Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
qJhkILqiEA.dll

Overview

General Information

Sample Name:qJhkILqiEA.dll
Analysis ID:631909
MD5:8516983eedc8690c1495b828b4262a63
SHA1:bdd250044234e53e9f08db444a1de00987735930
SHA256:90498f1ee590da28566434c15efcfd98e829846f233387553ea655fc7559168d
Tags:exetrojan
Infos:

Detection

Emotet
Score:84
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Yara detected Emotet
System process connects to network (likely due to code injection or exploit)
Antivirus detection for URL or domain
Changes security center settings (notifications, updates, antivirus, firewall)
Machine Learning detection for sample
Hides that the sample has been downloaded from the Internet (zone.identifier)
Queries the volume information (name, serial number etc) of a device
One or more processes crash
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Deletes files inside the Windows folder
May sleep (evasive loops) to hinder dynamic analysis
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Uses code obfuscation techniques (call, push, ret)
Creates files inside the system directory
Internet Provider seen in connection with other malware
Detected potential crypto function
Found potential string decryption / allocating functions
Sample execution stops while process was sleeping (likely an evasion)
Found evasive API chain (may stop execution after checking a module file name)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to dynamically determine API calls
IP address seen in connection with other malware
AV process strings found (often used to terminate AV products)
PE file contains an invalid checksum
Tries to load missing DLLs
Drops PE files to the windows directory (C:\Windows)
Detected TCP or UDP traffic on non-standard ports
Checks if the current process is being debugged
Registers a DLL
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Queries disk information (often used to detect virtual machines)
Found large amount of non-executed APIs
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • loaddll64.exe (PID: 3696 cmdline: loaddll64.exe "C:\Users\user\Desktop\qJhkILqiEA.dll" MD5: 4E8A40CAD6CCC047914E3A7830A2D8AA)
    • cmd.exe (PID: 3024 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\qJhkILqiEA.dll",#1 MD5: 4E2ACF4F8A396486AB4268C94A6A245F)
      • rundll32.exe (PID: 3180 cmdline: rundll32.exe "C:\Users\user\Desktop\qJhkILqiEA.dll",#1 MD5: 73C519F050C20580F8A62C849D49215A)
        • WerFault.exe (PID: 4364 cmdline: C:\Windows\system32\WerFault.exe -u -p 3180 -s 336 MD5: 2AFFE478D86272288BBEF5A00BBEF6A0)
    • regsvr32.exe (PID: 3080 cmdline: regsvr32.exe /s C:\Users\user\Desktop\qJhkILqiEA.dll MD5: D78B75FC68247E8A63ACBA846182740E)
      • regsvr32.exe (PID: 1908 cmdline: C:\Windows\system32\regsvr32.exe "C:\Windows\system32\IxbPFgKevemZDIDo\xuHXDLB.dll" MD5: D78B75FC68247E8A63ACBA846182740E)
    • rundll32.exe (PID: 3088 cmdline: rundll32.exe C:\Users\user\Desktop\qJhkILqiEA.dll,AddIn_FileTime MD5: 73C519F050C20580F8A62C849D49215A)
      • WerFault.exe (PID: 3392 cmdline: C:\Windows\system32\WerFault.exe -u -p 3088 -s 332 MD5: 2AFFE478D86272288BBEF5A00BBEF6A0)
    • rundll32.exe (PID: 1860 cmdline: rundll32.exe C:\Users\user\Desktop\qJhkILqiEA.dll,AddIn_SystemTime MD5: 73C519F050C20580F8A62C849D49215A)
    • rundll32.exe (PID: 1192 cmdline: rundll32.exe C:\Users\user\Desktop\qJhkILqiEA.dll,DllRegisterServer MD5: 73C519F050C20580F8A62C849D49215A)
  • svchost.exe (PID: 6576 cmdline: C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 6616 cmdline: c:\windows\system32\svchost.exe -k localservice -p -s CDPSvc MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 6680 cmdline: c:\windows\system32\svchost.exe -k networkservice -p -s DoSvc MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 6716 cmdline: C:\Windows\System32\svchost.exe -k NetworkService -p MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • SgrmBroker.exe (PID: 6788 cmdline: C:\Windows\system32\SgrmBroker.exe MD5: D3170A3F3A9626597EEE1888686E3EA6)
  • svchost.exe (PID: 6836 cmdline: c:\windows\system32\svchost.exe -k localservicenetworkrestricted -p -s wscsvc MD5: 32569E403279B3FD2EDB7EBD036273FA)
    • MpCmdRun.exe (PID: 2956 cmdline: "C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable MD5: A267555174BFA53844371226F482B86B)
      • conhost.exe (PID: 5008 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • svchost.exe (PID: 6972 cmdline: c:\windows\system32\svchost.exe -k unistacksvcgroup MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 7136 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 5752 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 6560 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 6964 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 5112 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000004.00000000.245516131.0000000180001000.00000020.00001000.00020000.00000000.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
    00000003.00000000.247075589.00000298CA850000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
      00000003.00000002.327804102.0000000180001000.00000020.00001000.00020000.00000000.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
        00000002.00000002.248215300.0000000180001000.00000020.00001000.00020000.00000000.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
          00000002.00000002.248087583.0000000000750000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
            Click to see the 11 entries
            SourceRuleDescriptionAuthorStrings
            2.2.regsvr32.exe.750000.0.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
              4.0.rundll32.exe.1b300000000.2.raw.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
                3.2.rundll32.exe.298ca850000.0.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
                  4.2.rundll32.exe.1b300000000.0.raw.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
                    4.2.rundll32.exe.1b300000000.0.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
                      Click to see the 11 entries
                      No Sigma rule has matched
                      No Snort rule has matched

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection

                      barindex
                      Source: qJhkILqiEA.dllVirustotal: Detection: 38%Perma Link
                      Source: qJhkILqiEA.dllReversingLabs: Detection: 58%
                      Source: https://173.82.82.196:8080/fAvira URL Cloud: Label: malware
                      Source: https://173.82.82.196/0.v9Avira URL Cloud: Label: malware
                      Source: https://173.82.82.196:8080/(.Avira URL Cloud: Label: malware
                      Source: https://173.82.82.196/URL Reputation: Label: malware
                      Source: https://173.82.82.196:8080/URL Reputation: Label: malware
                      Source: https://173.82.82.196:8080/PAvira URL Cloud: Label: malware
                      Source: qJhkILqiEA.dllJoe Sandbox ML: detected
                      Source: qJhkILqiEA.dllStatic PE information: DYNAMIC_BASE, NX_COMPAT
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00000001800248B0 FindFirstFileW,FindNextFileW,FindClose,

                      Networking

                      barindex
                      Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 173.82.82.196 8080
                      Source: Joe Sandbox ViewASN Name: MULTA-ASN1US MULTA-ASN1US
                      Source: Joe Sandbox ViewIP Address: 173.82.82.196 173.82.82.196
                      Source: global trafficTCP traffic: 192.168.2.4:49762 -> 173.82.82.196:8080
                      Source: unknownTCP traffic detected without corresponding DNS query: 173.82.82.196
                      Source: unknownTCP traffic detected without corresponding DNS query: 173.82.82.196
                      Source: unknownTCP traffic detected without corresponding DNS query: 173.82.82.196
                      Source: unknownTCP traffic detected without corresponding DNS query: 173.82.82.196
                      Source: unknownTCP traffic detected without corresponding DNS query: 173.82.82.196
                      Source: unknownTCP traffic detected without corresponding DNS query: 173.82.82.196
                      Source: unknownTCP traffic detected without corresponding DNS query: 173.82.82.196
                      Source: unknownTCP traffic detected without corresponding DNS query: 173.82.82.196
                      Source: unknownTCP traffic detected without corresponding DNS query: 173.82.82.196
                      Source: unknownTCP traffic detected without corresponding DNS query: 173.82.82.196
                      Source: unknownTCP traffic detected without corresponding DNS query: 173.82.82.196
                      Source: unknownTCP traffic detected without corresponding DNS query: 173.82.82.196
                      Source: unknownTCP traffic detected without corresponding DNS query: 173.82.82.196
                      Source: unknownTCP traffic detected without corresponding DNS query: 173.82.82.196
                      Source: svchost.exe, 00000021.00000003.478052269.000001C77B973000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Try it free for 30 days, no strings attached\r\n\r\nLike us on Facebook: http://www.facebook.com/spotify \r\nFollow us on Twitter: http://twitter.com/spotify","ProductTitle":"Spotify - Music and Podcasts","SearchTitles":[{"SearchTitleString":"Spotify","SearchTitleType":"SearchHint"},{"SearchTitleString":"Music","SearchTitleType":"SearchHint"},{"SearchTitleString":"music apps","SearchTitleType":"SearchHint"},{"SearchTitleString":"free music","SearchTitleType":"SearchHint"},{"SearchTitleString":"podcasts","SearchTitleType":"SearchHint"},{"SearchTitleString":"streaming","SearchTitleType":"SearchHint"},{"SearchTitleString":"soundcloud","SearchTitleType":"SearchHint"}],"Language":"en-us","Markets":["US","DZ","AR","AU","AT","BH","BD","BE","BR","BG","CA","CL","CN","CO","CR","HR","CY","CZ","DK","EG","EE","FI","FR","DE","GR","GT","HK","HU","IS","IN","ID","IQ","IE","IL","IT","JP","JO","KZ","KE","KW","LV","LB","LI","LT","LU","MY","MT","MR","MX","MA","NL","NZ","NG","NO","OM","PK","PE","PH","PL","PT","QA","RO","RU","SA","RS","SG","SK","SI","ZA","KR","ES","SE","CH","TW","TH","TT","TN","TR","UA","AE","GB","VN","YE","LY","LK","UY","VE","AF","AX","AL","AS","AO","AI","AQ","AG","AM","AW","BO","BQ","BA","BW","BV","IO","BN","BF","BI","KH","CM","CV","KY","CF","TD","TL","DJ","DM","DO","EC","SV","GQ","ER","ET","FK","FO","FJ","GF","PF","TF","GA","GM","GE","GH","GI","GL","GD","GP","GU","GG","GN","GW","GY","HT","HM","HN","AZ","BS","BB","BY","BZ","BJ","BM","BT","KM","CG","CD","CK","CX","CC","CI","CW","JM","SJ","JE","KI","KG","LA","LS","LR","MO","MK","MG","MW","IM","MH","MQ","MU","YT","FM","MD","MN","MS","MZ","MM","NA","NR","NP","MV","ML","NC","NI","NE","NU","NF","PW","PS","PA","PG","PY","RE","RW","BL","MF","WS","ST","SN","MP","PN","SX","SB","SO","SC","SL","GS","SH","KN","LC","PM","VC","TJ","TZ","TG","TK","TO","TM","TC","TV","UM","UG", equals www.facebook.com (Facebook)
                      Source: svchost.exe, 00000021.00000003.478052269.000001C77B973000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Try it free for 30 days, no strings attached\r\n\r\nLike us on Facebook: http://www.facebook.com/spotify \r\nFollow us on Twitter: http://twitter.com/spotify","ProductTitle":"Spotify - Music and Podcasts","SearchTitles":[{"SearchTitleString":"Spotify","SearchTitleType":"SearchHint"},{"SearchTitleString":"Music","SearchTitleType":"SearchHint"},{"SearchTitleString":"music apps","SearchTitleType":"SearchHint"},{"SearchTitleString":"free music","SearchTitleType":"SearchHint"},{"SearchTitleString":"podcasts","SearchTitleType":"SearchHint"},{"SearchTitleString":"streaming","SearchTitleType":"SearchHint"},{"SearchTitleString":"soundcloud","SearchTitleType":"SearchHint"}],"Language":"en-us","Markets":["US","DZ","AR","AU","AT","BH","BD","BE","BR","BG","CA","CL","CN","CO","CR","HR","CY","CZ","DK","EG","EE","FI","FR","DE","GR","GT","HK","HU","IS","IN","ID","IQ","IE","IL","IT","JP","JO","KZ","KE","KW","LV","LB","LI","LT","LU","MY","MT","MR","MX","MA","NL","NZ","NG","NO","OM","PK","PE","PH","PL","PT","QA","RO","RU","SA","RS","SG","SK","SI","ZA","KR","ES","SE","CH","TW","TH","TT","TN","TR","UA","AE","GB","VN","YE","LY","LK","UY","VE","AF","AX","AL","AS","AO","AI","AQ","AG","AM","AW","BO","BQ","BA","BW","BV","IO","BN","BF","BI","KH","CM","CV","KY","CF","TD","TL","DJ","DM","DO","EC","SV","GQ","ER","ET","FK","FO","FJ","GF","PF","TF","GA","GM","GE","GH","GI","GL","GD","GP","GU","GG","GN","GW","GY","HT","HM","HN","AZ","BS","BB","BY","BZ","BJ","BM","BT","KM","CG","CD","CK","CX","CC","CI","CW","JM","SJ","JE","KI","KG","LA","LS","LR","MO","MK","MG","MW","IM","MH","MQ","MU","YT","FM","MD","MN","MS","MZ","MM","NA","NR","NP","MV","ML","NC","NI","NE","NU","NF","PW","PS","PA","PG","PY","RE","RW","BL","MF","WS","ST","SN","MP","PN","SX","SB","SO","SC","SL","GS","SH","KN","LC","PM","VC","TJ","TZ","TG","TK","TO","TM","TC","TV","UM","UG", equals www.twitter.com (Twitter)
                      Source: svchost.exe, 00000021.00000003.478052269.000001C77B973000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.478064549.000001C77B984000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Try it free for 30 days, no strings attached\r\n\r\nLike us on Facebook: http://www.facebook.com/spotify \r\nFollow us on Twitter: http://twitter.com/spotify","ProductTitle":"Spotify - Music and Podcasts","SearchTitles":[{"SearchTitleString":"Spotify","SearchTitleType":"SearchHint"},{"SearchTitleString":"Music","SearchTitleType":"SearchHint"},{"SearchTitleString":"music apps","SearchTitleType":"SearchHint"},{"SearchTitleString":"free music","SearchTitleType":"SearchHint"},{"SearchTitleString":"podcasts","SearchTitleType":"SearchHint"},{"SearchTitleString":"streaming","SearchTitleType":"SearchHint"},{"SearchTitleString":"soundcloud","SearchTitleType":"SearchHint"}],"Language":"en-us","Markets":["US","DZ","AR","AU","AT","BH","BD","BE","BR","BG","CA","CL","CN","CO","CR","HR","CY","CZ","DK","EG","EE","FI","FR","DE","GR","GT","HK","HU","IS","IN","ID","IQ","IE","IL","IT","JP","JO","KZ","KE","KW","LV","LB","LI","LT","LU","MY","MT","MR","MX","MA","NL","NZ","NG","NO","OM","PK","PE","PH","PL","PT","QA","RO","RU","SA","RS","SG","SK","SI","ZA","KR","ES","SE","CH","TW","TH","TT","TN","TR","UA","AE","GB","VN","YE","LY","LK","UY","VE","AF","AX","AL","AS","AO","AI","AQ","AG","AM","AW","BO","BQ","BA","BW","BV","IO","BN","BF","BI","KH","CM","CV","KY","CF","TD","TL","DJ","DM","DO","EC","SV","GQ","ER","ET","FK","FO","FJ","GF","PF","TF","GA","GM","GE","GH","GI","GL","GD","GP","GU","GG","GN","GW","GY","HT","HM","HN","AZ","BS","BB","BY","BZ","BJ","BM","BT","KM","CG","CD","CK","CX","CC","CI","CW","JM","SJ","JE","KI","KG","LA","LS","LR","MO","MK","MG","MW","IM","MH","MQ","MU","YT","FM","MD","MN","MS","MZ","MM","NA","NR","NP","MV","ML","NC","NI","NE","NU","NF","PW","PS","PA","PG","PY","RE","RW","BL","MF","WS","ST","SN","MP","PN","SX","SB","SO","SC","SL","GS","SH","KN","LC","PM","VC","TJ","TZ","TG","TK","TO","TM","TC","TV","UM","UG","VI","VG","WF","EH","ZM","ZW","UZ","VU","SR","SZ","AD","MC","SM","ME","VA","NEUTRAL"]}],"MarketProperties":[{"RelatedProducts":[],"Markets":["US"]}],"ProductASchema":"Product;3","ProductBSchema":"ProductUnifiedApp;3","ProductId":"9NCBCSZSJRSB","Properties":{"PackageFamilyName":"SpotifyAB.SpotifyMusic_zpdnekdrzrea0","PackageIdentityName":"SpotifyAB.SpotifyMusic","PublisherCertificateName":"CN=453637B3-4E12-4CDF-B0D3-2A3C863BF6EF","XboxCrossGenSetId":null,"XboxConsoleGenOptimized":null,"XboxConsoleGenCompatible":null},"AlternateIds":[{"IdType":"LegacyWindowsStoreProductId","Value":"ceac5d3f-8a4f-40e1-9a67-76d9108c7cb5"},{"IdType":"LegacyWindowsPhoneProductId","Value":"caac1b9d-621b-4f96-b143-e10e1397740a"},{"IdType":"XboxTitleId","Value":"1681279293"}],"IngestionSource":"DCE","IsMicrosoftProduct":false,"PreferredSkuId":"0010","ProductType":"Application","ValidationData":{"PassedValidation":false,"RevisionId":"2022-05-13T10:00:01.2192622Z||.||8adb3f26-c14b-4fc0-afb3-91b3c6daaa3f||1152921505694830749||Null||fullrelease","ValidationResultUri":""},"MerchandizingTags":[],"PartD":"","ProductFamily":"Apps","ProductKind":"Application","DisplaySkuAvailab
                      Source: svchost.exe, 00000021.00000003.478052269.000001C77B973000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.478064549.000001C77B984000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Try it free for 30 days, no strings attached\r\n\r\nLike us on Facebook: http://www.facebook.com/spotify \r\nFollow us on Twitter: http://twitter.com/spotify","ProductTitle":"Spotify - Music and Podcasts","SearchTitles":[{"SearchTitleString":"Spotify","SearchTitleType":"SearchHint"},{"SearchTitleString":"Music","SearchTitleType":"SearchHint"},{"SearchTitleString":"music apps","SearchTitleType":"SearchHint"},{"SearchTitleString":"free music","SearchTitleType":"SearchHint"},{"SearchTitleString":"podcasts","SearchTitleType":"SearchHint"},{"SearchTitleString":"streaming","SearchTitleType":"SearchHint"},{"SearchTitleString":"soundcloud","SearchTitleType":"SearchHint"}],"Language":"en-us","Markets":["US","DZ","AR","AU","AT","BH","BD","BE","BR","BG","CA","CL","CN","CO","CR","HR","CY","CZ","DK","EG","EE","FI","FR","DE","GR","GT","HK","HU","IS","IN","ID","IQ","IE","IL","IT","JP","JO","KZ","KE","KW","LV","LB","LI","LT","LU","MY","MT","MR","MX","MA","NL","NZ","NG","NO","OM","PK","PE","PH","PL","PT","QA","RO","RU","SA","RS","SG","SK","SI","ZA","KR","ES","SE","CH","TW","TH","TT","TN","TR","UA","AE","GB","VN","YE","LY","LK","UY","VE","AF","AX","AL","AS","AO","AI","AQ","AG","AM","AW","BO","BQ","BA","BW","BV","IO","BN","BF","BI","KH","CM","CV","KY","CF","TD","TL","DJ","DM","DO","EC","SV","GQ","ER","ET","FK","FO","FJ","GF","PF","TF","GA","GM","GE","GH","GI","GL","GD","GP","GU","GG","GN","GW","GY","HT","HM","HN","AZ","BS","BB","BY","BZ","BJ","BM","BT","KM","CG","CD","CK","CX","CC","CI","CW","JM","SJ","JE","KI","KG","LA","LS","LR","MO","MK","MG","MW","IM","MH","MQ","MU","YT","FM","MD","MN","MS","MZ","MM","NA","NR","NP","MV","ML","NC","NI","NE","NU","NF","PW","PS","PA","PG","PY","RE","RW","BL","MF","WS","ST","SN","MP","PN","SX","SB","SO","SC","SL","GS","SH","KN","LC","PM","VC","TJ","TZ","TG","TK","TO","TM","TC","TV","UM","UG","VI","VG","WF","EH","ZM","ZW","UZ","VU","SR","SZ","AD","MC","SM","ME","VA","NEUTRAL"]}],"MarketProperties":[{"RelatedProducts":[],"Markets":["US"]}],"ProductASchema":"Product;3","ProductBSchema":"ProductUnifiedApp;3","ProductId":"9NCBCSZSJRSB","Properties":{"PackageFamilyName":"SpotifyAB.SpotifyMusic_zpdnekdrzrea0","PackageIdentityName":"SpotifyAB.SpotifyMusic","PublisherCertificateName":"CN=453637B3-4E12-4CDF-B0D3-2A3C863BF6EF","XboxCrossGenSetId":null,"XboxConsoleGenOptimized":null,"XboxConsoleGenCompatible":null},"AlternateIds":[{"IdType":"LegacyWindowsStoreProductId","Value":"ceac5d3f-8a4f-40e1-9a67-76d9108c7cb5"},{"IdType":"LegacyWindowsPhoneProductId","Value":"caac1b9d-621b-4f96-b143-e10e1397740a"},{"IdType":"XboxTitleId","Value":"1681279293"}],"IngestionSource":"DCE","IsMicrosoftProduct":false,"PreferredSkuId":"0010","ProductType":"Application","ValidationData":{"PassedValidation":false,"RevisionId":"2022-05-13T10:00:01.2192622Z||.||8adb3f26-c14b-4fc0-afb3-91b3c6daaa3f||1152921505694830749||Null||fullrelease","ValidationResultUri":""},"MerchandizingTags":[],"PartD":"","ProductFamily":"Apps","ProductKind":"Application","DisplaySkuAvailab
                      Source: regsvr32.exe, 00000007.00000003.535103457.0000000000ACE000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000002.647977849.0000000000ACE000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000017.00000002.644828486.0000022F4C272000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000002.523318756.000001C77B900000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
                      Source: svchost.exe, 00000017.00000002.644662058.0000022F4C213000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000002.523167516.000001C77AEEE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.ver)
                      Source: regsvr32.exe, 00000007.00000003.536147270.0000000000A99000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000002.647866799.0000000000A99000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en
                      Source: regsvr32.exe, 00000007.00000003.535103457.0000000000ACE000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000002.647977849.0000000000ACE000.00000004.00000020.00020000.00000000.sdmp, 77EC63BDA74BD0D0E0426DC8F80085060.7.drString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
                      Source: regsvr32.exe, 00000007.00000003.319462034.0000000002CD2000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000003.319338396.0000000002C91000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000003.319590287.0000000002CF4000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000002.648233032.0000000002CF4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab9
                      Source: svchost.exe, 00000021.00000003.495561358.000001C77B98E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.495361255.000001C77B9A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://help.disneyplus.com.
                      Source: svchost.exe, 00000012.00000002.317577945.00000195B5E24000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.bingmapsportal.com
                      Source: svchost.exe, 00000010.00000002.647477108.000001D20863E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://%s.dnet.xboxlive.com
                      Source: svchost.exe, 00000010.00000002.647477108.000001D20863E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://%s.xboxlive.com
                      Source: regsvr32.exe, 00000007.00000002.647445988.0000000000A72000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000003.535336382.0000000000A72000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://173.82.82.196/
                      Source: regsvr32.exe, 00000007.00000002.647445988.0000000000A72000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000003.535336382.0000000000A72000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://173.82.82.196/0.v9
                      Source: regsvr32.exe, 00000007.00000002.647496148.0000000000A7E000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000002.647895703.0000000000AA4000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000003.535348405.0000000000A7E000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000003.536554846.0000000000AA4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://173.82.82.196:8080/
                      Source: regsvr32.exe, 00000007.00000002.647445988.0000000000A72000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000003.535336382.0000000000A72000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://173.82.82.196:8080/(.
                      Source: regsvr32.exe, 00000007.00000002.647895703.0000000000AA4000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000003.536554846.0000000000AA4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://173.82.82.196:8080/P
                      Source: regsvr32.exe, 00000007.00000002.647496148.0000000000A7E000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000003.535348405.0000000000A7E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://173.82.82.196:8080/f
                      Source: svchost.exe, 00000010.00000002.647477108.000001D20863E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://activity.windows.com
                      Source: svchost.exe, 00000012.00000003.316801953.00000195B5E50000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://appexmapsappupdate.blob.core.windows.net
                      Source: svchost.exe, 00000010.00000002.647477108.000001D20863E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bn2.notify.windows.com/v2/register/xplatform/device
                      Source: svchost.exe, 00000010.00000002.647477108.000001D20863E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://co4-df.notify.windows.com/v2/register/xplatform/device
                      Source: svchost.exe, 00000012.00000003.316812477.00000195B5E4A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000012.00000002.317577945.00000195B5E24000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.ditu.live.com/REST/v1/Imagery/Copyright/
                      Source: svchost.exe, 00000012.00000003.316812477.00000195B5E4A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000012.00000002.317612674.00000195B5E4C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.ditu.live.com/REST/v1/JsonFilter/VenueMaps/data/
                      Source: svchost.exe, 00000012.00000003.316801953.00000195B5E50000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.ditu.live.com/REST/v1/Locations
                      Source: svchost.exe, 00000012.00000002.317593966.00000195B5E3E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.ditu.live.com/REST/v1/Routes/
                      Source: svchost.exe, 00000012.00000003.316812477.00000195B5E4A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000012.00000002.317612674.00000195B5E4C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.ditu.live.com/REST/v1/Traffic/Incidents/
                      Source: svchost.exe, 00000012.00000003.316702192.00000195B5E68000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000012.00000002.317635939.00000195B5E6B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.ditu.live.com/REST/v1/Transit/Stops/
                      Source: svchost.exe, 00000012.00000003.316801953.00000195B5E50000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.ditu.live.com/mapcontrol/logging.ashx
                      Source: svchost.exe, 00000012.00000002.317577945.00000195B5E24000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.ditu.live.com/mapcontrol/mapconfiguration.ashx?name=native&v=
                      Source: svchost.exe, 00000012.00000003.291687958.00000195B5E30000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000012.00000002.317577945.00000195B5E24000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Imagery/Copyright/
                      Source: svchost.exe, 00000012.00000003.316812477.00000195B5E4A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000012.00000002.317612674.00000195B5E4C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/JsonFilter/VenueMaps/data/
                      Source: svchost.exe, 00000012.00000003.291687958.00000195B5E30000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000012.00000003.316801953.00000195B5E50000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Locations
                      Source: svchost.exe, 00000012.00000002.317593966.00000195B5E3E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Routes/
                      Source: svchost.exe, 00000012.00000003.316801953.00000195B5E50000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Routes/Driving
                      Source: svchost.exe, 00000012.00000003.316801953.00000195B5E50000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Routes/Transit
                      Source: svchost.exe, 00000012.00000003.316801953.00000195B5E50000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Routes/Walking
                      Source: svchost.exe, 00000012.00000002.317577945.00000195B5E24000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Traffic/Incidents/
                      Source: svchost.exe, 00000012.00000003.316857943.00000195B5E41000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000012.00000003.317078891.00000195B5E42000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000012.00000002.317608897.00000195B5E43000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Transit/Schedules/
                      Source: svchost.exe, 00000012.00000003.291687958.00000195B5E30000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Transit/Stops/
                      Source: svchost.exe, 00000012.00000003.316857943.00000195B5E41000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000012.00000003.317078891.00000195B5E42000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000012.00000002.317608897.00000195B5E43000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/mapcontrol/HumanScaleServices/GetBubbles.ashx?n=
                      Source: svchost.exe, 00000012.00000003.316801953.00000195B5E50000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/mapcontrol/logging.ashx
                      Source: svchost.exe, 00000012.00000003.316812477.00000195B5E4A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000012.00000003.316857943.00000195B5E41000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000012.00000002.317612674.00000195B5E4C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/webservices/v1/LoggingService/LoggingService.svc/Log?
                      Source: svchost.exe, 00000012.00000003.291687958.00000195B5E30000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/webservices/v1/LoggingService/LoggingService.svc/Log?entry=
                      Source: svchost.exe, 00000021.00000003.495561358.000001C77B98E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.495361255.000001C77B9A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://disneyplus.com/legal.
                      Source: svchost.exe, 00000012.00000003.316812477.00000195B5E4A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dynamic.api.tiles.ditu.live.com/odvs/gd?pv=1&r=
                      Source: svchost.exe, 00000012.00000003.316812477.00000195B5E4A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000012.00000002.317612674.00000195B5E4C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dynamic.api.tiles.ditu.live.com/odvs/gdi?pv=1&r=
                      Source: svchost.exe, 00000012.00000003.316812477.00000195B5E4A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000012.00000002.317612674.00000195B5E4C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dynamic.api.tiles.ditu.live.com/odvs/gdv?pv=1&r=
                      Source: svchost.exe, 00000012.00000002.317577945.00000195B5E24000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000012.00000002.317608897.00000195B5E43000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dynamic.t
                      Source: svchost.exe, 00000012.00000003.316801953.00000195B5E50000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dynamic.t0.tiles.ditu.live.com/comp/gen.ashx
                      Source: svchost.exe, 00000012.00000002.317593966.00000195B5E3E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000012.00000003.291687958.00000195B5E30000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ecn.dev.virtualearth.net/REST/v1/Imagery/Copyright/
                      Source: svchost.exe, 00000012.00000003.291687958.00000195B5E30000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ecn.dev.virtualearth.net/mapcontrol/mapconfiguration.ashx?name=native&v=
                      Source: svchost.exe, 00000012.00000003.291687958.00000195B5E30000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ecn.dev.virtualearth.net/mapcontrol/roadshield.ashx?bucket=
                      Source: svchost.exe, 00000021.00000003.492529643.000001C77B9A8000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.492482077.000001C77BE03000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.492465997.000001C77BE02000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.492512474.000001C77B986000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.492397766.000001C77B998000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.492570326.000001C77BE19000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.492430641.000001C77B9A8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://support.hotspotshield.com/
                      Source: svchost.exe, 00000012.00000002.317593966.00000195B5E3E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/comp/gen.ashx
                      Source: svchost.exe, 00000012.00000002.317593966.00000195B5E3E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000012.00000002.317577945.00000195B5E24000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gd?pv=1&r=
                      Source: svchost.exe, 00000012.00000003.291687958.00000195B5E30000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdi?pv=1&r=
                      Source: svchost.exe, 00000012.00000003.316857943.00000195B5E41000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000012.00000003.317044423.00000195B5E46000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdv?pv=1&r=
                      Source: svchost.exe, 00000012.00000003.291687958.00000195B5E30000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gri?pv=1&r=
                      Source: svchost.exe, 00000012.00000003.317228227.00000195B5E3A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000012.00000003.291687958.00000195B5E30000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t0.ssl.ak.tiles.virtualearth.net/tiles/gen
                      Source: svchost.exe, 00000012.00000002.317577945.00000195B5E24000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t0.tiles.ditu.live.com/tiles/gen
                      Source: svchost.exe, 00000021.00000003.495561358.000001C77B98E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.495361255.000001C77B9A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.disneyplus.com/legal/privacy-policy
                      Source: svchost.exe, 00000021.00000003.495561358.000001C77B98E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.495361255.000001C77B9A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.disneyplus.com/legal/your-california-privacy-rights
                      Source: svchost.exe, 00000021.00000003.492529643.000001C77B9A8000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.492482077.000001C77BE03000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.492465997.000001C77BE02000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.492512474.000001C77B986000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.492397766.000001C77B998000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.492570326.000001C77BE19000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.492430641.000001C77B9A8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.hotspotshield.com/terms/
                      Source: svchost.exe, 00000021.00000003.492529643.000001C77B9A8000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.492482077.000001C77BE03000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.492465997.000001C77BE02000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.492512474.000001C77B986000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.492397766.000001C77B998000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.492570326.000001C77BE19000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.492430641.000001C77B9A8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.pango.co/privacy
                      Source: svchost.exe, 00000021.00000003.503721537.000001C77BE02000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.503700080.000001C77B99F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.503683010.000001C77B98E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.503649260.000001C77B9B5000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.503617207.000001C77B9B5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.tiktok.com/legal/report/feedback
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180006B24 InternetReadFile,

                      E-Banking Fraud

                      barindex
                      Source: Yara matchFile source: 2.2.regsvr32.exe.750000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.0.rundll32.exe.1b300000000.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.rundll32.exe.298ca850000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.1b300000000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.1b300000000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.0.rundll32.exe.298ca850000.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.0.rundll32.exe.298ca850000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 7.2.regsvr32.exe.a00000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.0.rundll32.exe.1b300000000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.0.rundll32.exe.298ca850000.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.0.rundll32.exe.1b300000000.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.0.rundll32.exe.298ca850000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 7.2.regsvr32.exe.a00000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.regsvr32.exe.750000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.0.rundll32.exe.1b300000000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.rundll32.exe.298ca850000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000004.00000000.245516131.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000000.247075589.00000298CA850000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.327804102.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.248215300.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.248087583.0000000000750000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000000.245417474.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000007.00000002.646304136.0000000000A00000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.328180679.000001B300000000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.328137058.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000000.248564765.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000000.248656368.000001B300000000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.327922020.00000298CA850000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000000.246778578.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000000.245618177.000001B300000000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000007.00000002.648425079.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000000.245495998.00000298CA850000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 3180 -s 336
                      Source: C:\Windows\System32\regsvr32.exeFile deleted: C:\Windows\System32\IxbPFgKevemZDIDo\xuHXDLB.dll:Zone.IdentifierJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeFile created: C:\Windows\system32\IxbPFgKevemZDIDo\Jump to behavior
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00007FFFEFB812B0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00007FFFEFB853FB
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00007FFFEFB84A70
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00007FFFEFB85E01
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00007FFFEFB85CAD
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00007FFFEFB8443C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00007FFFEFB86850
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00710000
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180006414
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180005C74
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018002ACE8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180024104
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180020118
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000359C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000E99C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180019628
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180025A4C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018002B7B2
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180009408
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180023C14
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018002582C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000B834
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000403C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180021444
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180012044
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180016054
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001705C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180001870
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001F878
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180014484
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180015494
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000BC98
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180008C9C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800078A4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001F0A8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001E4AC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800048B0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001ACB4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800090B4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800270C0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800024C0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800280C8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800050D4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800234D8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800150F0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180012500
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001A10C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180028D10
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001A524
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180002D28
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000E130
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180029134
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180008134
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180022140
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180006954
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000F554
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018002B564
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180012168
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180013568
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180024570
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180019178
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180025180
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180001980
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180021588
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001A988
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180018190
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180013994
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180028998
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800061A0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800135A6
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180016DA8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800059AC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800135B4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001C1B8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800025B8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800085BC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800015C0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800295C8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800229CC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000E5D4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018002A5D8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800261E0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800079EC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180023624
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180018628
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180017E2C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180017638
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180004E3C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180020E40
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180015A64
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180015264
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000A26C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180007678
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001667C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180012680
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180001E88
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000968C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180022290
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180026A90
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000529C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180020AA0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180022AAC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180007EB4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800162BC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800252C0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001AEC8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001F6DC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800026DC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180002ADC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001E2F4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180016AF4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000DEF4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001DEFC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180006308
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001370C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180004B18
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180015F24
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180006B24
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000F328
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180021738
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018002AF38
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180028348
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000DB4C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180014F50
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000B350
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000A758
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018002975C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180024370
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180008370
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180015774
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180012378
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180026B98
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001CF9C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001EBA0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001B3A4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000D7AC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800053B0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180015BB8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800207BC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000FFC0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800173DC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180018BDC
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FFFEFB812B0
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FFFEFB853FB
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FFFEFB84A70
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FFFEFB85E01
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FFFEFB85CAD
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FFFEFB8443C
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FFFEFB86850
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000298C8F90000
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000001B37B360000
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_007F0000
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180006414
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018000C819
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180019628
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180025A4C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180012864
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180005C74
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00000001800248B0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00000001800252C0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180006B24
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180006F2C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018000A758
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180012168
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180024570
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018000E99C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018001B3A4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00000001800079EC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180009408
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180023C14
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180023624
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180018628
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018002582C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180017E2C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018000B834
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180017638
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018000403C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180004E3C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180020E40
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180021444
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180012044
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180016054
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018001705C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180015A64
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180015264
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018000A26C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180001870
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018001F878
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180007678
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018001667C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180012680
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180014484
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180001E88
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018000968C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180022290
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180026A90
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180015494
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018000BC98
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018000529C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180008C9C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180020AA0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00000001800078A4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018001F0A8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180022AAC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018001E4AC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00000001800048B0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018001ACB4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180007EB4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00000001800090B4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00000001800162BC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00000001800270C0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00000001800024C0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00000001800280C8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018001AEC8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00000001800050D4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00000001800234D8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018001F6DC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00000001800026DC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180002ADC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018002ACE8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00000001800150F0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018001E2F4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180016AF4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018000DEF4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018001DEFC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180012500
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180024104
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180006308
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018001370C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018001A10C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180028D10
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180020118
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180004B18
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018001A524
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180015F24
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018000F328
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180002D28
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018000E130
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180029134
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180008134
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180021738
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018002AF38
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180022140
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180028348
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018000DB4C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180014F50
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018000B350
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180006954
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018000F554
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018002975C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018002B564
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180013568
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180024370
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180008370
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180015774
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180012378
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180019178
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180025180
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180001980
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180021588
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018001A988
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180018190
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180013994
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180026B98
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180028998
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018001CF9C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018000359C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018001EBA0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00000001800061A0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00000001800135A6
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180016DA8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00000001800059AC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018000D7AC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00000001800053B0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00000001800135B4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018001C1B8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180015BB8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00000001800025B8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00000001800207BC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00000001800085BC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00000001800015C0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018000FFC0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00000001800295C8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00000001800229CC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018000E5D4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_000000018002A5D8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00000001800173DC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180018BDC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00000001800261E0
                      Source: C:\Windows\System32\rundll32.exeCode function: String function: 00007FFFEFB87FF0 appears 31 times
                      Source: C:\Windows\System32\rundll32.exeCode function: String function: 00007FFFEFB8B3B0 appears 148 times
                      Source: C:\Windows\System32\rundll32.exeCode function: String function: 00007FFFEFB8BD70 appears 113 times
                      Source: C:\Windows\System32\regsvr32.exeCode function: String function: 00007FFFEFB87FF0 appears 31 times
                      Source: C:\Windows\System32\regsvr32.exeCode function: String function: 00007FFFEFB8B3B0 appears 148 times
                      Source: C:\Windows\System32\regsvr32.exeCode function: String function: 00007FFFEFB8BD70 appears 113 times
                      Source: C:\Windows\System32\regsvr32.exeSection loaded: sfc.dll
                      Source: C:\Windows\System32\regsvr32.exeSection loaded: sfc.dll
                      Source: C:\Windows\System32\svchost.exeSection loaded: xboxlivetitleid.dll
                      Source: C:\Windows\System32\svchost.exeSection loaded: cdpsgshims.dll
                      Source: qJhkILqiEA.dllVirustotal: Detection: 38%
                      Source: qJhkILqiEA.dllReversingLabs: Detection: 58%
                      Source: qJhkILqiEA.dllStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                      Source: C:\Windows\System32\loaddll64.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                      Source: unknownProcess created: C:\Windows\System32\loaddll64.exe loaddll64.exe "C:\Users\user\Desktop\qJhkILqiEA.dll"
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\qJhkILqiEA.dll",#1
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\qJhkILqiEA.dll
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\qJhkILqiEA.dll",#1
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\qJhkILqiEA.dll,AddIn_FileTime
                      Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\System32\regsvr32.exe C:\Windows\system32\regsvr32.exe "C:\Windows\system32\IxbPFgKevemZDIDo\xuHXDLB.dll"
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\qJhkILqiEA.dll,AddIn_SystemTime
                      Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 3180 -s 336
                      Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 3088 -s 332
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\qJhkILqiEA.dll,DllRegisterServer
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe c:\windows\system32\svchost.exe -k localservice -p -s CDPSvc
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe c:\windows\system32\svchost.exe -k networkservice -p -s DoSvc
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k NetworkService -p
                      Source: unknownProcess created: C:\Windows\System32\SgrmBroker.exe C:\Windows\system32\SgrmBroker.exe
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe c:\windows\system32\svchost.exe -k localservicenetworkrestricted -p -s wscsvc
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe c:\windows\system32\svchost.exe -k unistacksvcgroup
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p
                      Source: C:\Windows\System32\svchost.exeProcess created: C:\Program Files\Windows Defender\MpCmdRun.exe "C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable
                      Source: C:\Program Files\Windows Defender\MpCmdRun.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\qJhkILqiEA.dll",#1
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\qJhkILqiEA.dll
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\qJhkILqiEA.dll,AddIn_FileTime
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\qJhkILqiEA.dll,AddIn_SystemTime
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\qJhkILqiEA.dll,DllRegisterServer
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\qJhkILqiEA.dll",#1
                      Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\System32\regsvr32.exe C:\Windows\system32\regsvr32.exe "C:\Windows\system32\IxbPFgKevemZDIDo\xuHXDLB.dll"
                      Source: C:\Windows\System32\svchost.exeProcess created: C:\Program Files\Windows Defender\MpCmdRun.exe "C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable
                      Source: C:\Windows\System32\regsvr32.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{D105A4D4-344C-48EB-9866-EE378D90658B}\InProcServer32
                      Source: C:\Windows\System32\svchost.exeFile created: C:\Users\user\AppData\Local\packages\ActiveSync\LocalState\DiagOutputDir\UnistackCritical.etlJump to behavior
                      Source: C:\Windows\System32\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\WERD79.tmpJump to behavior
                      Source: classification engineClassification label: mal84.troj.evad.winDLL@32/16@0/3
                      Source: C:\Windows\System32\regsvr32.exeFile read: C:\Users\desktop.iniJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180006F2C FindCloseChangeNotification,Process32FirstW,CreateToolhelp32Snapshot,Process32NextW,
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\qJhkILqiEA.dll",#1
                      Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess3180
                      Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess3088
                      Source: C:\Windows\System32\conhost.exeMutant created: \BaseNamedObjects\Local\SM0:5008:120:WilError_01
                      Source: C:\Windows\System32\regsvr32.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Windows\System32\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Windows\System32\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Windows\System32\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Windows\System32\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile read: C:\Windows\System32\drivers\etc\hosts
                      Source: C:\Windows\System32\svchost.exeFile read: C:\Windows\System32\drivers\etc\hosts
                      Source: C:\Windows\System32\rundll32.exeAutomated click: OK
                      Source: C:\Windows\System32\rundll32.exeAutomated click: OK
                      Source: qJhkILqiEA.dllStatic PE information: Image base 0x180000000 > 0x60000000
                      Source: qJhkILqiEA.dllStatic PE information: DYNAMIC_BASE, NX_COMPAT
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000C892 push ebp; retf
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000D095 push B3B8007Eh; iretd
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000D0F3 push ebp; iretd
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180013551 push ebx; retf
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000D15D push ebx; retn 0068h
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000CDA8 push ebp; iretd
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000CE36 push 458B0086h; iretd
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_0000000180013551 push ebx; retf
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00007FFFEFB912E3 LoadLibraryW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,DecodePointer,DecodePointer,DecodePointer,
                      Source: qJhkILqiEA.dllStatic PE information: real checksum: 0x654f5 should be: 0x66558
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\qJhkILqiEA.dll
                      Source: C:\Windows\System32\regsvr32.exePE file moved: C:\Windows\System32\IxbPFgKevemZDIDo\xuHXDLB.dllJump to behavior

                      Hooking and other Techniques for Hiding and Protection

                      barindex
                      Source: C:\Windows\System32\regsvr32.exeFile opened: C:\Windows\system32\IxbPFgKevemZDIDo\xuHXDLB.dll:Zone.Identifier read attributes | delete
                      Source: C:\Windows\System32\regsvr32.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\svchost.exe TID: 5992Thread sleep time: -30000s >= -30000s
                      Source: C:\Windows\System32\svchost.exe TID: 6412Thread sleep time: -30000s >= -30000s
                      Source: C:\Windows\System32\svchost.exe TID: 6196Thread sleep time: -30000s >= -30000s
                      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                      Source: C:\Windows\System32\rundll32.exeEvasive API call chain: GetModuleFileName,DecisionNodes,ExitProcess
                      Source: C:\Windows\System32\regsvr32.exeEvasive API call chain: GetModuleFileName,DecisionNodes,ExitProcess
                      Source: C:\Windows\System32\svchost.exeFile opened: PhysicalDrive0
                      Source: C:\Windows\System32\regsvr32.exeAPI coverage: 8.2 %
                      Source: C:\Windows\System32\rundll32.exeAPI coverage: 8.6 %
                      Source: C:\Windows\System32\regsvr32.exeProcess information queried: ProcessInformation
                      Source: C:\Windows\System32\regsvr32.exeCode function: 7_2_00000001800248B0 FindFirstFileW,FindNextFileW,FindClose,
                      Source: C:\Windows\System32\regsvr32.exeAPI call chain: ExitProcess graph end node
                      Source: C:\Windows\System32\regsvr32.exeAPI call chain: ExitProcess graph end node
                      Source: C:\Windows\System32\rundll32.exeAPI call chain: ExitProcess graph end node
                      Source: C:\Windows\System32\rundll32.exeAPI call chain: ExitProcess graph end node
                      Source: C:\Windows\System32\regsvr32.exeFile Volume queried: C:\ FullSizeInformation
                      Source: svchost.exe, 00000017.00000002.644757918.0000022F4C24C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: @Hyper-V RAW
                      Source: svchost.exe, 00000021.00000002.522958403.000001C77AE70000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWp
                      Source: regsvr32.exe, 00000007.00000002.647496148.0000000000A7E000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000003.535348405.0000000000A7E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW`o
                      Source: regsvr32.exe, 00000007.00000002.647895703.0000000000AA4000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000003.536554846.0000000000AA4000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000017.00000002.644757918.0000022F4C24C000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000002.523167516.000001C77AEEE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                      Source: svchost.exe, 0000000F.00000002.646346054.0000023B29A02000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: HvHostWdiSystemHostScDeviceEnumWiaRpctrkwksAudioEndpointBuilderhidservdot3svcDsSvcfhsvcWPDBusEnumsvsvcwlansvcEmbeddedModeirmonSensorServicevmicvssNgcSvcsysmainDevQueryBrokerStorSvcvmickvpexchangevmicshutdownvmicguestinterfacevmicvmsessionNcbServiceNetmanDeviceAssociationServiceTabletInputServicePcaSvcIPxlatCfgSvcCscServiceUmRdpService
                      Source: svchost.exe, 00000017.00000002.640444149.0000022F46A29000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW]%L/
                      Source: svchost.exe, 0000000F.00000002.647352744.0000023B29A40000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000010.00000002.647564108.000001D208662000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000011.00000002.647409492.000001E43F029000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00007FFFEFB83280 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00007FFFEFB90215 _itow_s,_invoke_watson_if_error,OutputDebugStringW,OutputDebugStringW,OutputDebugStringW,OutputDebugStringW,OutputDebugStringW,_wcsftime_l,_invoke_watson_if_oneof,_invoke_watson_if_error,_invoke_watson_if_error,_invoke_watson_if_error,_invoke_watson_if_error,_invoke_watson_if_error,_snwprintf_s,_invoke_watson_if_oneof,_invoke_watson_if_error,_invoke_watson_if_oneof,_invoke_watson_if_error,_unlock,GetFileType,WriteConsoleW,GetLastError,_invoke_watson_if_oneof,WriteFile,WriteFile,OutputDebugStringW,_itow_s,_invoke_watson_if_error,
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00007FFFEFB912E3 LoadLibraryW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,DecodePointer,DecodePointer,DecodePointer,
                      Source: C:\Windows\System32\loaddll64.exeProcess queried: DebugPort
                      Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPort
                      Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPort
                      Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPort
                      Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPort
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00007FFFEFB83280 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00007FFFEFB8BE50 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FFFEFB83280 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FFFEFB8BE50 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,

                      HIPS / PFW / Operating System Protection Evasion

                      barindex
                      Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 173.82.82.196 8080
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\qJhkILqiEA.dll",#1
                      Source: C:\Windows\System32\regsvr32.exeQueries volume information: C:\ VolumeInformation
                      Source: C:\Windows\System32\regsvr32.exeQueries volume information: C:\ VolumeInformation
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformation
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm VolumeInformation
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformation
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformation
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformation
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformation
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation
                      Source: C:\Windows\System32\regsvr32.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00007FFFEFB88900 GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter,
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00007FFFEFB88860 HeapCreate,GetVersion,HeapSetInformation,

                      Lowering of HIPS / PFW / Operating System Security Settings

                      barindex
                      Source: C:\Windows\System32\svchost.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center cvalJump to behavior
                      Source: C:\Windows\System32\svchost.exeWMI Queries: IWbemServices::ExecNotificationQuery - ROOT\SecurityCenter : SELECT * FROM __InstanceOperationEvent WHERE TargetInstance ISA 'AntiVirusProduct' OR TargetInstance ISA 'FirewallProduct' OR TargetInstance ISA 'AntiSpywareProduct'
                      Source: C:\Windows\System32\svchost.exeWMI Queries: IWbemServices::CreateInstanceEnum - ROOT\SecurityCenter2 : FirewallProduct
                      Source: C:\Windows\System32\svchost.exeWMI Queries: IWbemServices::CreateInstanceEnum - ROOT\SecurityCenter2 : AntiVirusProduct
                      Source: C:\Windows\System32\svchost.exeWMI Queries: IWbemServices::CreateInstanceEnum - ROOT\SecurityCenter2 : AntiSpywareProduct
                      Source: svchost.exe, 00000014.00000002.647404909.000001A69D840000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: (@V%ProgramFiles%\Windows Defender\MsMpeng.exe
                      Source: svchost.exe, 00000014.00000002.647352065.000001A69D829000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000014.00000002.647502307.000001A69D902000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe

                      Stealing of Sensitive Information

                      barindex
                      Source: Yara matchFile source: 2.2.regsvr32.exe.750000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.0.rundll32.exe.1b300000000.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.rundll32.exe.298ca850000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.1b300000000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.1b300000000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.0.rundll32.exe.298ca850000.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.0.rundll32.exe.298ca850000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 7.2.regsvr32.exe.a00000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.0.rundll32.exe.1b300000000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.0.rundll32.exe.298ca850000.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.0.rundll32.exe.1b300000000.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.0.rundll32.exe.298ca850000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 7.2.regsvr32.exe.a00000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.regsvr32.exe.750000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.0.rundll32.exe.1b300000000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.rundll32.exe.298ca850000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000004.00000000.245516131.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000000.247075589.00000298CA850000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.327804102.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.248215300.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.248087583.0000000000750000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000000.245417474.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000007.00000002.646304136.0000000000A00000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.328180679.000001B300000000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.328137058.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000000.248564765.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000000.248656368.000001B300000000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.327922020.00000298CA850000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000000.246778578.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000000.245618177.000001B300000000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000007.00000002.648425079.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000000.245495998.00000298CA850000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                      Valid Accounts1
                      Windows Management Instrumentation
                      1
                      DLL Side-Loading
                      111
                      Process Injection
                      21
                      Masquerading
                      OS Credential Dumping1
                      System Time Discovery
                      Remote Services1
                      Archive Collected Data
                      Exfiltration Over Other Network Medium1
                      Encrypted Channel
                      Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                      Default Accounts2
                      Native API
                      Boot or Logon Initialization Scripts1
                      DLL Side-Loading
                      1
                      Disable or Modify Tools
                      LSASS Memory1
                      Query Registry
                      Remote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth1
                      Non-Standard Port
                      Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                      Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)3
                      Virtualization/Sandbox Evasion
                      Security Account Manager61
                      Security Software Discovery
                      SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration1
                      Ingress Tool Transfer
                      Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                      Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)111
                      Process Injection
                      NTDS3
                      Virtualization/Sandbox Evasion
                      Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
                      Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
                      Deobfuscate/Decode Files or Information
                      LSA Secrets2
                      Process Discovery
                      SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                      Replication Through Removable MediaLaunchdRc.commonRc.common1
                      Hidden Files and Directories
                      Cached Domain Credentials1
                      Remote System Discovery
                      VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                      External Remote ServicesScheduled TaskStartup ItemsStartup Items2
                      Obfuscated Files or Information
                      DCSync2
                      File and Directory Discovery
                      Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                      Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job1
                      Regsvr32
                      Proc Filesystem25
                      System Information Discovery
                      Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
                      Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)1
                      Rundll32
                      /etc/passwd and /etc/shadowSystem Network Connections DiscoverySoftware Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
                      Supply Chain CompromiseAppleScriptAt (Windows)At (Windows)1
                      DLL Side-Loading
                      Network SniffingProcess DiscoveryTaint Shared ContentLocal Data StagingExfiltration Over Unencrypted/Obfuscated Non-C2 ProtocolFile Transfer ProtocolsData Encrypted for Impact
                      Compromise Software Dependencies and Development ToolsWindows Command ShellCronCron1
                      File Deletion
                      Input CapturePermission Groups DiscoveryReplication Through Removable MediaRemote Data StagingExfiltration Over Physical MediumMail ProtocolsService Stop
                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet
                      behaviorgraph top1 signatures2 2 Behavior Graph ID: 631909 Sample: qJhkILqiEA.dll Startdate: 22/05/2022 Architecture: WINDOWS Score: 84 47 Antivirus detection for URL or domain 2->47 49 Multi AV Scanner detection for submitted file 2->49 51 Yara detected Emotet 2->51 53 Machine Learning detection for sample 2->53 8 loaddll64.exe 1 2->8         started        10 svchost.exe 2->10         started        13 svchost.exe 1 1 2->13         started        16 10 other processes 2->16 process3 dnsIp4 18 regsvr32.exe 5 8->18         started        21 cmd.exe 1 8->21         started        23 rundll32.exe 8->23         started        27 2 other processes 8->27 57 Changes security center settings (notifications, updates, antivirus, firewall) 10->57 25 MpCmdRun.exe 1 10->25         started        41 127.0.0.1 unknown unknown 13->41 43 192.168.2.1 unknown unknown 13->43 signatures5 process6 signatures7 55 Hides that the sample has been downloaded from the Internet (zone.identifier) 18->55 29 regsvr32.exe 18->29         started        33 rundll32.exe 21->33         started        35 WerFault.exe 9 23->35         started        37 conhost.exe 25->37         started        process8 dnsIp9 45 173.82.82.196, 49762, 8080 MULTA-ASN1US United States 29->45 59 System process connects to network (likely due to code injection or exploit) 29->59 39 WerFault.exe 17 9 33->39         started        signatures10 process11

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                      windows-stand
                      SourceDetectionScannerLabelLink
                      qJhkILqiEA.dll39%VirustotalBrowse
                      qJhkILqiEA.dll59%ReversingLabsWin64.Trojan.Emotet
                      qJhkILqiEA.dll100%Joe Sandbox ML
                      No Antivirus matches
                      No Antivirus matches
                      No Antivirus matches
                      SourceDetectionScannerLabelLink
                      https://173.82.82.196:8080/f100%Avira URL Cloudmalware
                      https://173.82.82.196/0.v9100%Avira URL Cloudmalware
                      https://www.pango.co/privacy0%URL Reputationsafe
                      https://www.disneyplus.com/legal/your-california-privacy-rights0%URL Reputationsafe
                      https://173.82.82.196:8080/(.100%Avira URL Cloudmalware
                      https://173.82.82.196/100%URL Reputationmalware
                      http://crl.ver)0%Avira URL Cloudsafe
                      https://www.tiktok.com/legal/report/feedback0%URL Reputationsafe
                      https://%s.xboxlive.com0%URL Reputationsafe
                      https://173.82.82.196:8080/100%URL Reputationmalware
                      https://www.disneyplus.com/legal/privacy-policy0%URL Reputationsafe
                      https://dynamic.t0%URL Reputationsafe
                      https://disneyplus.com/legal.0%URL Reputationsafe
                      http://help.disneyplus.com.0%URL Reputationsafe
                      https://%s.dnet.xboxlive.com0%URL Reputationsafe
                      https://173.82.82.196:8080/P100%Avira URL Cloudmalware
                      No contacted domains info
                      NameSourceMaliciousAntivirus DetectionReputation
                      https://dev.ditu.live.com/REST/v1/Routes/svchost.exe, 00000012.00000002.317593966.00000195B5E3E000.00000004.00000020.00020000.00000000.sdmpfalse
                        high
                        https://dev.virtualearth.net/REST/v1/Routes/Drivingsvchost.exe, 00000012.00000003.316801953.00000195B5E50000.00000004.00000020.00020000.00000000.sdmpfalse
                          high
                          https://t0.ssl.ak.dynamic.tiles.virtualearth.net/comp/gen.ashxsvchost.exe, 00000012.00000002.317593966.00000195B5E3E000.00000004.00000020.00020000.00000000.sdmpfalse
                            high
                            https://dev.ditu.live.com/REST/v1/Traffic/Incidents/svchost.exe, 00000012.00000003.316812477.00000195B5E4A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000012.00000002.317612674.00000195B5E4C000.00000004.00000020.00020000.00000000.sdmpfalse
                              high
                              https://t0.tiles.ditu.live.com/tiles/gensvchost.exe, 00000012.00000002.317577945.00000195B5E24000.00000004.00000020.00020000.00000000.sdmpfalse
                                high
                                https://dev.virtualearth.net/REST/v1/Routes/Walkingsvchost.exe, 00000012.00000003.316801953.00000195B5E50000.00000004.00000020.00020000.00000000.sdmpfalse
                                  high
                                  https://173.82.82.196:8080/fregsvr32.exe, 00000007.00000002.647496148.0000000000A7E000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000003.535348405.0000000000A7E000.00000004.00000020.00020000.00000000.sdmptrue
                                  • Avira URL Cloud: malware
                                  unknown
                                  https://dev.virtualearth.net/mapcontrol/HumanScaleServices/GetBubbles.ashx?n=svchost.exe, 00000012.00000003.316857943.00000195B5E41000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000012.00000003.317078891.00000195B5E42000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000012.00000002.317608897.00000195B5E43000.00000004.00000020.00020000.00000000.sdmpfalse
                                    high
                                    https://dev.ditu.live.com/mapcontrol/logging.ashxsvchost.exe, 00000012.00000003.316801953.00000195B5E50000.00000004.00000020.00020000.00000000.sdmpfalse
                                      high
                                      https://dev.ditu.live.com/REST/v1/Imagery/Copyright/svchost.exe, 00000012.00000003.316812477.00000195B5E4A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000012.00000002.317577945.00000195B5E24000.00000004.00000020.00020000.00000000.sdmpfalse
                                        high
                                        https://dev.virtualearth.net/webservices/v1/LoggingService/LoggingService.svc/Log?entry=svchost.exe, 00000012.00000003.291687958.00000195B5E30000.00000004.00000020.00020000.00000000.sdmpfalse
                                          high
                                          https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gri?pv=1&r=svchost.exe, 00000012.00000003.291687958.00000195B5E30000.00000004.00000020.00020000.00000000.sdmpfalse
                                            high
                                            https://173.82.82.196/0.v9regsvr32.exe, 00000007.00000002.647445988.0000000000A72000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000003.535336382.0000000000A72000.00000004.00000020.00020000.00000000.sdmptrue
                                            • Avira URL Cloud: malware
                                            unknown
                                            https://dev.virtualearth.net/REST/v1/Transit/Schedules/svchost.exe, 00000012.00000003.316857943.00000195B5E41000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000012.00000003.317078891.00000195B5E42000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000012.00000002.317608897.00000195B5E43000.00000004.00000020.00020000.00000000.sdmpfalse
                                              high
                                              https://www.hotspotshield.com/terms/svchost.exe, 00000021.00000003.492529643.000001C77B9A8000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.492482077.000001C77BE03000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.492465997.000001C77BE02000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.492512474.000001C77B986000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.492397766.000001C77B998000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.492570326.000001C77BE19000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.492430641.000001C77B9A8000.00000004.00000020.00020000.00000000.sdmpfalse
                                                high
                                                https://www.pango.co/privacysvchost.exe, 00000021.00000003.492529643.000001C77B9A8000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.492482077.000001C77BE03000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.492465997.000001C77BE02000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.492512474.000001C77B986000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.492397766.000001C77B998000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.492570326.000001C77BE19000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.492430641.000001C77B9A8000.00000004.00000020.00020000.00000000.sdmpfalse
                                                • URL Reputation: safe
                                                unknown
                                                https://ecn.dev.virtualearth.net/mapcontrol/roadshield.ashx?bucket=svchost.exe, 00000012.00000003.291687958.00000195B5E30000.00000004.00000020.00020000.00000000.sdmpfalse
                                                  high
                                                  http://www.bingmapsportal.comsvchost.exe, 00000012.00000002.317577945.00000195B5E24000.00000004.00000020.00020000.00000000.sdmpfalse
                                                    high
                                                    https://dev.virtualearth.net/REST/v1/Imagery/Copyright/svchost.exe, 00000012.00000003.291687958.00000195B5E30000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000012.00000002.317577945.00000195B5E24000.00000004.00000020.00020000.00000000.sdmpfalse
                                                      high
                                                      https://ecn.dev.virtualearth.net/REST/v1/Imagery/Copyright/svchost.exe, 00000012.00000002.317593966.00000195B5E3E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000012.00000003.291687958.00000195B5E30000.00000004.00000020.00020000.00000000.sdmpfalse
                                                        high
                                                        https://dynamic.t0.tiles.ditu.live.com/comp/gen.ashxsvchost.exe, 00000012.00000003.316801953.00000195B5E50000.00000004.00000020.00020000.00000000.sdmpfalse
                                                          high
                                                          https://www.disneyplus.com/legal/your-california-privacy-rightssvchost.exe, 00000021.00000003.495561358.000001C77B98E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.495361255.000001C77B9A0000.00000004.00000020.00020000.00000000.sdmpfalse
                                                          • URL Reputation: safe
                                                          unknown
                                                          https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdv?pv=1&r=svchost.exe, 00000012.00000003.316857943.00000195B5E41000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000012.00000003.317044423.00000195B5E46000.00000004.00000020.00020000.00000000.sdmpfalse
                                                            high
                                                            https://dev.ditu.live.com/REST/v1/Transit/Stops/svchost.exe, 00000012.00000003.316702192.00000195B5E68000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000012.00000002.317635939.00000195B5E6B000.00000004.00000020.00020000.00000000.sdmpfalse
                                                              high
                                                              https://dev.virtualearth.net/REST/v1/Routes/svchost.exe, 00000012.00000002.317593966.00000195B5E3E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                high
                                                                https://dev.virtualearth.net/REST/v1/Traffic/Incidents/svchost.exe, 00000012.00000002.317577945.00000195B5E24000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                  high
                                                                  https://173.82.82.196:8080/(.regsvr32.exe, 00000007.00000002.647445988.0000000000A72000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000003.535336382.0000000000A72000.00000004.00000020.00020000.00000000.sdmptrue
                                                                  • Avira URL Cloud: malware
                                                                  unknown
                                                                  https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdi?pv=1&r=svchost.exe, 00000012.00000003.291687958.00000195B5E30000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                    high
                                                                    https://173.82.82.196/regsvr32.exe, 00000007.00000002.647445988.0000000000A72000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000003.535336382.0000000000A72000.00000004.00000020.00020000.00000000.sdmptrue
                                                                    • URL Reputation: malware
                                                                    unknown
                                                                    https://dev.virtualearth.net/REST/v1/Transit/Stops/svchost.exe, 00000012.00000003.291687958.00000195B5E30000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                      high
                                                                      http://crl.ver)svchost.exe, 00000017.00000002.644662058.0000022F4C213000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000002.523167516.000001C77AEEE000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                      • Avira URL Cloud: safe
                                                                      low
                                                                      https://dev.virtualearth.net/webservices/v1/LoggingService/LoggingService.svc/Log?svchost.exe, 00000012.00000003.316812477.00000195B5E4A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000012.00000003.316857943.00000195B5E41000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000012.00000002.317612674.00000195B5E4C000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                        high
                                                                        https://www.tiktok.com/legal/report/feedbacksvchost.exe, 00000021.00000003.503721537.000001C77BE02000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.503700080.000001C77B99F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.503683010.000001C77B98E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.503649260.000001C77B9B5000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.503617207.000001C77B9B5000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                        • URL Reputation: safe
                                                                        unknown
                                                                        https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gd?pv=1&r=svchost.exe, 00000012.00000002.317593966.00000195B5E3E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000012.00000002.317577945.00000195B5E24000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                          high
                                                                          https://%s.xboxlive.comsvchost.exe, 00000010.00000002.647477108.000001D20863E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                          • URL Reputation: safe
                                                                          low
                                                                          https://dev.ditu.live.com/mapcontrol/mapconfiguration.ashx?name=native&v=svchost.exe, 00000012.00000002.317577945.00000195B5E24000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                            high
                                                                            https://dev.virtualearth.net/REST/v1/Locationssvchost.exe, 00000012.00000003.291687958.00000195B5E30000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000012.00000003.316801953.00000195B5E50000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                              high
                                                                              https://ecn.dev.virtualearth.net/mapcontrol/mapconfiguration.ashx?name=native&v=svchost.exe, 00000012.00000003.291687958.00000195B5E30000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                high
                                                                                https://dev.virtualearth.net/mapcontrol/logging.ashxsvchost.exe, 00000012.00000003.316801953.00000195B5E50000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                  high
                                                                                  https://support.hotspotshield.com/svchost.exe, 00000021.00000003.492529643.000001C77B9A8000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.492482077.000001C77BE03000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.492465997.000001C77BE02000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.492512474.000001C77B986000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.492397766.000001C77B998000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.492570326.000001C77BE19000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.492430641.000001C77B9A8000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                    high
                                                                                    https://173.82.82.196:8080/regsvr32.exe, 00000007.00000002.647496148.0000000000A7E000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000002.647895703.0000000000AA4000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000003.535348405.0000000000A7E000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000003.536554846.0000000000AA4000.00000004.00000020.00020000.00000000.sdmptrue
                                                                                    • URL Reputation: malware
                                                                                    unknown
                                                                                    https://dynamic.api.tiles.ditu.live.com/odvs/gdi?pv=1&r=svchost.exe, 00000012.00000003.316812477.00000195B5E4A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000012.00000002.317612674.00000195B5E4C000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                      high
                                                                                      https://www.disneyplus.com/legal/privacy-policysvchost.exe, 00000021.00000003.495561358.000001C77B98E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.495361255.000001C77B9A0000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                      • URL Reputation: safe
                                                                                      unknown
                                                                                      https://dev.virtualearth.net/REST/v1/JsonFilter/VenueMaps/data/svchost.exe, 00000012.00000003.316812477.00000195B5E4A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000012.00000002.317612674.00000195B5E4C000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                        high
                                                                                        https://dynamic.tsvchost.exe, 00000012.00000002.317577945.00000195B5E24000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000012.00000002.317608897.00000195B5E43000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                        • URL Reputation: safe
                                                                                        unknown
                                                                                        https://dev.virtualearth.net/REST/v1/Routes/Transitsvchost.exe, 00000012.00000003.316801953.00000195B5E50000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                          high
                                                                                          https://disneyplus.com/legal.svchost.exe, 00000021.00000003.495561358.000001C77B98E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.495361255.000001C77B9A0000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                          • URL Reputation: safe
                                                                                          unknown
                                                                                          https://t0.ssl.ak.tiles.virtualearth.net/tiles/gensvchost.exe, 00000012.00000003.317228227.00000195B5E3A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000012.00000003.291687958.00000195B5E30000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                            high
                                                                                            https://dynamic.api.tiles.ditu.live.com/odvs/gdv?pv=1&r=svchost.exe, 00000012.00000003.316812477.00000195B5E4A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000012.00000002.317612674.00000195B5E4C000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                              high
                                                                                              https://activity.windows.comsvchost.exe, 00000010.00000002.647477108.000001D20863E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                high
                                                                                                https://dev.ditu.live.com/REST/v1/Locationssvchost.exe, 00000012.00000003.316801953.00000195B5E50000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                  high
                                                                                                  http://help.disneyplus.com.svchost.exe, 00000021.00000003.495561358.000001C77B98E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000021.00000003.495361255.000001C77B9A0000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                  • URL Reputation: safe
                                                                                                  unknown
                                                                                                  https://%s.dnet.xboxlive.comsvchost.exe, 00000010.00000002.647477108.000001D20863E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                  • URL Reputation: safe
                                                                                                  low
                                                                                                  https://173.82.82.196:8080/Pregsvr32.exe, 00000007.00000002.647895703.0000000000AA4000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000007.00000003.536554846.0000000000AA4000.00000004.00000020.00020000.00000000.sdmptrue
                                                                                                  • Avira URL Cloud: malware
                                                                                                  unknown
                                                                                                  https://dev.ditu.live.com/REST/v1/JsonFilter/VenueMaps/data/svchost.exe, 00000012.00000003.316812477.00000195B5E4A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000012.00000002.317612674.00000195B5E4C000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                    high
                                                                                                    https://dynamic.api.tiles.ditu.live.com/odvs/gd?pv=1&r=svchost.exe, 00000012.00000003.316812477.00000195B5E4A000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                      high
                                                                                                      • No. of IPs < 25%
                                                                                                      • 25% < No. of IPs < 50%
                                                                                                      • 50% < No. of IPs < 75%
                                                                                                      • 75% < No. of IPs
                                                                                                      IPDomainCountryFlagASNASN NameMalicious
                                                                                                      173.82.82.196
                                                                                                      unknownUnited States
                                                                                                      35916MULTA-ASN1UStrue
                                                                                                      IP
                                                                                                      192.168.2.1
                                                                                                      127.0.0.1
                                                                                                      Joe Sandbox Version:34.0.0 Boulder Opal
                                                                                                      Analysis ID:631909
                                                                                                      Start date and time: 22/05/202222:47:182022-05-22 22:47:18 +02:00
                                                                                                      Joe Sandbox Product:CloudBasic
                                                                                                      Overall analysis duration:0h 7m 55s
                                                                                                      Hypervisor based Inspection enabled:false
                                                                                                      Report type:light
                                                                                                      Sample file name:qJhkILqiEA.dll
                                                                                                      Cookbook file name:default.jbs
                                                                                                      Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                                                                                      Run name:Run with higher sleep bypass
                                                                                                      Number of analysed new started processes analysed:38
                                                                                                      Number of new started drivers analysed:0
                                                                                                      Number of existing processes analysed:0
                                                                                                      Number of existing drivers analysed:0
                                                                                                      Number of injected processes analysed:0
                                                                                                      Technologies:
                                                                                                      • HCA enabled
                                                                                                      • EGA enabled
                                                                                                      • HDC enabled
                                                                                                      • AMSI enabled
                                                                                                      Analysis Mode:default
                                                                                                      Analysis stop reason:Timeout
                                                                                                      Detection:MAL
                                                                                                      Classification:mal84.troj.evad.winDLL@32/16@0/3
                                                                                                      EGA Information:
                                                                                                      • Successful, ratio: 100%
                                                                                                      HDC Information:
                                                                                                      • Successful, ratio: 67.5% (good quality ratio 36%)
                                                                                                      • Quality average: 32.7%
                                                                                                      • Quality standard deviation: 37.6%
                                                                                                      HCA Information:
                                                                                                      • Successful, ratio: 94%
                                                                                                      • Number of executed functions: 0
                                                                                                      • Number of non-executed functions: 0
                                                                                                      Cookbook Comments:
                                                                                                      • Found application associated with file extension: .dll
                                                                                                      • Adjust boot time
                                                                                                      • Enable AMSI
                                                                                                      • Sleeps bigger than 120000ms are automatically reduced to 1000ms
                                                                                                      • Exclude process from analysis (whitelisted): audiodg.exe, BackgroundTransferHost.exe, WerFault.exe, WMIADAP.exe, backgroundTaskHost.exe, wuapihost.exe
                                                                                                      • Excluded IPs from analysis (whitelisted): 173.222.108.210, 173.222.108.226, 20.189.173.22, 52.168.117.173, 104.79.90.110, 20.223.24.244
                                                                                                      • Excluded domains from analysis (whitelisted): onedsblobprdeus16.eastus.cloudapp.azure.com, fs.microsoft.com, displaycatalog-rp-europe.md.mp.microsoft.com.akadns.net, neu-displaycatalogrp.frontdoor.bigcatalog.commerce.microsoft.com, onedsblobprdwus17.westus.cloudapp.azure.com, ctldl.windowsupdate.com, e1723.g.akamaiedge.net, a767.dspw65.akamai.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, arc.msn.com, wu-bg-shim.trafficmanager.net, download.windowsupdate.com.edgesuite.net, ris.api.iris.microsoft.com, consumer-displaycatalogrp-aks2aks-europe.md.mp.microsoft.com.akadns.net, store-images.s-microsoft.com, login.live.com, blobcollector.events.data.trafficmanager.net, sls.update.microsoft.com, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, watson.telemetry.microsoft.com, prod.fs.microsoft.com.akadns.net, displaycatalog-rp.md.mp.microsoft.com.akadns.net
                                                                                                      • Not all processes where analyzed, report is missing behavior information
                                                                                                      • Report size exceeded maximum capacity and may have missing behavior information.
                                                                                                      • Report size exceeded maximum capacity and may have missing disassembly code.
                                                                                                      • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                                                      • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                                                                      • Report size getting too big, too many NtQueryValueKey calls found.
                                                                                                      TimeTypeDescription
                                                                                                      22:49:01API Interceptor1x Sleep call for process: svchost.exe modified
                                                                                                      22:49:51API Interceptor1x Sleep call for process: MpCmdRun.exe modified
                                                                                                      No context
                                                                                                      No context
                                                                                                      No context
                                                                                                      No context
                                                                                                      No context
                                                                                                      Process:C:\Windows\System32\svchost.exe
                                                                                                      File Type:data
                                                                                                      Category:dropped
                                                                                                      Size (bytes):8192
                                                                                                      Entropy (8bit):0.3593198815979092
                                                                                                      Encrypted:false
                                                                                                      SSDEEP:12:SnaaD0JcaaD0JwQQU2naaD0JcaaD0JwQQU:4tgJctgJw/tgJctgJw
                                                                                                      MD5:BF1DC7D5D8DAD7478F426DF8B3F8BAA6
                                                                                                      SHA1:C6B0BDE788F553F865D65F773D8F6A3546887E42
                                                                                                      SHA-256:BE47C764C38CA7A90A345BE183F5261E89B98743B5E35989E9A8BE0DA498C0F2
                                                                                                      SHA-512:00F2412AA04E09EA19A8315D80BE66D2727C713FC0F5AE6A9334BABA539817F568A98CA3A45B2673282BDD325B8B0E2840A393A4DCFADCB16473F5EAF2AF3180
                                                                                                      Malicious:false
                                                                                                      Preview:.............*..........3...w..................C:\ProgramData\Microsoft\Network\Downloader\.........................................................................................................................................................................................................................C:\ProgramData\Microsoft\Network\Downloader\..........................................................................................................................................................................................................................0u..................@...@......................................................*.............................................................................................................................................................................................................................................................................................................................................................
                                                                                                      Process:C:\Windows\System32\svchost.exe
                                                                                                      File Type:MPEG-4 LOAS
                                                                                                      Category:dropped
                                                                                                      Size (bytes):1310720
                                                                                                      Entropy (8bit):0.24943981571860702
                                                                                                      Encrypted:false
                                                                                                      SSDEEP:1536:BJiRdfVzkZm3lyf49uyc0ga04PdHS9LrM/oVMUdSRU4m:BJiRdwfu2SRU4m
                                                                                                      MD5:D8FF300C6D885188DF2AC60E3BCD71CB
                                                                                                      SHA1:21A25B82AC439052932E64A78951D8F79E5D047A
                                                                                                      SHA-256:B387363557993C28D2FCE0B206954E7F10FDD369168300F4C8749C214BC0DF4B
                                                                                                      SHA-512:4C8AAD83554DF1DA7EF8855B981E7490C97ABC389B0B01D9107DB60505FAAC76D0F9E3EEF6142F960FCBF9F6E85334B40C2C2DE16DD9774372051063162B3E2D
                                                                                                      Malicious:false
                                                                                                      Preview:V.d.........@..@.3...w...........................3...w..................C:\ProgramData\Microsoft\Network\Downloader\.........................................................................................................................................................................................................................C:\ProgramData\Microsoft\Network\Downloader\..........................................................................................................................................................................................................................0u..................@...@.........................................d#.................................................................................................................................................................................................................................................................................................................................................
                                                                                                      Process:C:\Windows\System32\svchost.exe
                                                                                                      File Type:Extensible storage engine DataBase, version 0x620, checksum 0xe8784526, page size 16384, Windows version 10.0
                                                                                                      Category:dropped
                                                                                                      Size (bytes):786432
                                                                                                      Entropy (8bit):0.25065638736444334
                                                                                                      Encrypted:false
                                                                                                      SSDEEP:384:8bp+W0StseCJ48EApW0StseCJ48E2rTSjlK/ebmLerYSRSY1J2:8biSB2nSB2RSjlK/+mLesOj1J2
                                                                                                      MD5:7CC246726A494BBEEDDDF2D804264E81
                                                                                                      SHA1:5D8A6E26FDA3D4604503FDEEC2DEE828D27D1907
                                                                                                      SHA-256:CD57CF3B12D5478C28A09E3AC5C81FB79416DA47CF9529A698B162C439A81301
                                                                                                      SHA-512:54B35C130FE2F6C799C6C0366432429629BB7C9A30BE4B68917DDA6E84898E9BB93C40428BBFFD17A4050D070EB7337B34B84BB6BD72391CDE07AB3994166B83
                                                                                                      Malicious:false
                                                                                                      Preview:.xE&... ................e.f.3...w........................)......3...zI..1...z..h.(......3...zI...)..............3...w...........................................................................................................B...........@...................................................................................................... ...................................................................................................................................................................................................................................................k....3...zI......................3...zI.........................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                      Process:C:\Windows\System32\svchost.exe
                                                                                                      File Type:data
                                                                                                      Category:dropped
                                                                                                      Size (bytes):16384
                                                                                                      Entropy (8bit):0.07689334245217044
                                                                                                      Encrypted:false
                                                                                                      SSDEEP:3:ultlJ7vkUxZW/XbfC4qKpUzXMUgK/Xoll3Vkttlmlnl:OlJrkUetn4MN3
                                                                                                      MD5:F16CAFCA17364D171423EA175A7DC2EB
                                                                                                      SHA1:302DF404A45B15292D76BFFBDB5014E842479A4D
                                                                                                      SHA-256:41B9D3515826337015A984E44A842E7394B108406374A0581362B3AFADA93636
                                                                                                      SHA-512:467A7B4B404BA5042B12680CF8CF307A7A117B54651833920F567F1E1AB2B2D2C6AE65EB6EAF06D55C7455DE981EC3961F6160AA1D7033C16746BDCACB649E50
                                                                                                      Malicious:false
                                                                                                      Preview:.........................................3...w...1...z...3...zI..........3...zI..3...zI..ir.3...z1......................3...zI.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                      Process:C:\Windows\System32\WerFault.exe
                                                                                                      File Type:Little-endian UTF-16 Unicode text, with CRLF line terminators
                                                                                                      Category:dropped
                                                                                                      Size (bytes):65536
                                                                                                      Entropy (8bit):0.78653414067496
                                                                                                      Encrypted:false
                                                                                                      SSDEEP:96:uAFiG6uitmJPnyYjZ55ol7RH6tpXIQcQSc6rcEbcw3dXXaXz+HbHgSQgJPbsIDVx:zvbitmJKeHMvhBjC9/u7sYS274ltY3
                                                                                                      MD5:712C9C534669558E0D3D02502A6D1EBD
                                                                                                      SHA1:2FD4029900005F0D64033CB3AC82E7471FC5E2E3
                                                                                                      SHA-256:E9138AC8E879C912F4DB97F311D1567E848DA56DE387CA61B9A971B668A73209
                                                                                                      SHA-512:844D44C931166904EB83F948AD23B9B7F6B4C432B2F6F56581F1F449E57AFB03B4CCE746147B493D2A2D4293A0EF1E836E979523B4983B0DA5F6B3FDDAB6AF4D
                                                                                                      Malicious:false
                                                                                                      Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.B.E.X.6.4.....E.v.e.n.t.T.i.m.e.=.1.3.2.9.7.7.2.6.1.1.0.3.4.6.2.8.1.5.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.2.9.7.7.2.6.1.1.2.3.9.2.0.4.3.8.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.9.5.d.6.5.e.c.5.-.9.b.f.c.-.4.1.8.c.-.b.a.e.d.-.7.6.f.a.0.9.b.c.5.4.b.b.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.7.5.e.e.4.8.c.5.-.c.d.e.3.-.4.5.7.f.-.a.a.a.3.-.9.f.6.c.8.9.7.0.5.8.f.9.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.r.u.n.d.l.l.3.2...e.x.e._.q.J.h.k.I.L.q.i.E.A...d.l.l.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.R.U.N.D.L.L.3.2...E.X.E.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.c.1.0.-.0.0.0.1.-.0.0.1.c.-.c.8.e.8.-.4.8.4.7.1.d.6.e.d.8.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.2.f.3.4.c.c.f.d.d.8.1.4.1.a.e.e.e.2.e.8.9.f.f.b.0.7.0.c.e.2.3.9.c.7.d.0.0.7.0.6.!.
                                                                                                      Process:C:\Windows\System32\WerFault.exe
                                                                                                      File Type:Little-endian UTF-16 Unicode text, with CRLF line terminators
                                                                                                      Category:dropped
                                                                                                      Size (bytes):65536
                                                                                                      Entropy (8bit):0.785382983774044
                                                                                                      Encrypted:false
                                                                                                      SSDEEP:96:3WxFiuinJPnyHjZ55ol7RH6tpXIQcQSc6rcEbcw3dXXaXz+HbHgSQgJPbsIDV9wE:khinJKpHMvhBjC9/u7sYS274ltY3
                                                                                                      MD5:F7E90A1BBDB0CD4F72B29E3908A6C190
                                                                                                      SHA1:60DD6FCDEB84671E399818282F1A73CEF379B5C3
                                                                                                      SHA-256:DCB5344170BEDABEB85285397BB188D7E7AD0CF820316386F05D502FF43C64B9
                                                                                                      SHA-512:953E132C5C402D49F68566C76F96659186BA5B585C19B60DC7B37AF2997DB1DAE392A998B1E496A863889B9DDC3D8FF5E80C020D21F77D5B533382B2A36228F7
                                                                                                      Malicious:false
                                                                                                      Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.B.E.X.6.4.....E.v.e.n.t.T.i.m.e.=.1.3.2.9.7.7.2.6.1.0.9.7.5.3.0.1.9.7.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.2.9.7.7.2.6.1.1.1.9.0.9.2.6.2.6.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.a.6.f.a.d.f.5.6.-.2.f.5.8.-.4.9.e.a.-.b.f.4.8.-.8.4.2.0.c.f.c.0.4.f.a.2.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.6.3.9.c.0.2.a.7.-.4.3.a.d.-.4.4.5.d.-.8.2.7.f.-.4.c.4.a.4.9.3.e.4.3.c.d.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.r.u.n.d.l.l.3.2...e.x.e._.q.J.h.k.I.L.q.i.E.A...d.l.l.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.R.U.N.D.L.L.3.2...E.X.E.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.c.6.c.-.0.0.0.1.-.0.0.1.c.-.c.1.9.4.-.1.3.4.7.1.d.6.e.d.8.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.2.f.3.4.c.c.f.d.d.8.1.4.1.a.e.e.e.2.e.8.9.f.f.b.0.7.0.c.e.2.3.9.c.7.d.0.0.7.0.6.!.
                                                                                                      Process:C:\Windows\System32\WerFault.exe
                                                                                                      File Type:XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
                                                                                                      Category:dropped
                                                                                                      Size (bytes):8650
                                                                                                      Entropy (8bit):3.7034582406311083
                                                                                                      Encrypted:false
                                                                                                      SSDEEP:192:Rrl7r3GLNiv3VKnrg6YmxagmfWISVOS+prS89bpE/f0Wjm:RrlsNifVKnrg6YoagmfWISIpkfW
                                                                                                      MD5:1046F0EED316DBAFE38CB0D9A0D3CB78
                                                                                                      SHA1:938364FAAD0A8A464AEDC915AB3487F890F7F1E6
                                                                                                      SHA-256:C9685DB4A4BB1C84458EEC1FCF9414DAFE6F793C71D9ECF2CDADF3D9B334A553
                                                                                                      SHA-512:7782873C2DA8E01099F46543676B6DBC2D5D542B607D570BB34084FE9D7A51D8C3EB36AEA0BDBCECBA1BD11108D77328B63D60114C7C8B82A538E82FB0A8B544
                                                                                                      Malicious:false
                                                                                                      Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.7.1.3.4.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.7.1.3.4...1...a.m.d.6.4.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.1.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.1.0.3.3.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.3.1.8.0.<./.P.i.d.>.......
                                                                                                      Process:C:\Windows\System32\WerFault.exe
                                                                                                      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                                      Category:dropped
                                                                                                      Size (bytes):4892
                                                                                                      Entropy (8bit):4.512441673681485
                                                                                                      Encrypted:false
                                                                                                      SSDEEP:48:cvIwSD8zsTrJgtBI9GAK9kWgc8sqYj58fm8M4JCGCZgnFoYVyq8vhZgskZESC5SH:uITfR56grsqYyJ+YVWfkVvpd
                                                                                                      MD5:187432A1D31ED3C938791AFF2B2AFA45
                                                                                                      SHA1:B9F31E06E9E100148B87A03679B02D460A53E9DA
                                                                                                      SHA-256:2B8101185AE6B83AFB966FC5FB1082424A7B5A6CD4397315D79CB0F97496EA30
                                                                                                      SHA-512:E811D8C23F9769E6CE253B1865B081770711500758F19E24060E9ED1C540A791BF2DBEEDE072480D929380A5A1A21C1C694DE1746DDEA2FEA4FD7EC086C6BC2D
                                                                                                      Malicious:false
                                                                                                      Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="17134" />.. <arg nm="vercsdbld" val="1" />.. <arg nm="verqfe" val="1" />.. <arg nm="csdbld" val="1" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="1033" />.. <arg nm="geoid" val="244" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="1526759" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.1.17134.0-11.0.47" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="4096" />..
                                                                                                      Process:C:\Windows\System32\WerFault.exe
                                                                                                      File Type:XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
                                                                                                      Category:dropped
                                                                                                      Size (bytes):8644
                                                                                                      Entropy (8bit):3.7050788967044714
                                                                                                      Encrypted:false
                                                                                                      SSDEEP:192:Rrl7r3GLNiefGnn7D6Y7U4igmfWISVOS+prp89bpK/fsjm:RrlsNieGnn7D6Yo/gmfWISVpafV
                                                                                                      MD5:CFE3F6B219A74B629B6621046E8344C0
                                                                                                      SHA1:997AF685CA3C5481E5228D017E6AAC8944032A19
                                                                                                      SHA-256:AAA2FCD607AC304FAC850FE70D38F20A5789396B13D0E1B09F8B6A7FED0171B5
                                                                                                      SHA-512:2B43CC3212A6E457B4AF488CD021607AC0CF78119F5B55CBE4499E2447C9B4BE85CD8A79C1EE0BE7B42560F300A9149A4366D0110D6CD78C0983733BDBFF6F3B
                                                                                                      Malicious:false
                                                                                                      Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.7.1.3.4.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.7.1.3.4...1...a.m.d.6.4.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.1.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.1.0.3.3.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.3.0.8.8.<./.P.i.d.>.......
                                                                                                      Process:C:\Windows\System32\WerFault.exe
                                                                                                      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                                      Category:dropped
                                                                                                      Size (bytes):4892
                                                                                                      Entropy (8bit):4.513366664364022
                                                                                                      Encrypted:false
                                                                                                      SSDEEP:48:cvIwSD8zsTrJgtBI9GAK9kWgc8sqYjpT8fm8M4JCGCZgnFOyq8vhZgwfZESC5SMd:uITfR56grsqYSJwWPfVvMd
                                                                                                      MD5:D733CE4203C0A165D35770F1552C8902
                                                                                                      SHA1:1D972A278E1456DC34792310D673B013D31AAC21
                                                                                                      SHA-256:382BD0E26D6BE879B3D019491ECAA6F6CEA0665D542598F560EEBA9587E73248
                                                                                                      SHA-512:5469D506E0499ECA5F1AC7729129D95B8EF6083E6836F3A7D2881DD6CEFED6A16CE8B23F05A9ECC1CBC68ABE522D1CDDFAA1AE1E977D9A34600F9BA4C4705F97
                                                                                                      Malicious:false
                                                                                                      Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="17134" />.. <arg nm="vercsdbld" val="1" />.. <arg nm="verqfe" val="1" />.. <arg nm="csdbld" val="1" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="1033" />.. <arg nm="geoid" val="244" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="1526759" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.1.17134.0-11.0.47" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="4096" />..
                                                                                                      Process:C:\Windows\System32\WerFault.exe
                                                                                                      File Type:Mini DuMP crash report, 15 streams, Sun May 22 20:48:30 2022, 0x1205a4 type
                                                                                                      Category:dropped
                                                                                                      Size (bytes):66002
                                                                                                      Entropy (8bit):2.2680221089329433
                                                                                                      Encrypted:false
                                                                                                      SSDEEP:384:OJMriPwsv7faw5C+mhNNiJkl0niFWxdw+O:ofPNvz75C+mhDibS6dg
                                                                                                      MD5:A9DCC66453173D9D26F7633B9E86B633
                                                                                                      SHA1:870EB92173E26CE8D5DAA00C9105A16FA49B86FC
                                                                                                      SHA-256:200D24DF6B12A1F022C9D578AE06F9B855699AD6A7D994DACE293F2720E9F3CD
                                                                                                      SHA-512:460F505460BDB68BBAF58BC7E2DCA0125FD1C8E40F9AA7BA5391CB66E0278C838D87029770EC166A7D6DC30B9C1FD217B24097AD1C9EF311922F32FDBD094B49
                                                                                                      Malicious:false
                                                                                                      Preview:MDMP....... ..........b........................................8...........p;..........`.......8...........T...............*............"...........$...................................................................U...........B......\%......Lw..................g...T.......l......b.............................0..................W... .E.u.r.o.p.e. .S.t.a.n.d.a.r.d. .T.i.m.e.......................................W... .E.u.r.o.p.e. .D.a.y.l.i.g.h.t. .T.i.m.e.......................................1.7.1.3.4...1...a.m.d.6.4.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.....................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                      Process:C:\Windows\System32\WerFault.exe
                                                                                                      File Type:Mini DuMP crash report, 15 streams, Sun May 22 20:48:31 2022, 0x1205a4 type
                                                                                                      Category:dropped
                                                                                                      Size (bytes):64598
                                                                                                      Entropy (8bit):2.3001332838422353
                                                                                                      Encrypted:false
                                                                                                      SSDEEP:384:URJMniPwsv7faw4lWC3bEwFniF/bZyyTgOGR6:U3vPNvz74lWC3bLBS/b2U
                                                                                                      MD5:CE0805F60565B06C14AE97418E371D1F
                                                                                                      SHA1:76BDAD64C7576D826733E8020C6E69FE5FC6EB5D
                                                                                                      SHA-256:1F3E378129CE75950E13C1499498CE9AEB48652B17A04B0FBD5EA80DA96D388C
                                                                                                      SHA-512:BF58974226BD3F91468738A9CAE8B80FAA164E284631FB0D69403E932E4CEC79CA07AAC24169A79FAAB42ADA4AD3386215043D61D88B1A705A116473367C9673
                                                                                                      Malicious:false
                                                                                                      Preview:MDMP....... ..........b........................................8...........p;..........`.......8...........T...........X................"...........$...................................................................U...........B......\%......Lw................x.>...T..............b.............................0..................W... .E.u.r.o.p.e. .S.t.a.n.d.a.r.d. .T.i.m.e.......................................W... .E.u.r.o.p.e. .D.a.y.l.i.g.h.t. .T.i.m.e.......................................1.7.1.3.4...1...a.m.d.6.4.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.....................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                      Process:C:\Windows\System32\regsvr32.exe
                                                                                                      File Type:Microsoft Cabinet archive data, 61480 bytes, 1 file
                                                                                                      Category:dropped
                                                                                                      Size (bytes):61480
                                                                                                      Entropy (8bit):7.9951219482618905
                                                                                                      Encrypted:true
                                                                                                      SSDEEP:1536:kmu7iDG/SCACih0/8uIGantJdjFpTE8lTeNjiXKGgUN:CeGf5gKsG4vdjFpjlYeX9gUN
                                                                                                      MD5:B9F21D8DB36E88831E5352BB82C438B3
                                                                                                      SHA1:4A3C330954F9F65A2F5FD7E55800E46CE228A3E2
                                                                                                      SHA-256:998E0209690A48ED33B79AF30FC13851E3E3416BED97E3679B6030C10CAB361E
                                                                                                      SHA-512:D4A2AC7C14227FBAF8B532398FB69053F0A0D913273F6917027C8CADBBA80113FDBEC20C2A7EB31B7BB57C99F9FDECCF8576BE5F39346D8B564FC72FB1699476
                                                                                                      Malicious:false
                                                                                                      Preview:MSCF....(.......,...................I........y.........Tbr .authroot.stl..$..4..CK..<Tk...c_.d....A.K.....Y.f....!.))$7*I.....e..eKT..k....n.3.......S..9.s.....3H.Mh......qV.=M6.=.4.F.....V:F..]......B`....Q...c"U.0.n....J.....4.....i7s..:.27....._...+).lE..he.4|.?,...h....7..PA..b.,. .....#1+..o...g.....2n1m...=.......Dp.;..f..ljX.Dx..r<'.1RI3B0<w.D.z..)D|..8<..c+..'XH..K,.Y..d.j.<.A.......l_lVb[w..rDp...'.....nL....!G.F....f.fX..r.. ?.....v(...L..<.\.Z..g;.>.0v...P ......|...A..(..x...T0.`g...c..7.U?...9.p..a..&..9......sV..l0..D..fhi..h.F....q...y.....Mq].4..Z.....={L....AS..9.....:.:.........+..P.N....EAQ.V. sr.....y.B.`.Efe..8../....$...y-.q.J.......nP...2.Q8...O........M.@\.>=X....V..z.4.=.@...ws.N.M3.S.c?.....C4]?..\.K.9......^...CU......O....X.`........._.gU...*..V.{V6..m..D.-|.Q.t.7.....9.~....[...I.<e...~$..>......s.I.S....~1..IV.2Ri:..]R!8...q...l.X.%.)@......2.gb,t...}..;...@.Z..<q..y..:...e3..cY.we.$....z..| .#.......I...
                                                                                                      Process:C:\Windows\System32\regsvr32.exe
                                                                                                      File Type:data
                                                                                                      Category:modified
                                                                                                      Size (bytes):330
                                                                                                      Entropy (8bit):3.1147882228736057
                                                                                                      Encrypted:false
                                                                                                      SSDEEP:6:kKz/lqoJN+SkQlPlEGYRMY9z+4KlDA3RUesJ21:r/WkPlE99SNxAhUesE1
                                                                                                      MD5:0363219B7DEEC845F2D1295ECAD25D12
                                                                                                      SHA1:A891520C6FF13386920F25934CFC8781AD33337B
                                                                                                      SHA-256:E9ADAF25088C4793C72D2E63718FD56E4AF2537B2DA0ECABCDF22EC36D0CA848
                                                                                                      SHA-512:1BD4B6A17F1C6B070FFF97DBCBD2263215C3CA3E43512A4488FE816242A605D4FDD9F6ED50DDF50BF9AEEA6E66EAB823B456983027C66F007611AE738D111CA1
                                                                                                      Malicious:false
                                                                                                      Preview:p...... ........~..[.n..(....................................................... ........3k/"[......(...........(...h.t.t.p.:././.c.t.l.d.l...w.i.n.d.o.w.s.u.p.d.a.t.e...c.o.m./.m.s.d.o.w.n.l.o.a.d./.u.p.d.a.t.e./.v.3./.s.t.a.t.i.c./.t.r.u.s.t.e.d.r./.e.n./.a.u.t.h.r.o.o.t.s.t.l...c.a.b...".8.0.3.3.6.b.2.f.2.2.5.b.d.8.1.:.0."...
                                                                                                      Process:C:\Windows\System32\svchost.exe
                                                                                                      File Type:ASCII text, with no line terminators
                                                                                                      Category:dropped
                                                                                                      Size (bytes):55
                                                                                                      Entropy (8bit):4.306461250274409
                                                                                                      Encrypted:false
                                                                                                      SSDEEP:3:YDQRWu83XfAw2fHbY:YMRl83Xt2f7Y
                                                                                                      MD5:DCA83F08D448911A14C22EBCACC5AD57
                                                                                                      SHA1:91270525521B7FE0D986DB19747F47D34B6318AD
                                                                                                      SHA-256:2B4B2D4A06044AD0BD2AE3287CFCBECD90B959FEB2F503AC258D7C0A235D6FE9
                                                                                                      SHA-512:96F3A02DC4AE302A30A376FC7082002065C7A35ECB74573DE66254EFD701E8FD9E9D867A2C8ABEB4C482738291B715D4965A0D2412663FDF1EE6CBC0BA9FBACA
                                                                                                      Malicious:false
                                                                                                      Preview:{"fontSetUri":"fontset-2017-04.json","baseUri":"fonts"}
                                                                                                      Process:C:\Program Files\Windows Defender\MpCmdRun.exe
                                                                                                      File Type:Little-endian UTF-16 Unicode text, with CRLF, CR line terminators
                                                                                                      Category:modified
                                                                                                      Size (bytes):10844
                                                                                                      Entropy (8bit):3.1616379606535308
                                                                                                      Encrypted:false
                                                                                                      SSDEEP:192:cY+38+DJM+i2Jt+iDQ+yw+f0+rU+0Jtk+EOtF+E7tC+EwK+V:j+s+i+Z+z+B+c+Y+0g+J+j+2+V
                                                                                                      MD5:6705BF0FB1F764118D7B18E958138FEB
                                                                                                      SHA1:B7D1CD4369B65F74A969674FC2EBC62B1C384494
                                                                                                      SHA-256:1924CCE0EC3F1140F37D9A3B6BF46419F608CF1F8D42AA297A15BA1A879A3129
                                                                                                      SHA-512:0F270A36211EDE11C4E573A56BA72A3BB6733BA2C16D739E14D9368BD7D30F0C5BACABB5EECE9AC85CCAF5555F31FC2D384464E93743C4663CB464C67C01FBAB
                                                                                                      Malicious:false
                                                                                                      Preview:..........-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.....M.p.C.m.d.R.u.n.:. .C.o.m.m.a.n.d. .L.i.n.e.:. .".C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.W.i.n.d.o.w.s. .D.e.f.e.n.d.e.r.\.m.p.c.m.d.r.u.n...e.x.e.". .-.w.d.e.n.a.b.l.e..... .S.t.a.r.t. .T.i.m.e.:. .. T.h.u. .. J.u.n. .. 2.7. .. 2.0.1.9. .0.1.:.2.9.:.4.9.........M.p.E.n.s.u.r.e.P.r.o.c.e.s.s.M.i.t.i.g.a.t.i.o.n.P.o.l.i.c.y.:. .h.r. .=. .0.x.1.....W.D.E.n.a.b.l.e.....E.R.R.O.R.:. .M.p.W.D.E.n.a.b.l.e.(.T.R.U.E.). .f.a.i.l.e.d. .(.8.0.0.7.0.4.E.C.).....M.p.C.m.d.R.u.n.:. .E.n.d. .T.i.m.e.:. .. T.h.u. .. J.u.n. .. 2.7. .. 2.0.1.9. .0.1.:.2.9.:.4.9.....-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.............-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.
                                                                                                      File type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                                      Entropy (8bit):7.158106332990621
                                                                                                      TrID:
                                                                                                      • Win64 Dynamic Link Library (generic) (102004/3) 86.43%
                                                                                                      • Win64 Executable (generic) (12005/4) 10.17%
                                                                                                      • Generic Win/DOS Executable (2004/3) 1.70%
                                                                                                      • DOS Executable Generic (2002/1) 1.70%
                                                                                                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.01%
                                                                                                      File name:qJhkILqiEA.dll
                                                                                                      File size:365056
                                                                                                      MD5:8516983eedc8690c1495b828b4262a63
                                                                                                      SHA1:bdd250044234e53e9f08db444a1de00987735930
                                                                                                      SHA256:90498f1ee590da28566434c15efcfd98e829846f233387553ea655fc7559168d
                                                                                                      SHA512:c5b6a37a787a70e70be8614f957c183547b85dfa0913b746f6bc701cec09bd54e04fb53443dfeffedcf83176f581e6a5f4de06219a1fa6d9d015691e9432cd93
                                                                                                      SSDEEP:3072:JI0AM0yQkR9M6lglELtJUNjiWGyWcTb0JUiA2tqZ4IvUlDAj7UOjVifSwHEDQVLK:i5MR9M6y3TWRIvgMSS3AyUrhYu3j
                                                                                                      TLSH:7A747D56F6F110F5E8B7C138C9A23267F8317D559B38A7CB8A08865A4F70BA4E93D740
                                                                                                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........8..ik..ik..ik...k..ik...k..ik...k..ik..hk..ik...k..ik...k..ik...k..ik...k..ikRich..ik................PE..d...v{.b.........."
                                                                                                      Icon Hash:74f0e4ecccdce0e4
                                                                                                      Entrypoint:0x180003580
                                                                                                      Entrypoint Section:.text
                                                                                                      Digitally signed:false
                                                                                                      Imagebase:0x180000000
                                                                                                      Subsystem:windows gui
                                                                                                      Image File Characteristics:EXECUTABLE_IMAGE, DLL, LARGE_ADDRESS_AWARE
                                                                                                      DLL Characteristics:DYNAMIC_BASE, NX_COMPAT
                                                                                                      Time Stamp:0x62877B76 [Fri May 20 11:28:54 2022 UTC]
                                                                                                      TLS Callbacks:
                                                                                                      CLR (.Net) Version:
                                                                                                      OS Version Major:5
                                                                                                      OS Version Minor:2
                                                                                                      File Version Major:5
                                                                                                      File Version Minor:2
                                                                                                      Subsystem Version Major:5
                                                                                                      Subsystem Version Minor:2
                                                                                                      Import Hash:ad5c5b0f3e2e211c551f3b5059e614d7
                                                                                                      Instruction
                                                                                                      dec esp
                                                                                                      mov dword ptr [esp+18h], eax
                                                                                                      mov dword ptr [esp+10h], edx
                                                                                                      dec eax
                                                                                                      mov dword ptr [esp+08h], ecx
                                                                                                      dec eax
                                                                                                      sub esp, 28h
                                                                                                      cmp dword ptr [esp+38h], 01h
                                                                                                      jne 00007FD70CBF2EE7h
                                                                                                      call 00007FD70CBF8247h
                                                                                                      dec esp
                                                                                                      mov eax, dword ptr [esp+40h]
                                                                                                      mov edx, dword ptr [esp+38h]
                                                                                                      dec eax
                                                                                                      mov ecx, dword ptr [esp+30h]
                                                                                                      call 00007FD70CBF2EF4h
                                                                                                      dec eax
                                                                                                      add esp, 28h
                                                                                                      ret
                                                                                                      int3
                                                                                                      int3
                                                                                                      int3
                                                                                                      int3
                                                                                                      int3
                                                                                                      int3
                                                                                                      int3
                                                                                                      int3
                                                                                                      int3
                                                                                                      int3
                                                                                                      dec esp
                                                                                                      mov dword ptr [esp+18h], eax
                                                                                                      mov dword ptr [esp+10h], edx
                                                                                                      dec eax
                                                                                                      mov dword ptr [esp+08h], ecx
                                                                                                      dec eax
                                                                                                      sub esp, 48h
                                                                                                      mov dword ptr [esp+20h], 00000001h
                                                                                                      cmp dword ptr [esp+58h], 00000000h
                                                                                                      jne 00007FD70CBF2EF2h
                                                                                                      cmp dword ptr [00028DE8h], 00000000h
                                                                                                      jne 00007FD70CBF2EE9h
                                                                                                      xor eax, eax
                                                                                                      jmp 00007FD70CBF3004h
                                                                                                      cmp dword ptr [esp+58h], 01h
                                                                                                      je 00007FD70CBF2EE9h
                                                                                                      cmp dword ptr [esp+58h], 02h
                                                                                                      jne 00007FD70CBF2F30h
                                                                                                      dec eax
                                                                                                      cmp dword ptr [0001EDB9h], 00000000h
                                                                                                      je 00007FD70CBF2EFAh
                                                                                                      dec esp
                                                                                                      mov eax, dword ptr [esp+60h]
                                                                                                      mov edx, dword ptr [esp+58h]
                                                                                                      dec eax
                                                                                                      mov ecx, dword ptr [esp+50h]
                                                                                                      call dword ptr [0001EDA3h]
                                                                                                      mov dword ptr [esp+20h], eax
                                                                                                      cmp dword ptr [esp+20h], 00000000h
                                                                                                      je 00007FD70CBF2EF9h
                                                                                                      dec esp
                                                                                                      mov eax, dword ptr [esp+60h]
                                                                                                      mov edx, dword ptr [esp+58h]
                                                                                                      dec eax
                                                                                                      mov ecx, dword ptr [esp+50h]
                                                                                                      call 00007FD70CBF2C4Ah
                                                                                                      mov dword ptr [esp+20h], eax
                                                                                                      cmp dword ptr [esp+20h], 00000000h
                                                                                                      jne 00007FD70CBF2EE9h
                                                                                                      xor eax, eax
                                                                                                      Programming Language:
                                                                                                      • [LNK] VS2010 build 30319
                                                                                                      • [ASM] VS2010 build 30319
                                                                                                      • [ C ] VS2010 build 30319
                                                                                                      • [C++] VS2010 build 30319
                                                                                                      • [EXP] VS2010 build 30319
                                                                                                      • [RES] VS2010 build 30319
                                                                                                      • [IMP] VS2008 SP1 build 30729
                                                                                                      NameVirtual AddressVirtual Size Is in Section
                                                                                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x2aad00x84.rdata
                                                                                                      IMAGE_DIRECTORY_ENTRY_IMPORT0x2a2040x50.rdata
                                                                                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x300000x2d1fc.rsrc
                                                                                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x2f0000xfcc.pdata
                                                                                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x5e0000x294.reloc
                                                                                                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                                      IMAGE_DIRECTORY_ENTRY_IAT0x220000x298.rdata
                                                                                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                                      NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                                      .text0x10000x203fa0x20400False0.405969900678zlib compressed data5.75556665875IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                                                                                      .rdata0x220000x8b540x8c00False0.276395089286data4.42213983851IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                      .data0x2b0000x37980x1400False0.1609375data2.22442517754IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                                                                                                      .pdata0x2f0000xfcc0x1000False0.50537109375data5.09571430422IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                      .rsrc0x300000x2d1fc0x2d200False0.922572931094data7.88663988983IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                      .reloc0x5e0000x6f20x800False0.21337890625data2.33584866509IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                                                      NameRVASizeTypeLanguageCountry
                                                                                                      RT_FONTDIR0x300a00x2d000dataEnglishUnited States
                                                                                                      RT_MANIFEST0x5d0a00x15aASCII text, with CRLF line terminatorsEnglishUnited States
                                                                                                      DLLImport
                                                                                                      KERNEL32.dllGetTimeFormatA, GetDateFormatA, GetThreadLocale, FileTimeToSystemTime, VirtualAlloc, ExitProcess, CloseHandle, CreateFileW, SetStdHandle, GetCurrentThreadId, FlsSetValue, GetCommandLineA, TerminateProcess, GetCurrentProcess, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsDebuggerPresent, RtlVirtualUnwind, RtlLookupFunctionEntry, RtlCaptureContext, RtlUnwindEx, EncodePointer, FlsGetValue, FlsAlloc, FlsFree, SetLastError, GetLastError, HeapSize, HeapValidate, IsBadReadPtr, DecodePointer, GetProcAddress, GetModuleHandleW, SetHandleCount, GetStdHandle, InitializeCriticalSectionAndSpinCount, GetFileType, GetStartupInfoW, DeleteCriticalSection, GetModuleFileNameA, FreeEnvironmentStringsW, WideCharToMultiByte, GetEnvironmentStringsW, HeapSetInformation, GetVersion, HeapCreate, HeapDestroy, QueryPerformanceCounter, GetTickCount, GetCurrentProcessId, GetSystemTimeAsFileTime, EnterCriticalSection, LeaveCriticalSection, GetACP, GetOEMCP, GetCPInfo, IsValidCodePage, HeapAlloc, GetModuleFileNameW, HeapReAlloc, HeapQueryInformation, HeapFree, WriteFile, LoadLibraryW, LCMapStringW, MultiByteToWideChar, GetStringTypeW, OutputDebugStringA, WriteConsoleW, OutputDebugStringW, RaiseException, RtlPcToFileHeader, SetFilePointer, GetConsoleCP, GetConsoleMode, FlushFileBuffers
                                                                                                      USER32.dllMessageBoxA
                                                                                                      ole32.dllCoTaskMemFree, CoTaskMemAlloc, CoLoadLibrary
                                                                                                      NameOrdinalAddress
                                                                                                      AddIn_FileTime10x180001140
                                                                                                      AddIn_SystemTime20x1800010b0
                                                                                                      DllRegisterServer30x180003110
                                                                                                      Language of compilation systemCountry where language is spokenMap
                                                                                                      EnglishUnited States
                                                                                                      TimestampSource PortDest PortSource IPDest IP
                                                                                                      May 22, 2022 22:48:52.333376884 CEST497628080192.168.2.4173.82.82.196
                                                                                                      May 22, 2022 22:48:55.344686031 CEST497628080192.168.2.4173.82.82.196
                                                                                                      May 22, 2022 22:48:55.517919064 CEST808049762173.82.82.196192.168.2.4
                                                                                                      May 22, 2022 22:48:55.518003941 CEST497628080192.168.2.4173.82.82.196
                                                                                                      May 22, 2022 22:48:55.557230949 CEST497628080192.168.2.4173.82.82.196
                                                                                                      May 22, 2022 22:48:55.730329037 CEST808049762173.82.82.196192.168.2.4
                                                                                                      May 22, 2022 22:48:55.743906021 CEST808049762173.82.82.196192.168.2.4
                                                                                                      May 22, 2022 22:48:55.743937969 CEST808049762173.82.82.196192.168.2.4
                                                                                                      May 22, 2022 22:48:55.743994951 CEST497628080192.168.2.4173.82.82.196
                                                                                                      May 22, 2022 22:48:55.744019032 CEST497628080192.168.2.4173.82.82.196
                                                                                                      May 22, 2022 22:49:01.940469027 CEST497628080192.168.2.4173.82.82.196
                                                                                                      May 22, 2022 22:49:02.113751888 CEST808049762173.82.82.196192.168.2.4
                                                                                                      May 22, 2022 22:49:02.114525080 CEST808049762173.82.82.196192.168.2.4
                                                                                                      May 22, 2022 22:49:02.116019011 CEST497628080192.168.2.4173.82.82.196
                                                                                                      May 22, 2022 22:49:02.131129980 CEST497628080192.168.2.4173.82.82.196
                                                                                                      May 22, 2022 22:49:02.304414034 CEST808049762173.82.82.196192.168.2.4
                                                                                                      May 22, 2022 22:49:02.978549957 CEST808049762173.82.82.196192.168.2.4
                                                                                                      May 22, 2022 22:49:02.980065107 CEST497628080192.168.2.4173.82.82.196
                                                                                                      May 22, 2022 22:49:05.981497049 CEST808049762173.82.82.196192.168.2.4
                                                                                                      May 22, 2022 22:49:05.981561899 CEST497628080192.168.2.4173.82.82.196
                                                                                                      May 22, 2022 22:49:05.981631994 CEST808049762173.82.82.196192.168.2.4
                                                                                                      May 22, 2022 22:49:05.981753111 CEST497628080192.168.2.4173.82.82.196
                                                                                                      May 22, 2022 22:50:43.110599041 CEST497628080192.168.2.4173.82.82.196
                                                                                                      May 22, 2022 22:50:43.110629082 CEST497628080192.168.2.4173.82.82.196

                                                                                                      Click to jump to process

                                                                                                      Target ID:0
                                                                                                      Start time:22:48:22
                                                                                                      Start date:22/05/2022
                                                                                                      Path:C:\Windows\System32\loaddll64.exe
                                                                                                      Wow64 process (32bit):false
                                                                                                      Commandline:loaddll64.exe "C:\Users\user\Desktop\qJhkILqiEA.dll"
                                                                                                      Imagebase:0x7ff7e22b0000
                                                                                                      File size:140288 bytes
                                                                                                      MD5 hash:4E8A40CAD6CCC047914E3A7830A2D8AA
                                                                                                      Has elevated privileges:true
                                                                                                      Has administrator privileges:true
                                                                                                      Programmed in:C, C++ or other language
                                                                                                      Reputation:high

                                                                                                      Target ID:1
                                                                                                      Start time:22:48:23
                                                                                                      Start date:22/05/2022
                                                                                                      Path:C:\Windows\System32\cmd.exe
                                                                                                      Wow64 process (32bit):false
                                                                                                      Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\qJhkILqiEA.dll",#1
                                                                                                      Imagebase:0x7ff7bb450000
                                                                                                      File size:273920 bytes
                                                                                                      MD5 hash:4E2ACF4F8A396486AB4268C94A6A245F
                                                                                                      Has elevated privileges:true
                                                                                                      Has administrator privileges:true
                                                                                                      Programmed in:C, C++ or other language
                                                                                                      Reputation:high

                                                                                                      Target ID:2
                                                                                                      Start time:22:48:23
                                                                                                      Start date:22/05/2022
                                                                                                      Path:C:\Windows\System32\regsvr32.exe
                                                                                                      Wow64 process (32bit):false
                                                                                                      Commandline:regsvr32.exe /s C:\Users\user\Desktop\qJhkILqiEA.dll
                                                                                                      Imagebase:0x7ff659710000
                                                                                                      File size:24064 bytes
                                                                                                      MD5 hash:D78B75FC68247E8A63ACBA846182740E
                                                                                                      Has elevated privileges:true
                                                                                                      Has administrator privileges:true
                                                                                                      Programmed in:C, C++ or other language
                                                                                                      Yara matches:
                                                                                                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000002.00000002.248215300.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000002.00000002.248087583.0000000000750000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                                      Reputation:high

                                                                                                      Target ID:3
                                                                                                      Start time:22:48:23
                                                                                                      Start date:22/05/2022
                                                                                                      Path:C:\Windows\System32\rundll32.exe
                                                                                                      Wow64 process (32bit):false
                                                                                                      Commandline:rundll32.exe "C:\Users\user\Desktop\qJhkILqiEA.dll",#1
                                                                                                      Imagebase:0x7ff65fc10000
                                                                                                      File size:69632 bytes
                                                                                                      MD5 hash:73C519F050C20580F8A62C849D49215A
                                                                                                      Has elevated privileges:true
                                                                                                      Has administrator privileges:true
                                                                                                      Programmed in:C, C++ or other language
                                                                                                      Yara matches:
                                                                                                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000003.00000000.247075589.00000298CA850000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000003.00000002.327804102.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000003.00000000.245417474.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000003.00000002.327922020.00000298CA850000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000003.00000000.246778578.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000003.00000000.245495998.00000298CA850000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                                      Reputation:high

                                                                                                      Target ID:4
                                                                                                      Start time:22:48:23
                                                                                                      Start date:22/05/2022
                                                                                                      Path:C:\Windows\System32\rundll32.exe
                                                                                                      Wow64 process (32bit):false
                                                                                                      Commandline:rundll32.exe C:\Users\user\Desktop\qJhkILqiEA.dll,AddIn_FileTime
                                                                                                      Imagebase:0x7ff65fc10000
                                                                                                      File size:69632 bytes
                                                                                                      MD5 hash:73C519F050C20580F8A62C849D49215A
                                                                                                      Has elevated privileges:true
                                                                                                      Has administrator privileges:true
                                                                                                      Programmed in:C, C++ or other language
                                                                                                      Yara matches:
                                                                                                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000004.00000000.245516131.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000004.00000002.328180679.000001B300000000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000004.00000002.328137058.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000004.00000000.248564765.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000004.00000000.248656368.000001B300000000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000004.00000000.245618177.000001B300000000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                                      Reputation:high

                                                                                                      Target ID:7
                                                                                                      Start time:22:48:27
                                                                                                      Start date:22/05/2022
                                                                                                      Path:C:\Windows\System32\regsvr32.exe
                                                                                                      Wow64 process (32bit):false
                                                                                                      Commandline:C:\Windows\system32\regsvr32.exe "C:\Windows\system32\IxbPFgKevemZDIDo\xuHXDLB.dll"
                                                                                                      Imagebase:0x7ff659710000
                                                                                                      File size:24064 bytes
                                                                                                      MD5 hash:D78B75FC68247E8A63ACBA846182740E
                                                                                                      Has elevated privileges:true
                                                                                                      Has administrator privileges:true
                                                                                                      Programmed in:C, C++ or other language
                                                                                                      Yara matches:
                                                                                                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000007.00000002.646304136.0000000000A00000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                                      • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000007.00000002.648425079.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                                      Reputation:high

                                                                                                      Target ID:8
                                                                                                      Start time:22:48:27
                                                                                                      Start date:22/05/2022
                                                                                                      Path:C:\Windows\System32\rundll32.exe
                                                                                                      Wow64 process (32bit):false
                                                                                                      Commandline:rundll32.exe C:\Users\user\Desktop\qJhkILqiEA.dll,AddIn_SystemTime
                                                                                                      Imagebase:0x7ff65fc10000
                                                                                                      File size:69632 bytes
                                                                                                      MD5 hash:73C519F050C20580F8A62C849D49215A
                                                                                                      Has elevated privileges:true
                                                                                                      Has administrator privileges:true
                                                                                                      Programmed in:C, C++ or other language
                                                                                                      Reputation:high

                                                                                                      Target ID:9
                                                                                                      Start time:22:48:29
                                                                                                      Start date:22/05/2022
                                                                                                      Path:C:\Windows\System32\WerFault.exe
                                                                                                      Wow64 process (32bit):false
                                                                                                      Commandline:C:\Windows\system32\WerFault.exe -u -p 3180 -s 336
                                                                                                      Imagebase:0x7ff770e00000
                                                                                                      File size:494488 bytes
                                                                                                      MD5 hash:2AFFE478D86272288BBEF5A00BBEF6A0
                                                                                                      Has elevated privileges:true
                                                                                                      Has administrator privileges:true
                                                                                                      Programmed in:C, C++ or other language
                                                                                                      Reputation:high

                                                                                                      Target ID:10
                                                                                                      Start time:22:48:29
                                                                                                      Start date:22/05/2022
                                                                                                      Path:C:\Windows\System32\WerFault.exe
                                                                                                      Wow64 process (32bit):false
                                                                                                      Commandline:C:\Windows\system32\WerFault.exe -u -p 3088 -s 332
                                                                                                      Imagebase:0x7ff770e00000
                                                                                                      File size:494488 bytes
                                                                                                      MD5 hash:2AFFE478D86272288BBEF5A00BBEF6A0
                                                                                                      Has elevated privileges:true
                                                                                                      Has administrator privileges:true
                                                                                                      Programmed in:C, C++ or other language
                                                                                                      Reputation:high

                                                                                                      Target ID:11
                                                                                                      Start time:22:48:31
                                                                                                      Start date:22/05/2022
                                                                                                      Path:C:\Windows\System32\rundll32.exe
                                                                                                      Wow64 process (32bit):false
                                                                                                      Commandline:rundll32.exe C:\Users\user\Desktop\qJhkILqiEA.dll,DllRegisterServer
                                                                                                      Imagebase:0x7ff65fc10000
                                                                                                      File size:69632 bytes
                                                                                                      MD5 hash:73C519F050C20580F8A62C849D49215A
                                                                                                      Has elevated privileges:true
                                                                                                      Has administrator privileges:true
                                                                                                      Programmed in:C, C++ or other language
                                                                                                      Reputation:high

                                                                                                      Target ID:15
                                                                                                      Start time:22:48:46
                                                                                                      Start date:22/05/2022
                                                                                                      Path:C:\Windows\System32\svchost.exe
                                                                                                      Wow64 process (32bit):false
                                                                                                      Commandline:C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
                                                                                                      Imagebase:0x7ff7338d0000
                                                                                                      File size:51288 bytes
                                                                                                      MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                                                      Has elevated privileges:true
                                                                                                      Has administrator privileges:true
                                                                                                      Programmed in:C, C++ or other language
                                                                                                      Reputation:high

                                                                                                      Target ID:16
                                                                                                      Start time:22:48:46
                                                                                                      Start date:22/05/2022
                                                                                                      Path:C:\Windows\System32\svchost.exe
                                                                                                      Wow64 process (32bit):false
                                                                                                      Commandline:c:\windows\system32\svchost.exe -k localservice -p -s CDPSvc
                                                                                                      Imagebase:0x7ff7338d0000
                                                                                                      File size:51288 bytes
                                                                                                      MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                                                      Has elevated privileges:true
                                                                                                      Has administrator privileges:false
                                                                                                      Programmed in:C, C++ or other language

                                                                                                      Target ID:17
                                                                                                      Start time:22:48:47
                                                                                                      Start date:22/05/2022
                                                                                                      Path:C:\Windows\System32\svchost.exe
                                                                                                      Wow64 process (32bit):false
                                                                                                      Commandline:c:\windows\system32\svchost.exe -k networkservice -p -s DoSvc
                                                                                                      Imagebase:0x7ff7338d0000
                                                                                                      File size:51288 bytes
                                                                                                      MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                                                      Has elevated privileges:true
                                                                                                      Has administrator privileges:false
                                                                                                      Programmed in:C, C++ or other language

                                                                                                      Target ID:18
                                                                                                      Start time:22:48:48
                                                                                                      Start date:22/05/2022
                                                                                                      Path:C:\Windows\System32\svchost.exe
                                                                                                      Wow64 process (32bit):false
                                                                                                      Commandline:C:\Windows\System32\svchost.exe -k NetworkService -p
                                                                                                      Imagebase:0x7ff7338d0000
                                                                                                      File size:51288 bytes
                                                                                                      MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                                                      Has elevated privileges:true
                                                                                                      Has administrator privileges:false
                                                                                                      Programmed in:C, C++ or other language

                                                                                                      Target ID:19
                                                                                                      Start time:22:48:49
                                                                                                      Start date:22/05/2022
                                                                                                      Path:C:\Windows\System32\SgrmBroker.exe
                                                                                                      Wow64 process (32bit):false
                                                                                                      Commandline:C:\Windows\system32\SgrmBroker.exe
                                                                                                      Imagebase:0x7ff6353b0000
                                                                                                      File size:163336 bytes
                                                                                                      MD5 hash:D3170A3F3A9626597EEE1888686E3EA6
                                                                                                      Has elevated privileges:true
                                                                                                      Has administrator privileges:true
                                                                                                      Programmed in:C, C++ or other language

                                                                                                      Target ID:20
                                                                                                      Start time:22:48:49
                                                                                                      Start date:22/05/2022
                                                                                                      Path:C:\Windows\System32\svchost.exe
                                                                                                      Wow64 process (32bit):false
                                                                                                      Commandline:c:\windows\system32\svchost.exe -k localservicenetworkrestricted -p -s wscsvc
                                                                                                      Imagebase:0x7ff7338d0000
                                                                                                      File size:51288 bytes
                                                                                                      MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                                                      Has elevated privileges:true
                                                                                                      Has administrator privileges:false
                                                                                                      Programmed in:C, C++ or other language

                                                                                                      Target ID:21
                                                                                                      Start time:22:48:50
                                                                                                      Start date:22/05/2022
                                                                                                      Path:C:\Windows\System32\svchost.exe
                                                                                                      Wow64 process (32bit):false
                                                                                                      Commandline:c:\windows\system32\svchost.exe -k unistacksvcgroup
                                                                                                      Imagebase:0x7ff7338d0000
                                                                                                      File size:51288 bytes
                                                                                                      MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                                                      Has elevated privileges:true
                                                                                                      Has administrator privileges:true
                                                                                                      Programmed in:C, C++ or other language

                                                                                                      Target ID:22
                                                                                                      Start time:22:48:55
                                                                                                      Start date:22/05/2022
                                                                                                      Path:C:\Windows\System32\svchost.exe
                                                                                                      Wow64 process (32bit):false
                                                                                                      Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p
                                                                                                      Imagebase:0x7ff7338d0000
                                                                                                      File size:51288 bytes
                                                                                                      MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                                                      Has elevated privileges:true
                                                                                                      Has administrator privileges:true
                                                                                                      Programmed in:C, C++ or other language

                                                                                                      Target ID:23
                                                                                                      Start time:22:49:00
                                                                                                      Start date:22/05/2022
                                                                                                      Path:C:\Windows\System32\svchost.exe
                                                                                                      Wow64 process (32bit):false
                                                                                                      Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
                                                                                                      Imagebase:0x7ff7338d0000
                                                                                                      File size:51288 bytes
                                                                                                      MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                                                      Has elevated privileges:true
                                                                                                      Has administrator privileges:true
                                                                                                      Programmed in:C, C++ or other language

                                                                                                      Target ID:25
                                                                                                      Start time:22:49:33
                                                                                                      Start date:22/05/2022
                                                                                                      Path:C:\Windows\System32\svchost.exe
                                                                                                      Wow64 process (32bit):false
                                                                                                      Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p
                                                                                                      Imagebase:0x7ff7338d0000
                                                                                                      File size:51288 bytes
                                                                                                      MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                                                      Has elevated privileges:true
                                                                                                      Has administrator privileges:true
                                                                                                      Programmed in:C, C++ or other language

                                                                                                      Target ID:28
                                                                                                      Start time:22:49:50
                                                                                                      Start date:22/05/2022
                                                                                                      Path:C:\Program Files\Windows Defender\MpCmdRun.exe
                                                                                                      Wow64 process (32bit):false
                                                                                                      Commandline:"C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable
                                                                                                      Imagebase:0x7ff678970000
                                                                                                      File size:455656 bytes
                                                                                                      MD5 hash:A267555174BFA53844371226F482B86B
                                                                                                      Has elevated privileges:true
                                                                                                      Has administrator privileges:false
                                                                                                      Programmed in:C, C++ or other language

                                                                                                      Target ID:29
                                                                                                      Start time:22:49:51
                                                                                                      Start date:22/05/2022
                                                                                                      Path:C:\Windows\System32\conhost.exe
                                                                                                      Wow64 process (32bit):false
                                                                                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                      Imagebase:0x7ff647620000
                                                                                                      File size:625664 bytes
                                                                                                      MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                                                      Has elevated privileges:true
                                                                                                      Has administrator privileges:false
                                                                                                      Programmed in:C, C++ or other language

                                                                                                      Target ID:31
                                                                                                      Start time:22:49:55
                                                                                                      Start date:22/05/2022
                                                                                                      Path:C:\Windows\System32\svchost.exe
                                                                                                      Wow64 process (32bit):false
                                                                                                      Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p
                                                                                                      Imagebase:0x7ff7338d0000
                                                                                                      File size:51288 bytes
                                                                                                      MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                                                      Has elevated privileges:true
                                                                                                      Has administrator privileges:true
                                                                                                      Programmed in:C, C++ or other language

                                                                                                      Target ID:33
                                                                                                      Start time:22:50:11
                                                                                                      Start date:22/05/2022
                                                                                                      Path:C:\Windows\System32\svchost.exe
                                                                                                      Wow64 process (32bit):false
                                                                                                      Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p
                                                                                                      Imagebase:0x7ff7338d0000
                                                                                                      File size:51288 bytes
                                                                                                      MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                                                      Has elevated privileges:true
                                                                                                      Has administrator privileges:true
                                                                                                      Programmed in:C, C++ or other language

                                                                                                      No disassembly