000003100000.00000004.00000001.sdmp, rundll32.exe, 00000008.00000002.248995795.0000020667718000.00000004.00000020.sdmp, rundll32.exe, 00000008.00000002.249744081.0000020669430000.00000004.00000001.sdmp, rundll32.exe, 00000009.00000002.256422146.000002944EDDC000.00000004.00000020.sdmp, rundll32.exe, 00000009.00000002.256508994.000002944EE59000.00000004.00000020.sdmpString found in binary or memory: https://aws.amazon.com/ru/?nc1=h_ls
              Source: loaddll64.exe, 00000000.00000003.260974705.00000168EB932000.00000004.00000001.sdmp, regsvr32.exe, 00000002.00000002.235939874.0000000003100000.00000004.00000001.sdmp, rundll32.exe, 00000008.00000002.249744081.0000020669430000.00000004.00000001.sdmp, rundll32.exe, 00000009.00000002.256508994.000002944EE59000.00000004.00000020.sdmpString found in binary or memory: https://aws.amazon.com/search
              Source: loaddll64.exe, 00000000.00000003.260974705.00000168EB932000.00000004.00000001.sdmp, regsvr32.exe, 00000002.00000002.235939874.0000000003100000.00000004.00000001.sdmp, rundll32.exe, 00000008.00000002.249744081.0000020669430000.00000004.00000001.sdmp, rundll32.exe, 00000009.00000002.256508994.000002944EE59000.00000004.00000020.sdmpString found in binary or memory: https://aws.amazon.com/search/
              Source: loaddll64.exe, 00000000.00000003.260974705.00000168EB932000.00000004.00000001.sdmp, regsvr32.exe, 00000002.00000002.235939874.0000000003100000.00000004.00000001.sdmp, rundll32.exe, 00000008.00000002.249744081.0000020669430000.00000004.00000001.sdmp, rundll32.exe, 00000009.00000002.256508994.000002944EE59000.00000004.00000020.sdmpString found in binary or memory: https://aws.amazon.com/search/?searchQuery=
              Source: loaddll64.exe, 00000000.00000002.266307970.00000168EB928000.00000004.00000020.sdmp, regsvr32.exe, 00000002.00000002.235939874.0000000003100000.00000004.00000001.sdmp, rundll32.exe, 00000008.00000002.248995795.0000020667718000.00000004.00000020.sdmp, rundll32.exe, 00000009.00000002.256422146.000002944EDDC000.00000004.00000020.sdmpString found in binary or memory: https://aws.amazon.com/terms/?nc1=f_pr
              Source: loaddll64.exe, 00000000.00000002.266211945.00000168EB8F1000.00000004.00000020.sdmp, loaddll64.exe, 00000000.00000003.260974705.00000168EB932000.00000004.00000001.sdmp, regsvr32.exe, 00000002.00000002.235939874.0000000003100000.00000004.00000001.sdmp, rundll32.exe, 00000008.00000002.249744081.0000020669430000.00000004.00000001.sdmp, rundll32.exe, 00000009.00000002.256508994.000002944EE59000.00000004.00000020.sdmpString found in binary or memory: https://aws.amazon.com/th/
              Source: regsvr32.exe, 00000002.00000002.235939874.0000000003100000.00000004.00000001.sdmp, rundll32.exe, 00000008.00000002.248995795.0000020667718000.00000004.00000020.sdmp, rundll32.exe, 00000008.00000002.249744081.0000020669430000.00000004.00000001.sdmp, rundll32.exe, 00000009.00000002.256422146.000002944EDDC000.00000004.00000020.sdmp, rundll32.exe, 00000009.00000002.256508994.000002944EE59000.00000004.00000020.sdmpString found in binary or memory: https://aws.amazon.com/th/?nc1=f_ls
              Source: loaddll64.exe, 00000000.00000003.260974705.00000168EB932000.00000004.00000001.sdmp, regsvr32.exe, 00000002.00000002.235939874.0000000003100000.00000004.00000001.sdmp, rundll32.exe, 00000008.00000002.249744081.0000020669430000.00000004.00000001.sdmp, rundll32.exe, 00000009.00000002.256508994.000002944EE59000.00000004.00000020.sdmpString found in binary or memory: https://aws.amazon.com/tr/
              Source: regsvr32.exe, 00000002.00000002.235939874.0000000003100000.00000004.00000001.sdmp, rundll32.exe, 00000008.00000002.248995795.0000020667718000.00000004.00000020.sdmp, rundll32.exe, 00000008.00000002.249744081.0000020669430000.00000004.00000001.sdmp, rundll32.exe, 00000009.00000002.256422146.000002944EDDC000.00000004.00000020.sdmp, rundll32.exe, 00000009.00000002.256508994.000002944EE59000.00000004.00000020.sdmpString found in binary or memory: https://aws.amazon.com/tr/?nc1=h_ls
              Source: loaddll64.exe, 00000000.00000002.266211945.00000168EB8F1000.00000004.00000020.sdmp, loaddll64.exe, 00000000.00000003.260974705.00000168EB932000.00000004.00000001.sdmp, regsvr32.exe, 00000002.00000002.235939874.0000000003100000.00000004.00000001.sdmp, rundll32.exe, 00000008.00000002.249744081.0000020669430000.00000004.00000001.sdmp, rundll32.exe, 00000009.00000002.256508994.000002944EE59000.00000004.00000020.sdmpString found in binary or memory: https://aws.amazon.com/tw/
              Source: regsvr32.exe, 00000002.00000002.235939874.0000000003100000.00000004.00000001.sdmp, rundll32.exe, 00000008.00000002.248995795.0000020667718000.00000004.00000020.sdmp, rundll32.exe, 00000008.00000002.249744081.0000020669430000.00000004.00000001.sdmp, rundll32.exe, 00000009.00000002.256422146.000002944EDDC000.00000004.00000020.sdmp, rundll32.exe, 00000009.00000002.256508994.000002944EE59000.00000004.00000020.sdmpString found in binary or memory: https://aws.amazon.com/tw/?nc1=h_ls
              Source: loaddll64.exe, 00000000.00000003.260974705.00000168EB932000.00000004.00000001.sdmp, regsvr32.exe, 00000002.00000002.235939874.0000000003100000.00000004.00000001.sdmp, rundll32.exe, 00000008.00000002.249744081.0000020669430000.00000004.00000001.sdmp, rundll32.exe, 00000009.00000002.256508994.000002944EE59000.00000004.00000020.sdmpString found in binary or memory: https://aws.amazon.com/vi/
              Source: regsvr32.exe, 00000002.00000002.235939874.0000000003100000.00000004.00000001.sdmp, rundll32.exe, 00000008.00000002.248995795.0000020667718000.00000004.00000020.sdmp, rundll32.exe, 00000008.00000002.249744081.0000020669430000.00000004.00000001.sdmp, rundll32.exe, 00000009.00000002.256422146.000002944EDDC000.00000004.00000020.sdmp, rundll32.exe, 00000009.00000002.256508994.000002944EE59000.00000004.00000020.sdmpString found in binary or memory: https://aws.amazon.com/vi/?nc1=f_ls
              Source: auction[1].htm.6.drString found in binary or memory: https://beap.gemini.yahoo.com/mbclk?bv=1.0.0&amp;es=ka1_uR0GIS8DQZH7lLrsdyRTbE5gXjr..KX6RT9iojYy5zgu
              Source: 55a804ab-e5c6-4b97-9319-86263d365d28[1].json.6.drString found in binary or memory: https://cdn.cookielaw.org/vendorlist/googleData.json
              Source: 55a804ab-e5c6-4b97-9319-86263d365d28[1].json.6.drString found in binary or memory: https://cdn.cookielaw.org/vendorlist/iab2Data.json
              Source: 55a804ab-e5c6-4b97-9319-86263d365d28[1].json.6.drString found in binary or memory: https://cdn.cookielaw.org/vendorlist/iabData.json
              Source: auction[1].htm.6.drString found in binary or memory: https://cdn.flurry.com/adTemplates/templates/htmls/clips.html&quot;
              Source: de-ch[1].htm.6.drString found in binary or memory: https://click.linksynergy.com/deeplink?id=xoqYgl4JDe8&amp;mid=46130&amp;u1=dech_mestripe_office&amp;
              Source: de-ch[1].htm.6.drString found in binary or memory: https://click.linksynergy.com/deeplink?id=xoqYgl4JDe8&amp;mid=46130&amp;u1=dech_mestripe_store&amp;m
              Source: de-ch[1].htm.6.drString found in binary or memory: https://click.linksynergy.com/deeplink?id=xoqYgl4JDe8&amp;mid=46130&amp;u1=dech_promotionalstripe_na
              Source: 52-478955-68ddb2ab[1].js.6.drString found in binary or memory: https://client-s.gateway.messenger.live.com
              Source: de-ch[1].htm.6.drString found in binary or memory: https://clk.tradedoubler.com/click?p=245744&amp;a=3064090&amp;g=21863656
              Source: de-ch[1].htm.6.drString found in binary or memory: https://clkde.tradedoubler.com/click?p=245744&amp;a=3064090&amp;g=24903118&amp;epi=ch-de
              Source: de-ch[1].htm.6.drString found in binary or memory: https://clkde.tradedoubler.com/click?p=245744&amp;a=3064090&amp;g=24952290&amp;epi=dech
              Source: loaddll64.exe, 00000000.00000003.260974705.00000168EB932000.00000004.00000001.sdmp, regsvr32.exe, 00000002.00000002.235939874.0000000003100000.00000004.00000001.sdmp, rundll32.exe, 00000008.00000002.249744081.0000020669430000.00000004.00000001.sdmp, rundll32.exe, 00000009.00000002.256508994.000002944EE59000.00000004.00000020.sdmpString found in binary or memory: https://console.aws.amazon.com/?nc2=h_m_mc
              Source: loaddll64.exe, 00000000.00000003.260974705.00000168EB932000.00000004.00000001.sdmp, regsvr32.exe, 00000002.00000002.235939874.0000000003100000.00000004.00000001.sdmp, rundll32.exe, 00000008.00000002.249744081.0000020669430000.00000004.00000001.sdmp, rundll32.exe, 00000009.00000002.256508994.000002944EE59000.00000004.00000020.sdmpString found in binary or memory: https://console.aws.amazon.com/billing/home?nc2=h_m_bc
              Source: loaddll64.exe, 00000000.00000003.260974705.00000168EB932000.00000004.00000001.sdmp, regsvr32.exe, 00000002.00000002.235939874.0000000003100000.00000004.00000001.sdmp, rundll32.exe, 00000008.00000002.249744081.0000020669430000.00000004.00000001.sdmp, rundll32.exe, 00000009.00000002.256508994.000002944EE59000.00000004.00000020.sdmpString found in binary or memory: https://console.aws.amazon.com/console/home
              Source: loaddll64.exe, 00000000.00000002.266307970.00000168EB928000.00000004.00000020.sdmp, regsvr32.exe, 00000002.00000002.235939874.0000000003100000.00000004.00000001.sdmp, rundll32.exe, 00000008.00000002.248995795.0000020667718000.00000004.00000020.sdmp, rundll32.exe, 00000009.00000002.256508994.000002944EE59000.00000004.00000020.sdmpString found in binary or memory: https://console.aws.amazon.com/console/home?nc1=f_ct&amp;src=footer-signin-mobile
              Source: loaddll64.exe, 00000000.00000003.260974705.00000168EB932000.00000004.00000001.sdmp, regsvr32.exe, 00000002.00000002.235939874.0000000003100000.00000004.00000001.sdmp, rundll32.exe, 00000008.00000002.249744081.0000020669430000.00000004.00000001.sdmp, rundll32.exe, 00000009.00000002.256508994.000002944EE59000.00000004.00000020.sdmpString found in binary or memory: https://console.aws.amazon.com/iam/home?nc2=h_m_sc#security_credential
              Source: loaddll64.exe, 00000000.00000002.266307970.00000168EB928000.00000004.00000020.sdmp, regsvr32.exe, 00000002.00000002.235939874.0000000003100000.00000004.00000001.sdmp, rundll32.exe, 00000008.00000002.248995795.0000020667718000.00000004.00000020.sdmp, rundll32.exe, 00000009.00000002.256422146.000002944EDDC000.00000004.00000020.sdmpString found in binary or memory: https://console.aws.amazon.com/support/home/?nc1=f_dr
              Source: loaddll64.exe, 00000000.00000003.260974705.00000168EB932000.00000004.00000001.sdmp, regsvr32.exe, 00000002.00000002.235939874.0000000003100000.00000004.00000001.sdmp, rundll32.exe, 00000008.00000002.249744081.0000020669430000.00000004.00000001.sdmp, rundll32.exe, 00000009.00000002.256508994.000002944EE59000.00000004.00000020.sdmpString found in binary or memory: https://console.aws.amazon.com/support/home/?nc2=h_ql_cu
              Source: loaddll64.exe, 00000000.00000003.260974705.00000168EB932000.00000004.00000001.sdmp, regsvr32.exe, 00000002.00000002.235939874.0000000003100000.00000004.00000001.sdmp, rundll32.exe, 00000008.00000002.249744081.0000020669430000.00000004.00000001.sdmp, rundll32.exe, 00000009.00000002.256508994.000002944EE59000.00000004.00000020.sdmpString found in binary or memory: https://console.aws.amazon.com/support/home?nc2=h_ql_cu
              Source: ~DF4D56A94DABA8F170.TMP.4.drString found in binary or memory: https://contextual.media.net/checksync.php?&vsSync=1&cs=1&hb=1&cv=37&ndec=1&cid=8HBI57XIG&prvid=77%2
              Source: de-ch[1].htm.6.drString found in binary or memory: https://contextual.media.net/medianet.php?cid=8CU157172
              Source: de-ch[1].htm.6.drString found in binary or memory: https://contextual.media.net/medianet.php?cid=8CU157172&amp;crid=722878611&amp;size=306x271&amp;http
              Source: de-ch[1].htm.6.drString found in binary or memory: https://contextual.media.net/medianet.php?cid=8CU157172&amp;crid=858412214&amp;size=306x271&amp;http
              Source: ~DF4D56A94DABA8F170.TMP.4.drString found in binary or memory: https://contextual.media.net/medianet.php?cid=8CU157172&crid=722878611&size=306x271&https=1
              Source: ~DF4D56A94DABA8F170.TMP.4.drString found in binary or memory: https://contextual.media.net/medianet.php?cid=8CU157172&crid=858412214&size=306x271&https=1
              Source: loaddll64.exe, 00000000.00000002.266211945.00000168EB8F1000.00000004.00000020.sdmp, loaddll64.exe, 00000000.00000003.260974705.00000168EB932000.00000004.00000001.sdmp, regsvr32.exe, 00000002.00000002.235939874.0000000003100000.00000004.00000001.sdmp, rundll32.exe, 00000008.00000002.249744081.0000020669430000.00000004.00000001.sdmp, rundll32.exe, 00000009.00000002.256508994.000002944EE59000.00000004.00000020.sdmpString found in binary or memory: https://d1.awsstatic.com
              Source: loaddll64.exe, 00000000.00000002.266307970.00000168EB928000.00000004.00000020.sdmp, regsvr32.exe, 00000002.00000002.235939874.0000000003100000.00000004.00000001.sdmp, rundll32.exe, 00000008.00000002.248995795.0000020667718000.00000004.00000020.sdmp, rundll32.exe, 00000009.00000002.256508994.000002944EE59000.00000004.00000020.sdmpString found in binary or memory: https://dc.ads.linkedin.com/collect/?pid=3038&amp;fmt=gif
              Source: loaddll64.exe, 00000000.00000003.260974705.00000168EB932000.00000004.00000001.sdmp, regsvr32.exe, 00000002.00000002.235939874.0000000003100000.00000004.00000001.sdmp, rundll32.exe, 00000008.00000002.249744081.0000020669430000.00000004.00000001.sdmp, rundll32.exe, 00000009.00000002.256508994.000002944EE59000.00000004.00000020.sdmpString found in binary or memory: https://devices.amazonaws.com?hp=tile&amp;so-exp=below
              Source: loaddll64.exe, 00000000.00000003.260974705.00000168EB932000.00000004.00000001.sdmp, regsvr32.exe, 00000002.00000002.235939874.0000000003100000.00000004.00000001.sdmp, rundll32.exe, 00000008.00000002.249744081.0000020669430000.00000004.00000001.sdmp, rundll32.exe, 00000009.00000002.256508994.000002944EE59000.00000004.00000020.sdmpString found in binary or memory: https://docs.aws.amazon.com/index.html?nc2=h_ql_doc
              Source: rundll32.exe, 00000009.00000002.256422146.000002944EDDC000.00000004.00000020.sdmp, rundll32.exe, 00000009.00000002.256508994.000002944EE59000.00000004.00000020.sdmpString found in binary or memory: https://fls-na.amazon.com/1/action-impressions/1/OE/aws-mktg/action/awsm_:comp_DeprecatedBrowser
              Source: 55a804ab-e5c6-4b97-9319-86263d365d28[1].json.6.drString found in binary or memory: https://geolocation.onetrust.com/cookieconsentpub/v1/geo/location
              Source: rundll32.exe, 00000008.00000002.248944250.00000206676A2000.00000004.00000020.sdmpString found in binary or memory: https://hbndeprunto.casa/
              Source: loaddll64.exe, 00000000.00000003.260974705.00000168EB932000.00000004.00000001.sdmp, regsvr32.exe, 00000002.00000002.235939874.0000000003100000.00000004.00000001.sdmp, rundll32.exe, 00000008.00000002.249744081.0000020669430000.00000004.00000001.sdmp, rundll32.exe, 00000009.00000002.256508994.000002944EE59000.00000004.00000020.sdmpString found in binary or memory: https://i18n-string.us-west-2.prod.pricing.aws.a2z.com
              Source: auction[1].htm.6.drString found in binary or memory: https://img.img-taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ce_sharpen%2Ch_311%2Cw_207%2Cc_fill%
              Source: auction[1].htm.6.drString found in binary or memory: https://img.img-taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_311%2Cw_207%2Cc_fill%2Cg_faces:au
              Source: auction[1].htm.6.drString found in binary or memory: https://ir2.beap.gemini.yahoo.com/mbcsc?bv=1.0.0&amp;es=zd2rNpIGIS.SDbwNMSgkgbTwPN2_8BU917f4iKFSJgHM
              Source: de-ch[1].htm.6.drString found in binary or memory: https://login.live.com/login.srf?wa=wsignin1.0&amp;rpsnv=13&amp;checkda=1&amp;ct=1619153021&amp;rver
              Source: de-ch[1].htm.6.drString found in binary or memory: https://login.live.com/login.srf?wa=wsignin1.0&amp;rpsnv=13&amp;ct=1619153021&amp;rver=7.0.6730.0&am
              Source: de-ch[1].htm.6.drString found in binary or memory: https://login.live.com/logout.srf?ct=1619153022&amp;rver=7.0.6730.0&amp;lc=1033&amp;id=1184&amp;lru=
              Source: de-ch[1].htm.6.drString found in binary or memory: https://login.live.com/me.srf?wa=wsignin1.0&amp;rpsnv=13&amp;ct=1619153021&amp;rver=7.0.6730.0&amp;w
              Source: 52-478955-68ddb2ab[1].js.6.drString found in binary or memory: https://login.skype.com/login/oauth/microsoft?client_id=738133
              Source: de-ch[1].htm.6.drString found in binary or memory: https://mem.gfx.ms/meversion/?partner=msn&amp;market=de-ch&quot;
              Source: 52-478955-68ddb2ab[1].js.6.drString found in binary or memory: https://office.live.com/start/Excel.aspx?WT.mc_id=MSN_site;Sway
              Source: 52-478955-68ddb2ab[1].js.6.drString found in binary or memory: https://office.live.com/start/PowerPoint.aspx?WT.mc_id=MSN_site
              Source: 52-478955-68ddb2ab[1].js.6.drString found in binary or memory: https://office.live.com/start/Word.aspx?WT.mc_id=MSN_site;Excel
              Source: 52-478955-68ddb2ab[1].js.6.drString found in binary or memory: https://onedrive.live.com/#qt=mru
              Source: 52-478955-68ddb2ab[1].js.6.drString found in binary or memory: https://onedrive.live.com/?qt=allmyphotos;Aktuelle
              Source: 52-478955-68ddb2ab[1].js.6.drString found in binary or memory: https://onedrive.live.com/?qt=mru;Aktuelle
              Source: 52-478955-68ddb2ab[1].js.6.drString found in binary or memory: https://onedrive.live.com/?qt=mru;OneDrive-App
              Source: de-ch[1].htm.6.drString found in binary or memory: https://onedrive.live.com/?wt.mc_id=oo_msn_msnhomepage_header
              Source: 52-478955-68ddb2ab[1].js.6.drString found in binary or memory: https://onedrive.live.com/about/en/download/
              Source: 52-478955-68ddb2ab[1].js.6.drString found in binary or memory: https://onedrive.live.com;Fotos
              Source: 52-478955-68ddb2ab[1].js.6.drString found in binary or memory: https://onedrive.live.com;OneDrive-App
              Source: 52-478955-68ddb2ab[1].js.6.drString found in binary or memory: https://onedrive.live.com?wt.mc_id=oo_msn_msnhomepage_header
              Source: de-ch[1].htm.6.drString found in binary or memory: https://outlook.com/
              Source: 52-478955-68ddb2ab[1].js.6.drString found in binary or memory: https://outlook.live.com/calendar
              Source: 52-478955-68ddb2ab[1].js.6.drString found in binary or memory: https://outlook.live.com/mail/deeplink/compose;Kalender
              Source: loaddll64.exe, 00000000.00000003.260974705.00000168EB932000.00000004.00000001.sdmp, regsvr32.exe, 00000002.00000002.235939874.0000000003100000.00000004.00000001.sdmp, rundll32.exe, 00000008.00000002.249744081.0000020669430000.00000004.00000001.sdmp, rundll32.exe, 00000009.00000002.256508994.000002944EE59000.00000004.00000020.sdmpString found in binary or memory: https://pages.awscloud.com/AQUA_Preview.html?sc_icampaign=Adoption_Campaign_w14y21_chome_slot3_redsh
              Source: loaddll64.exe, 00000000.00000003.260974705.00000168EB932000.00000004.00000001.sdmp, regsvr32.exe, 00000002.00000002.235939874.0000000003100000.00000004.00000001.sdmp, rundll32.exe, 00000008.00000002.249744081.0000020669430000.00000004.00000001.sdmp, rundll32.exe, 00000009.00000002.256508994.000002944EE59000.00000004.00000020.sdmpString found in binary or memory: https://pages.awscloud.com/AmazonECSAnywherePreview.html?hp=tile&amp;so-exp=below
              Source: loaddll64.exe, 00000000.00000002.266307970.00000168EB928000.00000004.00000020.sdmp, regsvr32.exe, 00000002.00000002.235939874.0000000003100000.00000004.00000001.sdmp, rundll32.exe, 00000008.00000002.248995795.0000020667718000.00000004.00000020.sdmp, rundll32.exe, 00000009.00000002.256508994.000002944EE59000.00000004.00000020.sdmpString found in binary or memory: https://pages.awscloud.com/communication-preferences?trk=homepage
              Source: loaddll64.exe, 00000000.00000003.260974705.00000168EB932000.00000004.00000001.sdmp, regsvr32.exe, 00000002.00000002.235939874.0000000003100000.00000004.00000001.sdmp, rundll32.exe, 00000008.00000002.249744081.0000020669430000.00000004.00000001.sdmp, rundll32.exe, 00000009.00000002.256554273.000002944EEA5000.00000004.00000020.sdmpString found in binary or memory: https://pages.awscloud.com/fico-case-study.html?hp=tile&amp;story=fico
              Source: loaddll64.exe, 00000000.00000003.260974705.00000168EB932000.00000004.00000001.sdmp, regsvr32.exe, 00000002.00000002.235939874.0000000003100000.00000004.00000001.sdmp, rundll32.exe, 00000008.00000002.249744081.0000020669430000.00000004.00000001.sdmp, rundll32.exe, 00000009.00000002.256508994.000002944EE59000.00000004.00000020.sdmpString found in binary or memory: https://pages.awscloud.com/zillow-case-study?hp=tile&amp;story=zllw
              Source: loaddll64.exe, 00000000.00000003.260974705.00000168EB932000.00000004.00000001.sdmp, regsvr32.exe, 00000002.00000002.235939874.0000000003100000.00000004.00000001.sdmp, rundll32.exe, 00000008.00000002.249744081.0000020669430000.00000004.00000001.sdmp, rundll32.exe, 00000009.00000002.256508994.000002944EE59000.00000004.00000020.sdmpString found in binary or memory: https://phd.aws.amazon.com/?nc2=h_m_sc
              Source: de-ch[1].htm.6.drString found in binary or memory: https://play.google.com/intl/en_us/badges/images/generic/de_badge_web_generic.png&quot;
              Source: de-ch[1].htm.6.drString found in binary or memory: https://play.google.com/store/apps/details?id=com.microsoft.amp.apps.bingnews&amp;hl=de-ch&amp;refer
              Source: auction[1].htm.6.drString found in binary or memory: https://policies.oath.com/us/en/oath/pri<