Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
nZNmWqwnpr.dll

Overview

General Information

Sample Name:nZNmWqwnpr.dll
Analysis ID:631910
MD5:828a9b1007dc45671d8a58e240c7c973
SHA1:8214993bb314d0f4c1889e507f88beeb3f6e5b63
SHA256:b59f16ee5e524814316a8be8ef54ea02f9a496267555e65eeb585e4ade85ffec
Tags:exetrojan
Infos:

Detection

Emotet
Score:76
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Yara detected Emotet
System process connects to network (likely due to code injection or exploit)
Changes security center settings (notifications, updates, antivirus, firewall)
Machine Learning detection for sample
Hides that the sample has been downloaded from the Internet (zone.identifier)
Queries the volume information (name, serial number etc) of a device
One or more processes crash
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Deletes files inside the Windows folder
May sleep (evasive loops) to hinder dynamic analysis
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Uses code obfuscation techniques (call, push, ret)
Creates files inside the system directory
Internet Provider seen in connection with other malware
Detected potential crypto function
Found potential string decryption / allocating functions
Sample execution stops while process was sleeping (likely an evasion)
Found evasive API chain (may stop execution after checking a module file name)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to dynamically determine API calls
IP address seen in connection with other malware
AV process strings found (often used to terminate AV products)
PE file contains an invalid checksum
Tries to load missing DLLs
Drops PE files to the windows directory (C:\Windows)
Detected TCP or UDP traffic on non-standard ports
Checks if the current process is being debugged
Registers a DLL
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Queries disk information (often used to detect virtual machines)
Found large amount of non-executed APIs
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • loaddll64.exe (PID: 6300 cmdline: loaddll64.exe "C:\Users\user\Desktop\nZNmWqwnpr.dll" MD5: 4E8A40CAD6CCC047914E3A7830A2D8AA)
    • cmd.exe (PID: 6308 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\nZNmWqwnpr.dll",#1 MD5: 4E2ACF4F8A396486AB4268C94A6A245F)
      • rundll32.exe (PID: 6392 cmdline: rundll32.exe "C:\Users\user\Desktop\nZNmWqwnpr.dll",#1 MD5: 73C519F050C20580F8A62C849D49215A)
        • WerFault.exe (PID: 6560 cmdline: C:\Windows\system32\WerFault.exe -u -p 6392 -s 324 MD5: 2AFFE478D86272288BBEF5A00BBEF6A0)
    • regsvr32.exe (PID: 6352 cmdline: regsvr32.exe /s C:\Users\user\Desktop\nZNmWqwnpr.dll MD5: D78B75FC68247E8A63ACBA846182740E)
      • regsvr32.exe (PID: 6508 cmdline: C:\Windows\system32\regsvr32.exe "C:\Windows\system32\NhxQyxUKKifP\KOsPrJ.dll" MD5: D78B75FC68247E8A63ACBA846182740E)
    • rundll32.exe (PID: 6400 cmdline: rundll32.exe C:\Users\user\Desktop\nZNmWqwnpr.dll,AddIn_FileTime MD5: 73C519F050C20580F8A62C849D49215A)
      • WerFault.exe (PID: 6580 cmdline: C:\Windows\system32\WerFault.exe -u -p 6400 -s 316 MD5: 2AFFE478D86272288BBEF5A00BBEF6A0)
    • rundll32.exe (PID: 6472 cmdline: rundll32.exe C:\Users\user\Desktop\nZNmWqwnpr.dll,AddIn_SystemTime MD5: 73C519F050C20580F8A62C849D49215A)
    • rundll32.exe (PID: 6600 cmdline: rundll32.exe C:\Users\user\Desktop\nZNmWqwnpr.dll,DllRegisterServer MD5: 73C519F050C20580F8A62C849D49215A)
  • svchost.exe (PID: 6732 cmdline: C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 6816 cmdline: c:\windows\system32\svchost.exe -k localservice -p -s CDPSvc MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 6880 cmdline: c:\windows\system32\svchost.exe -k networkservice -p -s DoSvc MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 6968 cmdline: C:\Windows\System32\svchost.exe -k NetworkService -p MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • SgrmBroker.exe (PID: 7068 cmdline: C:\Windows\system32\SgrmBroker.exe MD5: D3170A3F3A9626597EEE1888686E3EA6)
  • svchost.exe (PID: 7112 cmdline: c:\windows\system32\svchost.exe -k localservicenetworkrestricted -p -s wscsvc MD5: 32569E403279B3FD2EDB7EBD036273FA)
    • MpCmdRun.exe (PID: 7036 cmdline: "C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable MD5: A267555174BFA53844371226F482B86B)
      • conhost.exe (PID: 4780 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • svchost.exe (PID: 1272 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 6452 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 6764 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 4116 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 3876 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000004.00000000.271421970.00000171DB6C0000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
    00000008.00000002.653751676.00000000001D0000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
      00000003.00000002.282755590.0000000180001000.00000020.00001000.00020000.00000000.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
        00000004.00000000.271026048.0000000180001000.00000020.00001000.00020000.00000000.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
          00000003.00000000.268708020.0000000180001000.00000020.00001000.00020000.00000000.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
            Click to see the 11 entries
            SourceRuleDescriptionAuthorStrings
            3.0.rundll32.exe.18d2a510000.0.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
              4.0.rundll32.exe.171db6c0000.2.raw.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
                2.2.regsvr32.exe.e70000.0.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
                  2.2.regsvr32.exe.e70000.0.raw.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
                    8.2.regsvr32.exe.1d0000.0.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
                      Click to see the 11 entries
                      No Sigma rule has matched
                      No Snort rule has matched

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection

                      barindex
                      Source: nZNmWqwnpr.dllVirustotal: Detection: 49%Perma Link
                      Source: nZNmWqwnpr.dllReversingLabs: Detection: 58%
                      Source: nZNmWqwnpr.dllJoe Sandbox ML: detected
                      Source: nZNmWqwnpr.dllStatic PE information: DYNAMIC_BASE, NX_COMPAT
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_000000018000BEF0 FindFirstFileW,FindNextFileW,FindClose,

                      Networking

                      barindex
                      Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 165.22.73.229 8080
                      Source: Joe Sandbox ViewASN Name: DIGITALOCEAN-ASNUS DIGITALOCEAN-ASNUS
                      Source: Joe Sandbox ViewIP Address: 165.22.73.229 165.22.73.229
                      Source: global trafficTCP traffic: 192.168.2.3:49751 -> 165.22.73.229:8080
                      Source: unknownTCP traffic detected without corresponding DNS query: 165.22.73.229
                      Source: unknownTCP traffic detected without corresponding DNS query: 165.22.73.229
                      Source: unknownTCP traffic detected without corresponding DNS query: 165.22.73.229
                      Source: unknownTCP traffic detected without corresponding DNS query: 165.22.73.229
                      Source: unknownTCP traffic detected without corresponding DNS query: 165.22.73.229
                      Source: unknownTCP traffic detected without corresponding DNS query: 165.22.73.229
                      Source: unknownTCP traffic detected without corresponding DNS query: 165.22.73.229
                      Source: unknownTCP traffic detected without corresponding DNS query: 165.22.73.229
                      Source: unknownTCP traffic detected without corresponding DNS query: 165.22.73.229
                      Source: unknownTCP traffic detected without corresponding DNS query: 165.22.73.229
                      Source: unknownTCP traffic detected without corresponding DNS query: 165.22.73.229
                      Source: svchost.exe, 00000020.00000003.509982205.000001FF80F6E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Try it free for 30 days, no strings attached\r\n\r\nLike us on Facebook: http://www.facebook.com/spotify \r\nFollow us on Twitter: http://twitter.com/spotify","ProductTitle":"Spotify - Music and Podcasts","SearchTitles":[{"SearchTitleString":"Spotify","SearchTitleType":"SearchHint"},{"SearchTitleString":"Music","SearchTitleType":"SearchHint"},{"SearchTitleString":"music apps","SearchTitleType":"SearchHint"},{"SearchTitleString":"free music","SearchTitleType":"SearchHint"},{"SearchTitleString":"podcasts","SearchTitleType":"SearchHint"},{"SearchTitleString":"streaming","SearchTitleType":"SearchHint"},{"SearchTitleString":"soundcloud","SearchTitleType":"SearchHint"}],"Language":"en-us","Markets":["US","DZ","AR","AU","AT","BH","BD","BE","BR","BG","CA","CL","CN","CO","CR","HR","CY","CZ","DK","EG","EE","FI","FR","DE","GR","GT","HK","HU","IS","IN","ID","IQ","IE","IL","IT","JP","JO","KZ","KE","KW","LV","LB","LI","LT","LU","MY","MT","MR","MX","MA","NL","NZ","NG","NO","OM","PK","PE","PH","PL","PT","QA","RO","RU","SA","RS","SG","SK","SI","ZA","KR","ES","SE","CH","TW","TH","TT","TN","TR","UA","AE","GB","VN","YE","LY","LK","UY","VE","AF","AX","AL","AS","AO","AI","AQ","AG","AM","AW","BO","BQ","BA","BW","BV","IO","BN","BF","BI","KH","CM","CV","KY","CF","TD","TL","DJ","DM","DO","EC","SV","GQ","ER","ET","FK","FO","FJ","GF","PF","TF","GA","GM","GE","GH","GI","GL","GD","GP","GU","GG","GN","GW","GY","HT","HM","HN","AZ","BS","BB","BY","BZ","BJ","BM","BT","KM","CG","CD","CK","CX","CC","CI","CW","JM","SJ","JE","KI","KG","LA","LS","LR","MO","MK","MG","MW","IM","MH","MQ","MU","YT","FM","MD","MN","MS","MZ","MM","NA","NR","NP","MV","ML","NC","NI","NE","NU","NF","PW","PS","PA","PG","PY","RE","RW","BL","MF","WS","ST","SN","MP","PN","SX","SB","SO","SC","SL","GS","SH","KN","LC","PM","VC","TJ","TZ","TG","TK","TO","TM","TC","TV","UM","UG", equals www.facebook.com (Facebook)
                      Source: svchost.exe, 00000020.00000003.509982205.000001FF80F6E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Try it free for 30 days, no strings attached\r\n\r\nLike us on Facebook: http://www.facebook.com/spotify \r\nFollow us on Twitter: http://twitter.com/spotify","ProductTitle":"Spotify - Music and Podcasts","SearchTitles":[{"SearchTitleString":"Spotify","SearchTitleType":"SearchHint"},{"SearchTitleString":"Music","SearchTitleType":"SearchHint"},{"SearchTitleString":"music apps","SearchTitleType":"SearchHint"},{"SearchTitleString":"free music","SearchTitleType":"SearchHint"},{"SearchTitleString":"podcasts","SearchTitleType":"SearchHint"},{"SearchTitleString":"streaming","SearchTitleType":"SearchHint"},{"SearchTitleString":"soundcloud","SearchTitleType":"SearchHint"}],"Language":"en-us","Markets":["US","DZ","AR","AU","AT","BH","BD","BE","BR","BG","CA","CL","CN","CO","CR","HR","CY","CZ","DK","EG","EE","FI","FR","DE","GR","GT","HK","HU","IS","IN","ID","IQ","IE","IL","IT","JP","JO","KZ","KE","KW","LV","LB","LI","LT","LU","MY","MT","MR","MX","MA","NL","NZ","NG","NO","OM","PK","PE","PH","PL","PT","QA","RO","RU","SA","RS","SG","SK","SI","ZA","KR","ES","SE","CH","TW","TH","TT","TN","TR","UA","AE","GB","VN","YE","LY","LK","UY","VE","AF","AX","AL","AS","AO","AI","AQ","AG","AM","AW","BO","BQ","BA","BW","BV","IO","BN","BF","BI","KH","CM","CV","KY","CF","TD","TL","DJ","DM","DO","EC","SV","GQ","ER","ET","FK","FO","FJ","GF","PF","TF","GA","GM","GE","GH","GI","GL","GD","GP","GU","GG","GN","GW","GY","HT","HM","HN","AZ","BS","BB","BY","BZ","BJ","BM","BT","KM","CG","CD","CK","CX","CC","CI","CW","JM","SJ","JE","KI","KG","LA","LS","LR","MO","MK","MG","MW","IM","MH","MQ","MU","YT","FM","MD","MN","MS","MZ","MM","NA","NR","NP","MV","ML","NC","NI","NE","NU","NF","PW","PS","PA","PG","PY","RE","RW","BL","MF","WS","ST","SN","MP","PN","SX","SB","SO","SC","SL","GS","SH","KN","LC","PM","VC","TJ","TZ","TG","TK","TO","TM","TC","TV","UM","UG", equals www.twitter.com (Twitter)
                      Source: svchost.exe, 00000020.00000003.510029738.000001FF80F7F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000020.00000003.509982205.000001FF80F6E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Try it free for 30 days, no strings attached\r\n\r\nLike us on Facebook: http://www.facebook.com/spotify \r\nFollow us on Twitter: http://twitter.com/spotify","ProductTitle":"Spotify - Music and Podcasts","SearchTitles":[{"SearchTitleString":"Spotify","SearchTitleType":"SearchHint"},{"SearchTitleString":"Music","SearchTitleType":"SearchHint"},{"SearchTitleString":"music apps","SearchTitleType":"SearchHint"},{"SearchTitleString":"free music","SearchTitleType":"SearchHint"},{"SearchTitleString":"podcasts","SearchTitleType":"SearchHint"},{"SearchTitleString":"streaming","SearchTitleType":"SearchHint"},{"SearchTitleString":"soundcloud","SearchTitleType":"SearchHint"}],"Language":"en-us","Markets":["US","DZ","AR","AU","AT","BH","BD","BE","BR","BG","CA","CL","CN","CO","CR","HR","CY","CZ","DK","EG","EE","FI","FR","DE","GR","GT","HK","HU","IS","IN","ID","IQ","IE","IL","IT","JP","JO","KZ","KE","KW","LV","LB","LI","LT","LU","MY","MT","MR","MX","MA","NL","NZ","NG","NO","OM","PK","PE","PH","PL","PT","QA","RO","RU","SA","RS","SG","SK","SI","ZA","KR","ES","SE","CH","TW","TH","TT","TN","TR","UA","AE","GB","VN","YE","LY","LK","UY","VE","AF","AX","AL","AS","AO","AI","AQ","AG","AM","AW","BO","BQ","BA","BW","BV","IO","BN","BF","BI","KH","CM","CV","KY","CF","TD","TL","DJ","DM","DO","EC","SV","GQ","ER","ET","FK","FO","FJ","GF","PF","TF","GA","GM","GE","GH","GI","GL","GD","GP","GU","GG","GN","GW","GY","HT","HM","HN","AZ","BS","BB","BY","BZ","BJ","BM","BT","KM","CG","CD","CK","CX","CC","CI","CW","JM","SJ","JE","KI","KG","LA","LS","LR","MO","MK","MG","MW","IM","MH","MQ","MU","YT","FM","MD","MN","MS","MZ","MM","NA","NR","NP","MV","ML","NC","NI","NE","NU","NF","PW","PS","PA","PG","PY","RE","RW","BL","MF","WS","ST","SN","MP","PN","SX","SB","SO","SC","SL","GS","SH","KN","LC","PM","VC","TJ","TZ","TG","TK","TO","TM","TC","TV","UM","UG","VI","VG","WF","EH","ZM","ZW","UZ","VU","SR","SZ","AD","MC","SM","ME","VA","NEUTRAL"]}],"MarketProperties":[{"RelatedProducts":[],"Markets":["US"]}],"ProductASchema":"Product;3","ProductBSchema":"ProductUnifiedApp;3","ProductId":"9NCBCSZSJRSB","Properties":{"PackageFamilyName":"SpotifyAB.SpotifyMusic_zpdnekdrzrea0","PackageIdentityName":"SpotifyAB.SpotifyMusic","PublisherCertificateName":"CN=453637B3-4E12-4CDF-B0D3-2A3C863BF6EF","XboxCrossGenSetId":null,"XboxConsoleGenOptimized":null,"XboxConsoleGenCompatible":null},"AlternateIds":[{"IdType":"LegacyWindowsStoreProductId","Value":"ceac5d3f-8a4f-40e1-9a67-76d9108c7cb5"},{"IdType":"LegacyWindowsPhoneProductId","Value":"caac1b9d-621b-4f96-b143-e10e1397740a"},{"IdType":"XboxTitleId","Value":"1681279293"}],"IngestionSource":"DCE","IsMicrosoftProduct":false,"PreferredSkuId":"0010","ProductType":"Application","ValidationData":{"PassedValidation":false,"RevisionId":"2022-05-13T10:00:01.2192622Z||.||8adb3f26-c14b-4fc0-afb3-91b3c6daaa3f||1152921505694830749||Null||fullrelease","ValidationResultUri":""},"MerchandizingTags":[],"PartD":"","ProductFamily":"Apps","ProductKind":"Application","DisplaySkuAvailab
                      Source: svchost.exe, 00000020.00000003.510029738.000001FF80F7F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000020.00000003.509982205.000001FF80F6E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Try it free for 30 days, no strings attached\r\n\r\nLike us on Facebook: http://www.facebook.com/spotify \r\nFollow us on Twitter: http://twitter.com/spotify","ProductTitle":"Spotify - Music and Podcasts","SearchTitles":[{"SearchTitleString":"Spotify","SearchTitleType":"SearchHint"},{"SearchTitleString":"Music","SearchTitleType":"SearchHint"},{"SearchTitleString":"music apps","SearchTitleType":"SearchHint"},{"SearchTitleString":"free music","SearchTitleType":"SearchHint"},{"SearchTitleString":"podcasts","SearchTitleType":"SearchHint"},{"SearchTitleString":"streaming","SearchTitleType":"SearchHint"},{"SearchTitleString":"soundcloud","SearchTitleType":"SearchHint"}],"Language":"en-us","Markets":["US","DZ","AR","AU","AT","BH","BD","BE","BR","BG","CA","CL","CN","CO","CR","HR","CY","CZ","DK","EG","EE","FI","FR","DE","GR","GT","HK","HU","IS","IN","ID","IQ","IE","IL","IT","JP","JO","KZ","KE","KW","LV","LB","LI","LT","LU","MY","MT","MR","MX","MA","NL","NZ","NG","NO","OM","PK","PE","PH","PL","PT","QA","RO","RU","SA","RS","SG","SK","SI","ZA","KR","ES","SE","CH","TW","TH","TT","TN","TR","UA","AE","GB","VN","YE","LY","LK","UY","VE","AF","AX","AL","AS","AO","AI","AQ","AG","AM","AW","BO","BQ","BA","BW","BV","IO","BN","BF","BI","KH","CM","CV","KY","CF","TD","TL","DJ","DM","DO","EC","SV","GQ","ER","ET","FK","FO","FJ","GF","PF","TF","GA","GM","GE","GH","GI","GL","GD","GP","GU","GG","GN","GW","GY","HT","HM","HN","AZ","BS","BB","BY","BZ","BJ","BM","BT","KM","CG","CD","CK","CX","CC","CI","CW","JM","SJ","JE","KI","KG","LA","LS","LR","MO","MK","MG","MW","IM","MH","MQ","MU","YT","FM","MD","MN","MS","MZ","MM","NA","NR","NP","MV","ML","NC","NI","NE","NU","NF","PW","PS","PA","PG","PY","RE","RW","BL","MF","WS","ST","SN","MP","PN","SX","SB","SO","SC","SL","GS","SH","KN","LC","PM","VC","TJ","TZ","TG","TK","TO","TM","TC","TV","UM","UG","VI","VG","WF","EH","ZM","ZW","UZ","VU","SR","SZ","AD","MC","SM","ME","VA","NEUTRAL"]}],"MarketProperties":[{"RelatedProducts":[],"Markets":["US"]}],"ProductASchema":"Product;3","ProductBSchema":"ProductUnifiedApp;3","ProductId":"9NCBCSZSJRSB","Properties":{"PackageFamilyName":"SpotifyAB.SpotifyMusic_zpdnekdrzrea0","PackageIdentityName":"SpotifyAB.SpotifyMusic","PublisherCertificateName":"CN=453637B3-4E12-4CDF-B0D3-2A3C863BF6EF","XboxCrossGenSetId":null,"XboxConsoleGenOptimized":null,"XboxConsoleGenCompatible":null},"AlternateIds":[{"IdType":"LegacyWindowsStoreProductId","Value":"ceac5d3f-8a4f-40e1-9a67-76d9108c7cb5"},{"IdType":"LegacyWindowsPhoneProductId","Value":"caac1b9d-621b-4f96-b143-e10e1397740a"},{"IdType":"XboxTitleId","Value":"1681279293"}],"IngestionSource":"DCE","IsMicrosoftProduct":false,"PreferredSkuId":"0010","ProductType":"Application","ValidationData":{"PassedValidation":false,"RevisionId":"2022-05-13T10:00:01.2192622Z||.||8adb3f26-c14b-4fc0-afb3-91b3c6daaa3f||1152921505694830749||Null||fullrelease","ValidationResultUri":""},"MerchandizingTags":[],"PartD":"","ProductFamily":"Apps","ProductKind":"Application","DisplaySkuAvailab
                      Source: regsvr32.exe, 00000008.00000002.654119238.00000000004AC000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000008.00000003.565798377.00000000004AC000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000015.00000002.610706854.000001DA9E4A1000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000020.00000002.554673280.000001FF80F0A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000020.00000003.544505047.000001FF80F09000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
                      Source: svchost.exe, 00000015.00000002.610138718.000001DA9E410000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000020.00000002.554627754.000001FF806ED000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.ver)
                      Source: regsvr32.exe, 00000008.00000002.654024138.0000000000462000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000008.00000003.565988681.0000000000462000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en
                      Source: regsvr32.exe, 00000008.00000002.654487347.000000000273D000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000008.00000003.339122017.00000000026D1000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000008.00000003.339444913.000000000273D000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000008.00000003.339325812.0000000002717000.00000004.00000020.00020000.00000000.sdmp, 77EC63BDA74BD0D0E0426DC8F80085060.8.drString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
                      Source: regsvr32.exe, 00000008.00000002.654119238.00000000004AC000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000008.00000003.565798377.00000000004AC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab?8177667e4dd56
                      Source: regsvr32.exe, 00000008.00000002.654119238.00000000004AC000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000008.00000003.565798377.00000000004AC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cabu
                      Source: svchost.exe, 00000020.00000003.532848367.000001FF80F8A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000020.00000003.532652412.000001FF80F9C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://help.disneyplus.com.
                      Source: svchost.exe, 00000010.00000002.323590455.00000227CCC13000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.bingmapsportal.com
                      Source: svchost.exe, 0000000D.00000002.654018460.00000215BEC3E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://%s.dnet.xboxlive.com
                      Source: svchost.exe, 0000000D.00000002.654018460.00000215BEC3E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://%s.xboxlive.com
                      Source: regsvr32.exe, 00000008.00000003.565919718.0000000000451000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000008.00000002.653981531.0000000000451000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://165.22.73.229/eF
                      Source: regsvr32.exe, 00000008.00000003.565919718.0000000000451000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000008.00000002.653981531.0000000000451000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://165.22.73.229/iF
                      Source: regsvr32.exe, 00000008.00000003.565919718.0000000000451000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000008.00000002.654024138.0000000000462000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000008.00000003.565988681.0000000000462000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000008.00000002.653981531.0000000000451000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://165.22.73.229:8080/
                      Source: regsvr32.exe, 00000008.00000002.654024138.0000000000462000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000008.00000003.565988681.0000000000462000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://165.22.73.229:8080/Kr#
                      Source: regsvr32.exe, 00000008.00000003.565919718.0000000000451000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000008.00000002.653981531.0000000000451000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://165.22.73.229:8080/MF
                      Source: regsvr32.exe, 00000008.00000002.654024138.0000000000462000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000008.00000003.565988681.0000000000462000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://165.22.73.229:8080/tem
                      Source: svchost.exe, 0000000D.00000002.654018460.00000215BEC3E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://activity.windows.com
                      Source: svchost.exe, 00000010.00000003.323232135.00000227CCC61000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://appexmapsappupdate.blob.core.windows.net
                      Source: svchost.exe, 0000000D.00000002.654018460.00000215BEC3E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bn2.notify.windows.com/v2/register/xplatform/device
                      Source: svchost.exe, 0000000D.00000002.654018460.00000215BEC3E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://co4-df.notify.windows.com/v2/register/xplatform/device
                      Source: svchost.exe, 00000010.00000003.323254775.00000227CCC49000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.ditu.live.com/REST/v1/Imagery/Copyright/
                      Source: svchost.exe, 00000010.00000003.323254775.00000227CCC49000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000010.00000002.323671703.00000227CCC4B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.ditu.live.com/REST/v1/JsonFilter/VenueMaps/data/
                      Source: svchost.exe, 00000010.00000003.323232135.00000227CCC61000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.ditu.live.com/REST/v1/Locations
                      Source: svchost.exe, 00000010.00000002.323659479.00000227CCC3D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.ditu.live.com/REST/v1/Routes/
                      Source: svchost.exe, 00000010.00000003.323254775.00000227CCC49000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000010.00000002.323671703.00000227CCC4B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.ditu.live.com/REST/v1/Traffic/Incidents/
                      Source: svchost.exe, 00000010.00000002.323731651.00000227CCC6A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000010.00000003.323195739.00000227CCC68000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.ditu.live.com/REST/v1/Transit/Stops/
                      Source: svchost.exe, 00000010.00000003.323232135.00000227CCC61000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.ditu.live.com/mapcontrol/logging.ashx
                      Source: svchost.exe, 00000010.00000003.323254775.00000227CCC49000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000010.00000002.323671703.00000227CCC4B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/JsonFilter/VenueMaps/data/
                      Source: svchost.exe, 00000010.00000003.323232135.00000227CCC61000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Locations
                      Source: svchost.exe, 00000010.00000002.323659479.00000227CCC3D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Routes/
                      Source: svchost.exe, 00000010.00000003.323232135.00000227CCC61000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Routes/Driving
                      Source: svchost.exe, 00000010.00000003.323232135.00000227CCC61000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Routes/Transit
                      Source: svchost.exe, 00000010.00000003.323232135.00000227CCC61000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Routes/Walking
                      Source: svchost.exe, 00000010.00000003.301520318.00000227CCC30000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Traffic/Incidents/
                      Source: svchost.exe, 00000010.00000003.323271051.00000227CCC40000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000010.00000002.323664169.00000227CCC42000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000010.00000003.323302409.00000227CCC41000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Transit/Schedules/
                      Source: svchost.exe, 00000010.00000003.323271051.00000227CCC40000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000010.00000002.323664169.00000227CCC42000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000010.00000003.323302409.00000227CCC41000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/mapcontrol/HumanScaleServices/GetBubbles.ashx?n=
                      Source: svchost.exe, 00000010.00000003.323232135.00000227CCC61000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/mapcontrol/logging.ashx
                      Source: svchost.exe, 00000010.00000003.323271051.00000227CCC40000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000010.00000003.323254775.00000227CCC49000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000010.00000002.323671703.00000227CCC4B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/webservices/v1/LoggingService/LoggingService.svc/Log?
                      Source: svchost.exe, 00000020.00000003.532848367.000001FF80F8A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000020.00000003.532652412.000001FF80F9C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://disneyplus.com/legal.
                      Source: svchost.exe, 00000010.00000003.323254775.00000227CCC49000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dynamic.api.tiles.ditu.live.com/odvs/gd?pv=1&r=
                      Source: svchost.exe, 00000010.00000002.323671703.00000227CCC4B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dynamic.api.tiles.ditu.live.com/odvs/gdi?pv=1&r=
                      Source: svchost.exe, 00000010.00000003.323254775.00000227CCC49000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000010.00000002.323671703.00000227CCC4B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dynamic.api.tiles.ditu.live.com/odvs/gdv?pv=1&r=
                      Source: svchost.exe, 00000010.00000002.323708162.00000227CCC65000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dynamic.t
                      Source: svchost.exe, 00000010.00000003.323232135.00000227CCC61000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dynamic.t0.tiles.ditu.live.com/comp/gen.ashx
                      Source: svchost.exe, 00000010.00000002.323659479.00000227CCC3D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ecn.dev.virtualearth.net/REST/v1/Imagery/Copyright/
                      Source: svchost.exe, 00000010.00000003.301520318.00000227CCC30000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ecn.dev.virtualearth.net/mapcontrol/mapconfiguration.ashx?name=native&v=
                      Source: svchost.exe, 00000020.00000003.528104171.000001FF80F8E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000020.00000003.528134790.000001FF80FB0000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000020.00000003.528153865.000001FF81402000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000020.00000003.528121355.000001FF80FA0000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000020.00000003.528209927.000001FF80FB0000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000020.00000003.528175512.000001FF81403000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000020.00000003.528232054.000001FF81419000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://support.hotspotshield.com/
                      Source: svchost.exe, 00000010.00000002.323659479.00000227CCC3D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/comp/gen.ashx
                      Source: svchost.exe, 00000010.00000002.323659479.00000227CCC3D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000010.00000002.323590455.00000227CCC13000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gd?pv=1&r=
                      Source: svchost.exe, 00000010.00000003.301520318.00000227CCC30000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdi?pv=1&r=
                      Source: svchost.exe, 00000010.00000003.323271051.00000227CCC40000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000010.00000003.323294055.00000227CCC45000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdv?pv=1&r=
                      Source: svchost.exe, 00000010.00000003.301520318.00000227CCC30000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gri?pv=1&r=
                      Source: svchost.exe, 00000010.00000002.323655765.00000227CCC39000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000010.00000003.301520318.00000227CCC30000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t0.ssl.ak.tiles.virtualearth.net/tiles/gen
                      Source: svchost.exe, 00000010.00000003.323244324.00000227CCC4E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000010.00000003.323344021.00000227CCC50000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000010.00000002.323685818.00000227CCC56000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t0.tiles.ditu.live.com/tiles/gen
                      Source: svchost.exe, 00000020.00000003.532848367.000001FF80F8A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000020.00000003.532652412.000001FF80F9C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.disneyplus.com/legal/privacy-policy
                      Source: svchost.exe, 00000020.00000003.532848367.000001FF80F8A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000020.00000003.532652412.000001FF80F9C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.disneyplus.com/legal/your-california-privacy-rights
                      Source: svchost.exe, 00000020.00000003.528104171.000001FF80F8E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000020.00000003.528134790.000001FF80FB0000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000020.00000003.528153865.000001FF81402000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000020.00000003.528121355.000001FF80FA0000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000020.00000003.528209927.000001FF80FB0000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000020.00000003.528175512.000001FF81403000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000020.00000003.528232054.000001FF81419000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.hotspotshield.com/terms/
                      Source: svchost.exe, 00000020.00000003.528104171.000001FF80F8E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000020.00000003.528134790.000001FF80FB0000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000020.00000003.528153865.000001FF81402000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000020.00000003.528121355.000001FF80FA0000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000020.00000003.528209927.000001FF80FB0000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000020.00000003.528175512.000001FF81403000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000020.00000003.528232054.000001FF81419000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.pango.co/privacy
                      Source: svchost.exe, 00000020.00000003.537097609.000001FF80F97000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000020.00000003.537042574.000001FF80FAD000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000020.00000003.537084561.000001FF80F86000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000020.00000003.537113732.000001FF81402000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000020.00000003.537065768.000001FF80FAD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.tiktok.com/legal/report/feedback
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_0000000180017C8C InternetReadFile,

                      E-Banking Fraud

                      barindex
                      Source: Yara matchFile source: 3.0.rundll32.exe.18d2a510000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.0.rundll32.exe.171db6c0000.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.regsvr32.exe.e70000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.regsvr32.exe.e70000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.regsvr32.exe.1d0000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.171db6c0000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.rundll32.exe.18d2a510000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.0.rundll32.exe.171db6c0000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.0.rundll32.exe.171db6c0000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.regsvr32.exe.1d0000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.171db6c0000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.0.rundll32.exe.18d2a510000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.0.rundll32.exe.18d2a510000.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.0.rundll32.exe.18d2a510000.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.rundll32.exe.18d2a510000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.0.rundll32.exe.171db6c0000.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000004.00000000.271421970.00000171DB6C0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000008.00000002.653751676.00000000001D0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.282755590.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000000.271026048.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000000.268708020.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.284818839.00000171DB6C0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000000.267967898.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.283075821.0000018D2A510000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.270663795.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.284590424.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000000.269618350.00000171DB6C0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000008.00000002.654694067.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000000.268100792.0000018D2A510000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000000.269259649.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000000.269299891.0000018D2A510000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.270419921.0000000000E70000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 6392 -s 324
                      Source: C:\Windows\System32\regsvr32.exeFile deleted: C:\Windows\System32\NhxQyxUKKifP\KOsPrJ.dll:Zone.IdentifierJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeFile created: C:\Windows\system32\NhxQyxUKKifP\Jump to behavior
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00007FFC66AA12B0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00007FFC66AA6850
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00007FFC66AA443C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00007FFC66AA53FB
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00007FFC66AA5CAD
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00007FFC66AA5E01
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00007FFC66AA4A70
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00E60000
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180026410
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180025C30
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180011CCC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001D510
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180001D58
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180011E5C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018002C6C8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018002C2C8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180026F14
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180016320
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180001378
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180018FE8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001ABE8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800243F4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800083F8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800247FC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001DBFC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001100C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180027C28
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018002143C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001303C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018002A840
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180003840
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000B444
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000F048
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018002AC4C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180010050
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180003050
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000445C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000C85C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180003460
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180029C6C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001586C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000406C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000E06C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000BC70
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001447C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180026C80
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180010C84
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180016088
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180002888
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180017C8C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000FC8C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018002D098
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800154B8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800064D0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800180D4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800054D8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018002CCE0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800254E4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800184E8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800010E8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000E8F0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018002A0F8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180019900
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180011904
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001F908
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018002490C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001890C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180003D18
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018002191C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001D128
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000D12C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180014930
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180008534
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001CD44
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000B948
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000796C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180010590
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180028D94
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800091A8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800171B8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180018DBC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800141C8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018002B1D4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180023DDC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800165E4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180029DF0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180015DF4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800011F4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000FE08
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180027E14
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000B618
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180023220
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180020A34
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180007634
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180022E38
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000E638
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180010250
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180026A64
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180004264
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180013674
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000F678
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000E278
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180005E7C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180025E88
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018002868C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180014E98
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180014AA4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800126A8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800036A8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018002A6BC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001CABC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000EAC0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001B6D4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000F2DC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800202E0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800226E0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180019AF0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000BEF0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180012EF8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180029710
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180017710
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000C740
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180020F44
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180023B48
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180023748
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180021754
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180022358
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180029F5C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018002B368
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001BF70
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180025374
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180007F74
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180021F7C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180019788
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180001B8C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180028394
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180013B94
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001479C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000E7A0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800087A4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180017BA8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000EBAC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001B3B8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180012BB8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800257C0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180008BC0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800117C4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800227E0
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FFC66AA12B0
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FFC66AA6850
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FFC66AA443C
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FFC66AA53FB
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FFC66AA5CAD
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FFC66AA5E01
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FFC66AA4A70
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000018D2A500000
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000171DB6B0000
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_001C0000
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_0000000180026410
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_000000018000680F
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_0000000180025C30
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_0000000180013674
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_0000000180017C8C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_000000018000A48C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_000000018000BEF0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_0000000180029710
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_000000018001D510
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_0000000180026F14
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_0000000180001D58
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_000000018002B368
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_0000000180001378
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_0000000180010590
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_00000001800091A8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_0000000180018DBC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_00000001800165E4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_0000000180018FE8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_000000018001ABE8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_0000000180029DF0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_00000001800243F4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_0000000180015DF4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_00000001800011F4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_00000001800083F8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_00000001800247FC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_000000018001DBFC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_000000018000FE08
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_000000018001100C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_0000000180027E14
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_000000018000B618
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_0000000180023220
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_0000000180027C28
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_0000000180020A34
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_0000000180007634
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_0000000180022E38
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_000000018000E638
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_000000018002143C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_000000018001303C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_000000018002A840
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_0000000180003840
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_000000018000B444
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_000000018000F048
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_000000018002AC4C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_0000000180010050
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_0000000180010250
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_0000000180003050
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_0000000180011E5C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_000000018000445C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_000000018000C85C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_0000000180003460
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_0000000180026A64
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_0000000180004264
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_0000000180029C6C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_000000018001586C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_000000018000406C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_000000018000E06C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_000000018000BC70
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_000000018000F678
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_000000018000E278
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_000000018001447C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_0000000180005E7C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_0000000180026C80
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_0000000180010C84
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_0000000180025E88
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_0000000180016088
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_0000000180002888
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_000000018002868C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_000000018000FC8C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_000000018002D098
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_0000000180014E98
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_0000000180014AA4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_00000001800126A8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_00000001800036A8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_00000001800154B8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_000000018002A6BC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_000000018001CABC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_000000018000EAC0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_000000018002C6C8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_000000018002C2C8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_0000000180011CCC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_00000001800064D0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_000000018001B6D4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_00000001800180D4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_00000001800054D8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_000000018000F2DC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_00000001800202E0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_000000018002CCE0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_00000001800226E0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_00000001800254E4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_00000001800184E8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_00000001800010E8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_0000000180019AF0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_000000018000E8F0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_000000018002A0F8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_0000000180012EF8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_0000000180019900
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_0000000180011904
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_000000018001F908
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_000000018002490C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_000000018001890C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_0000000180017710
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_0000000180003D18
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_000000018002191C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_0000000180016320
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_000000018001D128
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_000000018000D12C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_0000000180014930
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_0000000180008534
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_000000018000C740
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_0000000180020F44
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_000000018001CD44
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_0000000180023B48
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_0000000180023748
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_000000018000B948
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_0000000180021754
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_0000000180022358
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_0000000180029F5C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_000000018000796C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_000000018001BF70
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_0000000180025374
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_0000000180007F74
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_0000000180021F7C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_0000000180019788
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_0000000180001B8C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_0000000180028D94
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_0000000180028394
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_0000000180013B94
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_000000018001479C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_000000018000E7A0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_00000001800087A4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_0000000180017BA8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_000000018000EBAC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_0000000180012BB8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_000000018001B3B8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_00000001800171B8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_00000001800257C0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_0000000180008BC0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_00000001800117C4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_00000001800141C8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_000000018002B1D4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_0000000180023DDC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_00000001800227E0
                      Source: C:\Windows\System32\rundll32.exeCode function: String function: 00007FFC66AA7FF0 appears 31 times
                      Source: C:\Windows\System32\rundll32.exeCode function: String function: 00007FFC66AABD70 appears 113 times
                      Source: C:\Windows\System32\rundll32.exeCode function: String function: 00007FFC66AAB3B0 appears 148 times
                      Source: C:\Windows\System32\regsvr32.exeCode function: String function: 00007FFC66AA7FF0 appears 31 times
                      Source: C:\Windows\System32\regsvr32.exeCode function: String function: 00007FFC66AABD70 appears 113 times
                      Source: C:\Windows\System32\regsvr32.exeCode function: String function: 00007FFC66AAB3B0 appears 148 times
                      Source: C:\Windows\System32\regsvr32.exeSection loaded: sfc.dll
                      Source: C:\Windows\System32\regsvr32.exeSection loaded: sfc.dll
                      Source: C:\Windows\System32\svchost.exeSection loaded: xboxlivetitleid.dll
                      Source: C:\Windows\System32\svchost.exeSection loaded: cdpsgshims.dll
                      Source: nZNmWqwnpr.dllVirustotal: Detection: 49%
                      Source: nZNmWqwnpr.dllReversingLabs: Detection: 58%
                      Source: nZNmWqwnpr.dllStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                      Source: C:\Windows\System32\loaddll64.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                      Source: unknownProcess created: C:\Windows\System32\loaddll64.exe loaddll64.exe "C:\Users\user\Desktop\nZNmWqwnpr.dll"
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\nZNmWqwnpr.dll",#1
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\nZNmWqwnpr.dll
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\nZNmWqwnpr.dll",#1
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\nZNmWqwnpr.dll,AddIn_FileTime
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\nZNmWqwnpr.dll,AddIn_SystemTime
                      Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\System32\regsvr32.exe C:\Windows\system32\regsvr32.exe "C:\Windows\system32\NhxQyxUKKifP\KOsPrJ.dll"
                      Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 6392 -s 324
                      Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 6400 -s 316
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\nZNmWqwnpr.dll,DllRegisterServer
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe c:\windows\system32\svchost.exe -k localservice -p -s CDPSvc
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe c:\windows\system32\svchost.exe -k networkservice -p -s DoSvc
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k NetworkService -p
                      Source: unknownProcess created: C:\Windows\System32\SgrmBroker.exe C:\Windows\system32\SgrmBroker.exe
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe c:\windows\system32\svchost.exe -k localservicenetworkrestricted -p -s wscsvc
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p
                      Source: C:\Windows\System32\svchost.exeProcess created: C:\Program Files\Windows Defender\MpCmdRun.exe "C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable
                      Source: C:\Program Files\Windows Defender\MpCmdRun.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\nZNmWqwnpr.dll",#1
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\nZNmWqwnpr.dll
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\nZNmWqwnpr.dll,AddIn_FileTime
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\nZNmWqwnpr.dll,AddIn_SystemTime
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\nZNmWqwnpr.dll,DllRegisterServer
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\nZNmWqwnpr.dll",#1
                      Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\System32\regsvr32.exe C:\Windows\system32\regsvr32.exe "C:\Windows\system32\NhxQyxUKKifP\KOsPrJ.dll"
                      Source: C:\Windows\System32\svchost.exeProcess created: C:\Program Files\Windows Defender\MpCmdRun.exe "C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable
                      Source: C:\Windows\System32\regsvr32.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{D105A4D4-344C-48EB-9866-EE378D90658B}\InProcServer32
                      Source: C:\Windows\System32\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\WEREDB7.tmpJump to behavior
                      Source: classification engineClassification label: mal76.troj.evad.winDLL@31/16@0/3
                      Source: C:\Windows\System32\regsvr32.exeFile read: C:\Users\desktop.iniJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_0000000180029710 CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,FindCloseChangeNotification,
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\nZNmWqwnpr.dll",#1
                      Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess6392
                      Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess6400
                      Source: C:\Windows\System32\conhost.exeMutant created: \BaseNamedObjects\Local\SM0:4780:120:WilError_01
                      Source: C:\Windows\System32\regsvr32.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Windows\System32\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Windows\System32\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Windows\System32\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Windows\System32\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile read: C:\Windows\System32\drivers\etc\hosts
                      Source: C:\Windows\System32\svchost.exeFile read: C:\Windows\System32\drivers\etc\hosts
                      Source: C:\Windows\System32\rundll32.exeAutomated click: OK
                      Source: C:\Windows\System32\rundll32.exeAutomated click: OK
                      Source: nZNmWqwnpr.dllStatic PE information: Image base 0x180000000 > 0x60000000
                      Source: nZNmWqwnpr.dllStatic PE information: DYNAMIC_BASE, NX_COMPAT
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180006951 pushad ; retf
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00007FFC66AB12E3 LoadLibraryW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,DecodePointer,DecodePointer,DecodePointer,
                      Source: nZNmWqwnpr.dllStatic PE information: real checksum: 0x61dc7 should be: 0x64194
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\nZNmWqwnpr.dll
                      Source: C:\Windows\System32\regsvr32.exePE file moved: C:\Windows\System32\NhxQyxUKKifP\KOsPrJ.dllJump to behavior

                      Hooking and other Techniques for Hiding and Protection

                      barindex
                      Source: C:\Windows\System32\regsvr32.exeFile opened: C:\Windows\system32\NhxQyxUKKifP\KOsPrJ.dll:Zone.Identifier read attributes | delete
                      Source: C:\Windows\System32\regsvr32.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\svchost.exe TID: 5716Thread sleep time: -30000s >= -30000s
                      Source: C:\Windows\System32\svchost.exe TID: 868Thread sleep time: -30000s >= -30000s
                      Source: C:\Windows\System32\svchost.exe TID: 5692Thread sleep time: -30000s >= -30000s
                      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                      Source: C:\Windows\System32\rundll32.exeEvasive API call chain: GetModuleFileName,DecisionNodes,ExitProcess
                      Source: C:\Windows\System32\regsvr32.exeEvasive API call chain: GetModuleFileName,DecisionNodes,ExitProcess
                      Source: C:\Windows\System32\svchost.exeFile opened: PhysicalDrive0
                      Source: C:\Windows\System32\regsvr32.exeAPI coverage: 9.5 %
                      Source: C:\Windows\System32\rundll32.exeAPI coverage: 9.1 %
                      Source: C:\Windows\System32\regsvr32.exeProcess information queried: ProcessInformation
                      Source: C:\Windows\System32\regsvr32.exeCode function: 8_2_000000018000BEF0 FindFirstFileW,FindNextFileW,FindClose,
                      Source: C:\Windows\System32\regsvr32.exeAPI call chain: ExitProcess graph end node
                      Source: C:\Windows\System32\regsvr32.exeAPI call chain: ExitProcess graph end node
                      Source: C:\Windows\System32\rundll32.exeAPI call chain: ExitProcess graph end node
                      Source: C:\Windows\System32\rundll32.exeAPI call chain: ExitProcess graph end node
                      Source: C:\Windows\System32\regsvr32.exeFile Volume queried: C:\ FullSizeInformation
                      Source: svchost.exe, 00000015.00000002.610338123.000001DA9E462000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: @Hyper-V RAW
                      Source: regsvr32.exe, 00000008.00000002.654024138.0000000000462000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000008.00000003.565988681.0000000000462000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW@LI%SystemRoot%\system32\mswsock.dllkk8bP
                      Source: regsvr32.exe, 00000008.00000002.654082146.0000000000488000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000008.00000003.566024018.0000000000481000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000008.00000003.566060442.0000000000487000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000015.00000002.610248281.000001DA9E44B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000015.00000002.609889958.000001DA98C29000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000020.00000002.554627754.000001FF806ED000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000020.00000003.554152643.000001FF80657000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000020.00000002.554585040.000001FF806AA000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000020.00000002.554521565.000001FF80658000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                      Source: svchost.exe, 0000000C.00000002.653982971.000001450AE02000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: HvHostWdiSystemHostScDeviceEnumWiaRpctrkwksAudioEndpointBuilderhidservdot3svcDsSvcfhsvcWPDBusEnumsvsvcwlansvcEmbeddedModeirmonSensorServicevmicvssNgcSvcsysmainDevQueryBrokerStorSvcvmickvpexchangevmicshutdownvmicguestinterfacevmicvmsessionNcbServiceNetmanDeviceAssociationServiceTabletInputServicePcaSvcIPxlatCfgSvcCscServiceUmRdpService
                      Source: svchost.exe, 0000000C.00000002.654101734.000001450AE40000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000D.00000002.654135471.00000215BEC76000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000E.00000002.653957670.0000016A25629000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00007FFC66AA3280 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00007FFC66AB0215 _itow_s,_invoke_watson_if_error,OutputDebugStringW,OutputDebugStringW,OutputDebugStringW,OutputDebugStringW,OutputDebugStringW,_wcsftime_l,_invoke_watson_if_oneof,_invoke_watson_if_error,_invoke_watson_if_error,_invoke_watson_if_error,_invoke_watson_if_error,_invoke_watson_if_error,_snwprintf_s,_invoke_watson_if_oneof,_invoke_watson_if_error,_invoke_watson_if_oneof,_invoke_watson_if_error,_unlock,GetFileType,WriteConsoleW,GetLastError,_invoke_watson_if_oneof,WriteFile,WriteFile,OutputDebugStringW,_itow_s,_invoke_watson_if_error,
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00007FFC66AB12E3 LoadLibraryW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,DecodePointer,DecodePointer,DecodePointer,
                      Source: C:\Windows\System32\loaddll64.exeProcess queried: DebugPort
                      Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPort
                      Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPort
                      Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPort
                      Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPort
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00007FFC66AA3280 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00007FFC66AABE50 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FFC66AA3280 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FFC66AABE50 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,

                      HIPS / PFW / Operating System Protection Evasion

                      barindex
                      Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 165.22.73.229 8080
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\nZNmWqwnpr.dll",#1
                      Source: C:\Windows\System32\regsvr32.exeQueries volume information: C:\ VolumeInformation
                      Source: C:\Windows\System32\regsvr32.exeQueries volume information: C:\ VolumeInformation
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformation
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm VolumeInformation
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformation
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformation
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformation
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformation
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation
                      Source: C:\Windows\System32\regsvr32.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00007FFC66AA8900 GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter,
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00007FFC66AA8860 HeapCreate,GetVersion,HeapSetInformation,

                      Lowering of HIPS / PFW / Operating System Security Settings

                      barindex
                      Source: C:\Windows\System32\svchost.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center cvalJump to behavior
                      Source: C:\Windows\System32\svchost.exeWMI Queries: IWbemServices::ExecNotificationQuery - ROOT\SecurityCenter : SELECT * FROM __InstanceOperationEvent WHERE TargetInstance ISA 'AntiVirusProduct' OR TargetInstance ISA 'FirewallProduct' OR TargetInstance ISA 'AntiSpywareProduct'
                      Source: C:\Windows\System32\svchost.exeWMI Queries: IWbemServices::CreateInstanceEnum - ROOT\SecurityCenter2 : FirewallProduct
                      Source: C:\Windows\System32\svchost.exeWMI Queries: IWbemServices::CreateInstanceEnum - ROOT\SecurityCenter2 : AntiVirusProduct
                      Source: C:\Windows\System32\svchost.exeWMI Queries: IWbemServices::CreateInstanceEnum - ROOT\SecurityCenter2 : AntiSpywareProduct
                      Source: svchost.exe, 00000013.00000002.653983608.0000023E43240000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: &@\REGISTRY\USER\S-1-5-19ws Defender\MsMpeng.exe
                      Source: svchost.exe, 00000013.00000002.654047547.0000023E43302000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe

                      Stealing of Sensitive Information

                      barindex
                      Source: Yara matchFile source: 3.0.rundll32.exe.18d2a510000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.0.rundll32.exe.171db6c0000.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.regsvr32.exe.e70000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.regsvr32.exe.e70000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.regsvr32.exe.1d0000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.171db6c0000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.rundll32.exe.18d2a510000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.0.rundll32.exe.171db6c0000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.0.rundll32.exe.171db6c0000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.regsvr32.exe.1d0000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.171db6c0000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.0.rundll32.exe.18d2a510000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.0.rundll32.exe.18d2a510000.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.0.rundll32.exe.18d2a510000.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.rundll32.exe.18d2a510000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.0.rundll32.exe.171db6c0000.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000004.00000000.271421970.00000171DB6C0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000008.00000002.653751676.00000000001D0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.282755590.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000000.271026048.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000000.268708020.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.284818839.00000171DB6C0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000000.267967898.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.283075821.0000018D2A510000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.270663795.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.284590424.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000000.269618350.00000171DB6C0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000008.00000002.654694067.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000000.268100792.0000018D2A510000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000000.269259649.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000000.269299891.0000018D2A510000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.270419921.0000000000E70000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                      Valid Accounts1
                      Windows Management Instrumentation
                      1
                      DLL Side-Loading
                      111
                      Process Injection
                      2
                      Masquerading
                      OS Credential Dumping1
                      System Time Discovery
                      Remote Services1
                      Archive Collected Data
                      Exfiltration Over Other Network Medium1
                      Encrypted Channel
                      Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                      Default Accounts2
                      Native API
                      Boot or Logon Initialization Scripts1
                      DLL Side-Loading
                      1
                      Disable or Modify Tools
                      LSASS Memory1
                      Query Registry
                      Remote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth1
                      Non-Standard Port
                      Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                      Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)3
                      Virtualization/Sandbox Evasion
                      Security Account Manager61
                      Security Software Discovery
                      SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration1
                      Ingress Tool Transfer
                      Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                      Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)111
                      Process Injection
                      NTDS3
                      Virtualization/Sandbox Evasion
                      Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
                      Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
                      Deobfuscate/Decode Files or Information
                      LSA Secrets2
                      Process Discovery
                      SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                      Replication Through Removable MediaLaunchdRc.commonRc.common1
                      Hidden Files and Directories
                      Cached Domain Credentials1
                      Remote System Discovery
                      VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                      External Remote ServicesScheduled TaskStartup ItemsStartup Items2
                      Obfuscated Files or Information
                      DCSync2
                      File and Directory Discovery
                      Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                      Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job1
                      Regsvr32
                      Proc Filesystem25
                      System Information Discovery
                      Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
                      Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)1
                      Rundll32
                      /etc/passwd and /etc/shadowSystem Network Connections DiscoverySoftware Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
                      Supply Chain CompromiseAppleScriptAt (Windows)At (Windows)1
                      DLL Side-Loading
                      Network SniffingProcess DiscoveryTaint Shared ContentLocal Data StagingExfiltration Over Unencrypted/Obfuscated Non-C2 ProtocolFile Transfer ProtocolsData Encrypted for Impact
                      Compromise Software Dependencies and Development ToolsWindows Command ShellCronCron1
                      File Deletion
                      Input CapturePermission Groups DiscoveryReplication Through Removable MediaRemote Data StagingExfiltration Over Physical MediumMail ProtocolsService Stop
                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet
                      behaviorgraph top1 signatures2 2 Behavior Graph ID: 631910 Sample: nZNmWqwnpr.dll Startdate: 22/05/2022 Architecture: WINDOWS Score: 76 48 Multi AV Scanner detection for submitted file 2->48 50 Yara detected Emotet 2->50 52 Machine Learning detection for sample 2->52 8 loaddll64.exe 1 2->8         started        10 svchost.exe 2->10         started        13 svchost.exe 1 1 2->13         started        16 9 other processes 2->16 process3 dnsIp4 18 regsvr32.exe 5 8->18         started        21 cmd.exe 1 8->21         started        23 rundll32.exe 8->23         started        27 2 other processes 8->27 56 Changes security center settings (notifications, updates, antivirus, firewall) 10->56 25 MpCmdRun.exe 1 10->25         started        44 127.0.0.1 unknown unknown 13->44 signatures5 process6 signatures7 54 Hides that the sample has been downloaded from the Internet (zone.identifier) 18->54 29 regsvr32.exe 18->29         started        33 rundll32.exe 21->33         started        35 WerFault.exe 9 23->35         started        37 conhost.exe 25->37         started        process8 dnsIp9 46 165.22.73.229, 49751, 8080 DIGITALOCEAN-ASNUS United States 29->46 58 System process connects to network (likely due to code injection or exploit) 29->58 39 WerFault.exe 20 9 33->39         started        signatures10 process11 dnsIp12 42 192.168.2.1 unknown unknown 39->42

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                      windows-stand
                      SourceDetectionScannerLabelLink
                      nZNmWqwnpr.dll49%VirustotalBrowse
                      nZNmWqwnpr.dll59%ReversingLabsWin64.Trojan.Emotet
                      nZNmWqwnpr.dll100%Joe Sandbox ML
                      No Antivirus matches
                      SourceDetectionScannerLabelLinkDownload
                      2.2.regsvr32.exe.e70000.0.unpack100%AviraHEUR/AGEN.1215461Download File
                      4.2.rundll32.exe.171db6c0000.0.unpack100%AviraHEUR/AGEN.1215461Download File
                      4.0.rundll32.exe.171db6c0000.0.unpack100%AviraHEUR/AGEN.1215461Download File
                      3.0.rundll32.exe.18d2a510000.0.unpack100%AviraHEUR/AGEN.1215461Download File
                      8.2.regsvr32.exe.1d0000.0.unpack100%AviraHEUR/AGEN.1215461Download File
                      4.0.rundll32.exe.171db6c0000.2.unpack100%AviraHEUR/AGEN.1215461Download File
                      3.0.rundll32.exe.18d2a510000.2.unpack100%AviraHEUR/AGEN.1215461Download File
                      3.2.rundll32.exe.18d2a510000.0.unpack100%AviraHEUR/AGEN.1215461Download File
                      No Antivirus matches
                      SourceDetectionScannerLabelLink
                      https://165.22.73.229:8080/tem0%Avira URL Cloudsafe
                      https://www.pango.co/privacy0%URL Reputationsafe
                      https://www.disneyplus.com/legal/your-california-privacy-rights0%URL Reputationsafe
                      https://165.22.73.229:8080/Kr#0%Avira URL Cloudsafe
                      http://crl.ver)0%Avira URL Cloudsafe
                      https://www.tiktok.com/legal/report/feedback0%URL Reputationsafe
                      https://165.22.73.229:8080/MF0%Avira URL Cloudsafe
                      https://%s.xboxlive.com0%URL Reputationsafe
                      https://www.disneyplus.com/legal/privacy-policy0%URL Reputationsafe
                      https://dynamic.t0%URL Reputationsafe
                      https://165.22.73.229:8080/0%Avira URL Cloudsafe
                      https://disneyplus.com/legal.0%URL Reputationsafe
                      https://165.22.73.229/eF0%Avira URL Cloudsafe
                      http://help.disneyplus.com.0%URL Reputationsafe
                      https://165.22.73.229/iF0%Avira URL Cloudsafe
                      https://%s.dnet.xboxlive.com0%URL Reputationsafe
                      No contacted domains info
                      NameSourceMaliciousAntivirus DetectionReputation
                      https://dev.ditu.live.com/REST/v1/Routes/svchost.exe, 00000010.00000002.323659479.00000227CCC3D000.00000004.00000020.00020000.00000000.sdmpfalse
                        high
                        https://dev.virtualearth.net/REST/v1/Routes/Drivingsvchost.exe, 00000010.00000003.323232135.00000227CCC61000.00000004.00000020.00020000.00000000.sdmpfalse
                          high
                          https://t0.ssl.ak.dynamic.tiles.virtualearth.net/comp/gen.ashxsvchost.exe, 00000010.00000002.323659479.00000227CCC3D000.00000004.00000020.00020000.00000000.sdmpfalse
                            high
                            https://dev.ditu.live.com/REST/v1/Traffic/Incidents/svchost.exe, 00000010.00000003.323254775.00000227CCC49000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000010.00000002.323671703.00000227CCC4B000.00000004.00000020.00020000.00000000.sdmpfalse
                              high
                              https://t0.tiles.ditu.live.com/tiles/gensvchost.exe, 00000010.00000003.323244324.00000227CCC4E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000010.00000003.323344021.00000227CCC50000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000010.00000002.323685818.00000227CCC56000.00000004.00000020.00020000.00000000.sdmpfalse
                                high
                                https://dev.virtualearth.net/REST/v1/Routes/Walkingsvchost.exe, 00000010.00000003.323232135.00000227CCC61000.00000004.00000020.00020000.00000000.sdmpfalse
                                  high
                                  https://dev.virtualearth.net/mapcontrol/HumanScaleServices/GetBubbles.ashx?n=svchost.exe, 00000010.00000003.323271051.00000227CCC40000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000010.00000002.323664169.00000227CCC42000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000010.00000003.323302409.00000227CCC41000.00000004.00000020.00020000.00000000.sdmpfalse
                                    high
                                    https://dev.ditu.live.com/mapcontrol/logging.ashxsvchost.exe, 00000010.00000003.323232135.00000227CCC61000.00000004.00000020.00020000.00000000.sdmpfalse
                                      high
                                      https://dev.ditu.live.com/REST/v1/Imagery/Copyright/svchost.exe, 00000010.00000003.323254775.00000227CCC49000.00000004.00000020.00020000.00000000.sdmpfalse
                                        high
                                        https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gri?pv=1&r=svchost.exe, 00000010.00000003.301520318.00000227CCC30000.00000004.00000020.00020000.00000000.sdmpfalse
                                          high
                                          https://dev.virtualearth.net/REST/v1/Transit/Schedules/svchost.exe, 00000010.00000003.323271051.00000227CCC40000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000010.00000002.323664169.00000227CCC42000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000010.00000003.323302409.00000227CCC41000.00000004.00000020.00020000.00000000.sdmpfalse
                                            high
                                            https://165.22.73.229:8080/temregsvr32.exe, 00000008.00000002.654024138.0000000000462000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000008.00000003.565988681.0000000000462000.00000004.00000020.00020000.00000000.sdmpfalse
                                            • Avira URL Cloud: safe
                                            unknown
                                            https://www.hotspotshield.com/terms/svchost.exe, 00000020.00000003.528104171.000001FF80F8E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000020.00000003.528134790.000001FF80FB0000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000020.00000003.528153865.000001FF81402000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000020.00000003.528121355.000001FF80FA0000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000020.00000003.528209927.000001FF80FB0000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000020.00000003.528175512.000001FF81403000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000020.00000003.528232054.000001FF81419000.00000004.00000020.00020000.00000000.sdmpfalse
                                              high
                                              https://www.pango.co/privacysvchost.exe, 00000020.00000003.528104171.000001FF80F8E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000020.00000003.528134790.000001FF80FB0000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000020.00000003.528153865.000001FF81402000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000020.00000003.528121355.000001FF80FA0000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000020.00000003.528209927.000001FF80FB0000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000020.00000003.528175512.000001FF81403000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000020.00000003.528232054.000001FF81419000.00000004.00000020.00020000.00000000.sdmpfalse
                                              • URL Reputation: safe
                                              unknown
                                              http://www.bingmapsportal.comsvchost.exe, 00000010.00000002.323590455.00000227CCC13000.00000004.00000020.00020000.00000000.sdmpfalse
                                                high
                                                https://ecn.dev.virtualearth.net/REST/v1/Imagery/Copyright/svchost.exe, 00000010.00000002.323659479.00000227CCC3D000.00000004.00000020.00020000.00000000.sdmpfalse
                                                  high
                                                  https://dynamic.t0.tiles.ditu.live.com/comp/gen.ashxsvchost.exe, 00000010.00000003.323232135.00000227CCC61000.00000004.00000020.00020000.00000000.sdmpfalse
                                                    high
                                                    https://www.disneyplus.com/legal/your-california-privacy-rightssvchost.exe, 00000020.00000003.532848367.000001FF80F8A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000020.00000003.532652412.000001FF80F9C000.00000004.00000020.00020000.00000000.sdmpfalse
                                                    • URL Reputation: safe
                                                    unknown
                                                    https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdv?pv=1&r=svchost.exe, 00000010.00000003.323271051.00000227CCC40000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000010.00000003.323294055.00000227CCC45000.00000004.00000020.00020000.00000000.sdmpfalse
                                                      high
                                                      https://165.22.73.229:8080/Kr#regsvr32.exe, 00000008.00000002.654024138.0000000000462000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000008.00000003.565988681.0000000000462000.00000004.00000020.00020000.00000000.sdmpfalse
                                                      • Avira URL Cloud: safe
                                                      unknown
                                                      https://dev.ditu.live.com/REST/v1/Transit/Stops/svchost.exe, 00000010.00000002.323731651.00000227CCC6A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000010.00000003.323195739.00000227CCC68000.00000004.00000020.00020000.00000000.sdmpfalse
                                                        high
                                                        https://dev.virtualearth.net/REST/v1/Routes/svchost.exe, 00000010.00000002.323659479.00000227CCC3D000.00000004.00000020.00020000.00000000.sdmpfalse
                                                          high
                                                          https://dev.virtualearth.net/REST/v1/Traffic/Incidents/svchost.exe, 00000010.00000003.301520318.00000227CCC30000.00000004.00000020.00020000.00000000.sdmpfalse
                                                            high
                                                            https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdi?pv=1&r=svchost.exe, 00000010.00000003.301520318.00000227CCC30000.00000004.00000020.00020000.00000000.sdmpfalse
                                                              high
                                                              http://crl.ver)svchost.exe, 00000015.00000002.610138718.000001DA9E410000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000020.00000002.554627754.000001FF806ED000.00000004.00000020.00020000.00000000.sdmpfalse
                                                              • Avira URL Cloud: safe
                                                              low
                                                              https://dev.virtualearth.net/webservices/v1/LoggingService/LoggingService.svc/Log?svchost.exe, 00000010.00000003.323271051.00000227CCC40000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000010.00000003.323254775.00000227CCC49000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000010.00000002.323671703.00000227CCC4B000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                high
                                                                https://www.tiktok.com/legal/report/feedbacksvchost.exe, 00000020.00000003.537097609.000001FF80F97000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000020.00000003.537042574.000001FF80FAD000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000020.00000003.537084561.000001FF80F86000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000020.00000003.537113732.000001FF81402000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000020.00000003.537065768.000001FF80FAD000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                • URL Reputation: safe
                                                                unknown
                                                                https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gd?pv=1&r=svchost.exe, 00000010.00000002.323659479.00000227CCC3D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000010.00000002.323590455.00000227CCC13000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                  high
                                                                  https://165.22.73.229:8080/MFregsvr32.exe, 00000008.00000003.565919718.0000000000451000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000008.00000002.653981531.0000000000451000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                  • Avira URL Cloud: safe
                                                                  unknown
                                                                  https://%s.xboxlive.comsvchost.exe, 0000000D.00000002.654018460.00000215BEC3E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                  • URL Reputation: safe
                                                                  low
                                                                  https://dev.virtualearth.net/REST/v1/Locationssvchost.exe, 00000010.00000003.323232135.00000227CCC61000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                    high
                                                                    https://ecn.dev.virtualearth.net/mapcontrol/mapconfiguration.ashx?name=native&v=svchost.exe, 00000010.00000003.301520318.00000227CCC30000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                      high
                                                                      https://dev.virtualearth.net/mapcontrol/logging.ashxsvchost.exe, 00000010.00000003.323232135.00000227CCC61000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                        high
                                                                        https://support.hotspotshield.com/svchost.exe, 00000020.00000003.528104171.000001FF80F8E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000020.00000003.528134790.000001FF80FB0000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000020.00000003.528153865.000001FF81402000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000020.00000003.528121355.000001FF80FA0000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000020.00000003.528209927.000001FF80FB0000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000020.00000003.528175512.000001FF81403000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000020.00000003.528232054.000001FF81419000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                          high
                                                                          https://dynamic.api.tiles.ditu.live.com/odvs/gdi?pv=1&r=svchost.exe, 00000010.00000002.323671703.00000227CCC4B000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                            high
                                                                            https://www.disneyplus.com/legal/privacy-policysvchost.exe, 00000020.00000003.532848367.000001FF80F8A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000020.00000003.532652412.000001FF80F9C000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                            • URL Reputation: safe
                                                                            unknown
                                                                            https://dev.virtualearth.net/REST/v1/JsonFilter/VenueMaps/data/svchost.exe, 00000010.00000003.323254775.00000227CCC49000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000010.00000002.323671703.00000227CCC4B000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                              high
                                                                              https://dynamic.tsvchost.exe, 00000010.00000002.323708162.00000227CCC65000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                              • URL Reputation: safe
                                                                              unknown
                                                                              https://dev.virtualearth.net/REST/v1/Routes/Transitsvchost.exe, 00000010.00000003.323232135.00000227CCC61000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                high
                                                                                https://165.22.73.229:8080/regsvr32.exe, 00000008.00000003.565919718.0000000000451000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000008.00000002.654024138.0000000000462000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000008.00000003.565988681.0000000000462000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000008.00000002.653981531.0000000000451000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                • Avira URL Cloud: safe
                                                                                unknown
                                                                                https://disneyplus.com/legal.svchost.exe, 00000020.00000003.532848367.000001FF80F8A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000020.00000003.532652412.000001FF80F9C000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                • URL Reputation: safe
                                                                                unknown
                                                                                https://t0.ssl.ak.tiles.virtualearth.net/tiles/gensvchost.exe, 00000010.00000002.323655765.00000227CCC39000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000010.00000003.301520318.00000227CCC30000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                  high
                                                                                  https://165.22.73.229/eFregsvr32.exe, 00000008.00000003.565919718.0000000000451000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000008.00000002.653981531.0000000000451000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                  • Avira URL Cloud: safe
                                                                                  unknown
                                                                                  https://dynamic.api.tiles.ditu.live.com/odvs/gdv?pv=1&r=svchost.exe, 00000010.00000003.323254775.00000227CCC49000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000010.00000002.323671703.00000227CCC4B000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                    high
                                                                                    https://activity.windows.comsvchost.exe, 0000000D.00000002.654018460.00000215BEC3E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                      high
                                                                                      https://dev.ditu.live.com/REST/v1/Locationssvchost.exe, 00000010.00000003.323232135.00000227CCC61000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                        high
                                                                                        http://help.disneyplus.com.svchost.exe, 00000020.00000003.532848367.000001FF80F8A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000020.00000003.532652412.000001FF80F9C000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                        • URL Reputation: safe
                                                                                        unknown
                                                                                        https://165.22.73.229/iFregsvr32.exe, 00000008.00000003.565919718.0000000000451000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000008.00000002.653981531.0000000000451000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                        • Avira URL Cloud: safe
                                                                                        unknown
                                                                                        https://%s.dnet.xboxlive.comsvchost.exe, 0000000D.00000002.654018460.00000215BEC3E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                        • URL Reputation: safe
                                                                                        low
                                                                                        https://dev.ditu.live.com/REST/v1/JsonFilter/VenueMaps/data/svchost.exe, 00000010.00000003.323254775.00000227CCC49000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000010.00000002.323671703.00000227CCC4B000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                          high
                                                                                          https://dynamic.api.tiles.ditu.live.com/odvs/gd?pv=1&r=svchost.exe, 00000010.00000003.323254775.00000227CCC49000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                            high
                                                                                            • No. of IPs < 25%
                                                                                            • 25% < No. of IPs < 50%
                                                                                            • 50% < No. of IPs < 75%
                                                                                            • 75% < No. of IPs
                                                                                            IPDomainCountryFlagASNASN NameMalicious
                                                                                            165.22.73.229
                                                                                            unknownUnited States
                                                                                            14061DIGITALOCEAN-ASNUStrue
                                                                                            IP
                                                                                            192.168.2.1
                                                                                            127.0.0.1
                                                                                            Joe Sandbox Version:34.0.0 Boulder Opal
                                                                                            Analysis ID:631910
                                                                                            Start date and time: 22/05/202222:46:092022-05-22 22:46:09 +02:00
                                                                                            Joe Sandbox Product:CloudBasic
                                                                                            Overall analysis duration:0h 8m 13s
                                                                                            Hypervisor based Inspection enabled:false
                                                                                            Report type:light
                                                                                            Sample file name:nZNmWqwnpr.dll
                                                                                            Cookbook file name:default.jbs
                                                                                            Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                                                                            Run name:Run with higher sleep bypass
                                                                                            Number of analysed new started processes analysed:38
                                                                                            Number of new started drivers analysed:0
                                                                                            Number of existing processes analysed:0
                                                                                            Number of existing drivers analysed:0
                                                                                            Number of injected processes analysed:0
                                                                                            Technologies:
                                                                                            • HCA enabled
                                                                                            • EGA enabled
                                                                                            • HDC enabled
                                                                                            • AMSI enabled
                                                                                            Analysis Mode:default
                                                                                            Analysis stop reason:Timeout
                                                                                            Detection:MAL
                                                                                            Classification:mal76.troj.evad.winDLL@31/16@0/3
                                                                                            EGA Information:
                                                                                            • Successful, ratio: 100%
                                                                                            HDC Information:
                                                                                            • Successful, ratio: 73% (good quality ratio 38.9%)
                                                                                            • Quality average: 32.7%
                                                                                            • Quality standard deviation: 37.6%
                                                                                            HCA Information:
                                                                                            • Successful, ratio: 94%
                                                                                            • Number of executed functions: 0
                                                                                            • Number of non-executed functions: 0
                                                                                            Cookbook Comments:
                                                                                            • Found application associated with file extension: .dll
                                                                                            • Adjust boot time
                                                                                            • Enable AMSI
                                                                                            • Sleeps bigger than 120000ms are automatically reduced to 1000ms
                                                                                            • Exclude process from analysis (whitelisted): audiodg.exe, BackgroundTransferHost.exe, WerFault.exe, WMIADAP.exe, backgroundTaskHost.exe, WmiPrvSE.exe, wuapihost.exe
                                                                                            • Excluded IPs from analysis (whitelisted): 13.89.179.12, 104.79.90.110, 173.222.108.226, 173.222.108.210, 20.223.24.244
                                                                                            • Excluded domains from analysis (whitelisted): fs.microsoft.com, displaycatalog-rp-europe.md.mp.microsoft.com.akadns.net, neu-displaycatalogrp.frontdoor.bigcatalog.commerce.microsoft.com, e1723.g.akamaiedge.net, ctldl.windowsupdate.com, onedsblobprdcus17.centralus.cloudapp.azure.com, a767.dspw65.akamai.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, arc.msn.com, wu-bg-shim.trafficmanager.net, download.windowsupdate.com.edgesuite.net, ris.api.iris.microsoft.com, consumer-displaycatalogrp-aks2aks-europe.md.mp.microsoft.com.akadns.net, store-images.s-microsoft.com, login.live.com, blobcollector.events.data.trafficmanager.net, sls.update.microsoft.com, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, watson.telemetry.microsoft.com, prod.fs.microsoft.com.akadns.net, displaycatalog-rp.md.mp.microsoft.com.akadns.net
                                                                                            • Not all processes where analyzed, report is missing behavior information
                                                                                            • Report size exceeded maximum capacity and may have missing behavior information.
                                                                                            • Report size exceeded maximum capacity and may have missing disassembly code.
                                                                                            • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                                            • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                                                            • Report size getting too big, too many NtQueryValueKey calls found.
                                                                                            TimeTypeDescription
                                                                                            22:48:44API Interceptor1x Sleep call for process: svchost.exe modified
                                                                                            22:49:35API Interceptor1x Sleep call for process: MpCmdRun.exe modified
                                                                                            No context
                                                                                            No context
                                                                                            No context
                                                                                            No context
                                                                                            No context
                                                                                            Process:C:\Windows\System32\svchost.exe
                                                                                            File Type:data
                                                                                            Category:dropped
                                                                                            Size (bytes):8192
                                                                                            Entropy (8bit):0.3593198815979092
                                                                                            Encrypted:false
                                                                                            SSDEEP:12:SnaaD0JcaaD0JwQQU2naaD0JcaaD0JwQQU:4tgJctgJw/tgJctgJw
                                                                                            MD5:BF1DC7D5D8DAD7478F426DF8B3F8BAA6
                                                                                            SHA1:C6B0BDE788F553F865D65F773D8F6A3546887E42
                                                                                            SHA-256:BE47C764C38CA7A90A345BE183F5261E89B98743B5E35989E9A8BE0DA498C0F2
                                                                                            SHA-512:00F2412AA04E09EA19A8315D80BE66D2727C713FC0F5AE6A9334BABA539817F568A98CA3A45B2673282BDD325B8B0E2840A393A4DCFADCB16473F5EAF2AF3180
                                                                                            Malicious:false
                                                                                            Preview:.............*..........3...w..................C:\ProgramData\Microsoft\Network\Downloader\.........................................................................................................................................................................................................................C:\ProgramData\Microsoft\Network\Downloader\..........................................................................................................................................................................................................................0u..................@...@......................................................*.............................................................................................................................................................................................................................................................................................................................................................
                                                                                            Process:C:\Windows\System32\svchost.exe
                                                                                            File Type:MPEG-4 LOAS
                                                                                            Category:dropped
                                                                                            Size (bytes):1310720
                                                                                            Entropy (8bit):0.24943557771458175
                                                                                            Encrypted:false
                                                                                            SSDEEP:1536:BJiRdfVzkZm3lyf49uyc0ga04PdHS9LrM/oVMUdSRU40:BJiRdwfu2SRU40
                                                                                            MD5:3AEC647862A33BB8BDC60479AA5DA5BF
                                                                                            SHA1:8A847BE57A0076359FB303AA5719276CC60BE894
                                                                                            SHA-256:7EEE1FAA534682D0A0BB247A3D3FE29AB6102BA611756FDD3D0B3E2748EF1289
                                                                                            SHA-512:46493A318C880BE4BABF6406753C82AB666788AC962226C0FD188AD3826071D9CC5B3F36A794783C0F2FD009ECE57073382973C0058F63A4D3B252A1DC207308
                                                                                            Malicious:false
                                                                                            Preview:V.d.........@..@.3...w...........................3...w..................C:\ProgramData\Microsoft\Network\Downloader\.........................................................................................................................................................................................................................C:\ProgramData\Microsoft\Network\Downloader\..........................................................................................................................................................................................................................0u..................@...@.........................................d#.................................................................................................................................................................................................................................................................................................................................................
                                                                                            Process:C:\Windows\System32\svchost.exe
                                                                                            File Type:Extensible storage engine DataBase, version 0x620, checksum 0x9faf6271, page size 16384, Windows version 10.0
                                                                                            Category:dropped
                                                                                            Size (bytes):786432
                                                                                            Entropy (8bit):0.25053453037065826
                                                                                            Encrypted:false
                                                                                            SSDEEP:384:oXh+W0StseCJ48EApW0StseCJ48E2rTSjlK/ebmLerYSRSY1J2:oXKSB2nSB2RSjlK/+mLesOj1J2
                                                                                            MD5:5743D173A3673A6F6E65C6BC8B750CC3
                                                                                            SHA1:868E16EE5FF3017560A7DA897CC00F1F90A61C4D
                                                                                            SHA-256:69A2730101E3E5C8837A61D716F970EB8EE95EF19F3F2F244B8B61EBB6449C9D
                                                                                            SHA-512:00ECDBA0B551551F33C2C3A70A142B2E085AEEA44BE3197749B67CAD358BA87141E951ECA424094554FF3A152AA8768BE33023D9CB3CD705C4924D2018333A62
                                                                                            Malicious:false
                                                                                            Preview:..bq... ................e.f.3...w........................).....82...zC.,0...z..h.(.....82...zC...)..............3...w...........................................................................................................B...........@...................................................................................................... ...................................................................................................................................................................................................................................................U..82...zC...................m82...zC.........................................................................................................................................................................................................................................................................................................................................................................................
                                                                                            Process:C:\Windows\System32\svchost.exe
                                                                                            File Type:data
                                                                                            Category:dropped
                                                                                            Size (bytes):16384
                                                                                            Entropy (8bit):0.07353936512336273
                                                                                            Encrypted:false
                                                                                            SSDEEP:3:n/lT7vJKya+dwzatYzfY3aWnPKlvvtall3Vkttlmlnl:/RrbfdwZMdil43
                                                                                            MD5:7B07BDA81D83191482DD6B5C486A58E2
                                                                                            SHA1:DA597A80263510D7BBE08DAFA5A19D06B5E3007A
                                                                                            SHA-256:28777BCD8EF1046B73D94A2308B79130C833AD2C4E7708FB4063C19F9D936322
                                                                                            SHA-512:0A95A7AD479460C09129C14F442C0F644F287B7CB067C1481CD4F9DAA9C973CE86CF88CB93EBDDB12EB8C8EFF887DECF44C0C12B5CE43CF5CF98E488577A6743
                                                                                            Malicious:false
                                                                                            Preview:-Rn......................................3...w..,0...z..82...zC.........82...zC.82...zC.>..U72...z.{..................m82...zC.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                            Process:C:\Windows\System32\WerFault.exe
                                                                                            File Type:Little-endian UTF-16 Unicode text, with CRLF line terminators
                                                                                            Category:dropped
                                                                                            Size (bytes):65536
                                                                                            Entropy (8bit):0.7855537196454031
                                                                                            Encrypted:false
                                                                                            SSDEEP:96:crFARbidFJPny9ji55o+7Rb6tpXIQcQ5c6ZucE1cw3CzXaXz+HbHgSQgJPb3IDVT:+a9idFJKHHXkfGDjB9/u7s4S274ltT
                                                                                            MD5:8CA8767D7088FA6D7E8F2D6F7BE498E9
                                                                                            SHA1:7CB7942549438A90C237EB6D1988E489B84C739A
                                                                                            SHA-256:75A1D201EF46309CE54BBC8A22C21C1B9E61CC6BCACC8A2F1631333D00ADD039
                                                                                            SHA-512:3ED916C56EBCF2136EF51A3C16AF5278E499C328C01AFBA7A20DEFAB90E2B7C6E29908FAE7B4DE3001916AB1711FCB2C3D7AF4EE3459670C5DCF0F27F32690FA
                                                                                            Malicious:false
                                                                                            Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.B.E.X.6.4.....E.v.e.n.t.T.i.m.e.=.1.3.2.9.7.7.5.8.5.0.1.5.6.9.9.7.4.0.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.2.9.7.7.5.8.5.0.3.7.7.3.0.9.5.4.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.3.a.4.7.4.2.b.d.-.2.c.e.9.-.4.3.0.6.-.b.4.7.7.-.9.e.7.e.4.c.1.f.e.3.e.5.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.5.6.2.2.6.e.8.e.-.3.6.f.3.-.4.f.f.8.-.a.e.d.0.-.b.3.c.e.7.7.2.f.e.e.0.1.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.r.u.n.d.l.l.3.2...e.x.e._.n.Z.N.m.W.q.w.n.p.r...d.l.l.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.R.U.N.D.L.L.3.2...E.X.E.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.9.0.0.-.0.0.0.1.-.0.0.1.d.-.5.9.8.4.-.4.3.b.1.6.8.6.e.d.8.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.2.f.3.4.c.c.f.d.d.8.1.4.1.a.e.e.e.2.e.8.9.f.f.b.0.7.0.c.e.2.3.9.c.7.d.0.0.7.0.6.!.
                                                                                            Process:C:\Windows\System32\WerFault.exe
                                                                                            File Type:Little-endian UTF-16 Unicode text, with CRLF line terminators
                                                                                            Category:dropped
                                                                                            Size (bytes):65536
                                                                                            Entropy (8bit):0.7843882275782812
                                                                                            Encrypted:false
                                                                                            SSDEEP:96:ecFJ1biYJPnyWji55o+7Rb6tpXIQcQ5c6ZucE1cw3CzXaXz+HbHgSQgJPb3IDV95:vViYJKUHXkfGDjB9/u7s4S274ltT
                                                                                            MD5:C45E087223C7A2F05DA6F7D28CB3C666
                                                                                            SHA1:E5E639FE78423A6347EA34169824C342C9A3B85A
                                                                                            SHA-256:2A1780416E16F3C3CAA4877A8895B8DAB145E5B45D425F9EFB2679D6DD2099A7
                                                                                            SHA-512:390211ACF3F485EFE87AF4BE8AFC15EE97FD3215983E6C7B5DC251211888CE5537918DB943AEBE1C27341EC93D4429B03AD33029624346DBDFEBC25F28B5812E
                                                                                            Malicious:false
                                                                                            Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.B.E.X.6.4.....E.v.e.n.t.T.i.m.e.=.1.3.2.9.7.7.5.8.5.0.0.7.5.8.3.2.3.3.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.2.9.7.7.5.8.5.0.2.8.9.8.9.4.3.8.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.7.a.3.0.b.4.4.a.-.0.4.9.2.-.4.f.1.1.-.9.e.6.1.-.7.4.e.d.6.5.f.d.8.1.d.5.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.3.c.c.b.9.e.4.8.-.b.2.8.d.-.4.5.d.2.-.8.0.4.8.-.d.0.d.9.0.9.f.3.7.9.f.e.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.r.u.n.d.l.l.3.2...e.x.e._.n.Z.N.m.W.q.w.n.p.r...d.l.l.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.R.U.N.D.L.L.3.2...E.X.E.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.8.f.8.-.0.0.0.1.-.0.0.1.d.-.d.e.e.0.-.0.3.b.1.6.8.6.e.d.8.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.2.f.3.4.c.c.f.d.d.8.1.4.1.a.e.e.e.2.e.8.9.f.f.b.0.7.0.c.e.2.3.9.c.7.d.0.0.7.0.6.!.
                                                                                            Process:C:\Windows\System32\WerFault.exe
                                                                                            File Type:Mini DuMP crash report, 15 streams, Mon May 23 05:48:21 2022, 0x1205a4 type
                                                                                            Category:dropped
                                                                                            Size (bytes):65752
                                                                                            Entropy (8bit):2.273462298958537
                                                                                            Encrypted:false
                                                                                            SSDEEP:384:Wr04cSe2YqH2Nj7+CPoccldYno8BET8DlTQ5OB0pyD:WrfMqH2l+CPoc+r8BET98
                                                                                            MD5:A427211D187AE2D543A5A1A070CDDCD9
                                                                                            SHA1:AF297263D97D06E06344F146314470A98158F7E7
                                                                                            SHA-256:2A16C241BF6E0F90A2C24B58996539D834756C8696E878EDBD03B911853134D8
                                                                                            SHA-512:5EF7CF29BD7758015DA64716C382D4F91E75CC33A60FF0B16B76C9630C35A9112FAD82C4AF5ECC76A8918179742DCDC5209AA14181A049F01D4DCD944BD408B8
                                                                                            Malicious:false
                                                                                            Preview:MDMP....... .......% .b........................................8.......$...d;..........`.......8...........T...........0................"...........$...................................................................U...........B......P%......Lw.................va...T............ .b.............................0..................P.a.c.i.f.i.c. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................P.a.c.i.f.i.c. .D.a.y.l.i.g.h.t. .T.i.m.e...........................................1.7.1.3.4...1...a.m.d.6.4.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.....................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                            Process:C:\Windows\System32\WerFault.exe
                                                                                            File Type:Mini DuMP crash report, 15 streams, Mon May 23 05:48:22 2022, 0x1205a4 type
                                                                                            Category:dropped
                                                                                            Size (bytes):62196
                                                                                            Entropy (8bit):2.369025836105725
                                                                                            Encrypted:false
                                                                                            SSDEEP:384:v604cSe2YqH2taCkycldYnjGyRy1k+zRHZ+:v6fMqH2taCky+xyRt
                                                                                            MD5:191DC0EF79CDC68B1844A94BC73AEE88
                                                                                            SHA1:2B7DB28A8C2323A14407E43E218715A36158DB33
                                                                                            SHA-256:B0E7CABD1A223EF6451FD4AE928572055B22FC63B5F371EE49972CF388691B57
                                                                                            SHA-512:709CF324FC0B6D89BE81E5EE48A2D61A41E377B996CADD352D4184F4637EB85397597B1E4535871E283E9C3505A482669B5CB794DA50F9414EC2387E68B4FA01
                                                                                            Malicious:false
                                                                                            Preview:MDMP....... .......& .b........................................8.......4...d;..........`.......8...........T............................"...........$...................................................................U...........B......P%......Lw................UK....T............ .b.............................0..................P.a.c.i.f.i.c. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................P.a.c.i.f.i.c. .D.a.y.l.i.g.h.t. .T.i.m.e...........................................1.7.1.3.4...1...a.m.d.6.4.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.....................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                            Process:C:\Windows\System32\WerFault.exe
                                                                                            File Type:XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
                                                                                            Category:dropped
                                                                                            Size (bytes):8646
                                                                                            Entropy (8bit):3.696598208795042
                                                                                            Encrypted:false
                                                                                            SSDEEP:192:Rrl7r3GLNir0EK8BP6YGUkgmfDlSXxeGCprh89bGxvfeim:RrlsNiIEK8BP6YdkgmfDlSheAG5fC
                                                                                            MD5:40BF037801D50E291C1B65BFA395E04A
                                                                                            SHA1:E10F89051026918A25473E49D4E91FE8FD6735FD
                                                                                            SHA-256:B0408DE1CA28E2902AAE256A973CDFF739C59F6C9EDAB444092D5CC440DF744F
                                                                                            SHA-512:A3876ADED38275A45C6C5B374782C80DA1A4E7C538384200E20754A5B6538F36DCB7CDF4AB4F6B29E30DA84CA195DD3A24C0DEB3546EBB85A360640AB4317355
                                                                                            Malicious:false
                                                                                            Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.7.1.3.4.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.7.1.3.4...1...a.m.d.6.4.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.1.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.1.0.3.3.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.6.3.9.2.<./.P.i.d.>.......
                                                                                            Process:C:\Windows\System32\WerFault.exe
                                                                                            File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                            Category:dropped
                                                                                            Size (bytes):4892
                                                                                            Entropy (8bit):4.503059182583706
                                                                                            Encrypted:false
                                                                                            SSDEEP:48:cvIwSD8zs1JgtBI9zzWgc8sqYjBXD8fm8M4JCUUCU3znFryq8vhU3zhCZESC5SWd:uITfPFCgrsqYmJRixW29CVvWd
                                                                                            MD5:2F4EC41581B49FB8AFE3767C5DFCDC28
                                                                                            SHA1:F0E8328B868C2948A8A625B3A40ABB541E099F03
                                                                                            SHA-256:C42E2844483C39B87ABB47C5BE3E1443DA09F3E47E208E11130551C07F39C112
                                                                                            SHA-512:06B04D56E25798023B0DA16D38E5C73237155DCDAA0DD8012A964DA8665BA502B332B1A4DE9BE7BFDF4DC893D09BC54635A03E290F1C27CEC1690660FF58FE3B
                                                                                            Malicious:false
                                                                                            Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="17134" />.. <arg nm="vercsdbld" val="1" />.. <arg nm="verqfe" val="1" />.. <arg nm="csdbld" val="1" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="1033" />.. <arg nm="geoid" val="244" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="1527299" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.1.17134.0-11.0.47" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="4096" />..
                                                                                            Process:C:\Windows\System32\WerFault.exe
                                                                                            File Type:XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
                                                                                            Category:dropped
                                                                                            Size (bytes):8644
                                                                                            Entropy (8bit):3.6935217149271566
                                                                                            Encrypted:false
                                                                                            SSDEEP:192:Rrl7r3GLNifPLjK8TV6Y0DKLgmfDlSXxeGCprT89bUG5f28m:RrlsNin3K8TV6YuKLgmfDlShe6Uwfk
                                                                                            MD5:9ABA4357D65865805EB905250F66C970
                                                                                            SHA1:82C323AFE58DCAA6F9554499409DA121282F5C86
                                                                                            SHA-256:F6CDD509686834F212B4CF2DC1674B3CC4437AD7FF48277D5EB268DED2D8FE7B
                                                                                            SHA-512:5B5349FA5DBE6968FA3287335CE44673F8F2D60A267F8F2B731C4EB00F38752DBAF13ED9C6F11FF2ACF9EAC3E5F084DA2464A255142D95DEDE95C5ED9CAAA0C3
                                                                                            Malicious:false
                                                                                            Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.7.1.3.4.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.7.1.3.4...1...a.m.d.6.4.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.1.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.1.0.3.3.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.6.4.0.0.<./.P.i.d.>.......
                                                                                            Process:C:\Windows\System32\WerFault.exe
                                                                                            File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                            Category:dropped
                                                                                            Size (bytes):4892
                                                                                            Entropy (8bit):4.503470881783907
                                                                                            Encrypted:false
                                                                                            SSDEEP:48:cvIwSD8zs1JgtBI9zzWgc8sqYjBL8fm8M4JCUUCU3znFVcRPyq8vhU3zyeZESC5K:uITfPFCgrsqY+JRikPW2ZVvzd
                                                                                            MD5:431EB6DF13785F6C63E2A6BC9ACC6F36
                                                                                            SHA1:F48D2A6F0C73E50E26EB6E6CAD09577FA49ECDB3
                                                                                            SHA-256:B3BCD9DDB579E187AB53D00DBBB7312CB35AB2E262EE5BE6883155374D80B28A
                                                                                            SHA-512:40A2FD4B5E151BCAF22A9564B72F7537A2BDF6EBB17019A1F57DFCEE0273CF2E360C0BD0376A9F3AA9E19202A0EB5B51BF92555B9280E63D80F2D8D45BAAA67A
                                                                                            Malicious:false
                                                                                            Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="17134" />.. <arg nm="vercsdbld" val="1" />.. <arg nm="verqfe" val="1" />.. <arg nm="csdbld" val="1" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="1033" />.. <arg nm="geoid" val="244" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="1527299" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.1.17134.0-11.0.47" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="4096" />..
                                                                                            Process:C:\Windows\System32\regsvr32.exe
                                                                                            File Type:Microsoft Cabinet archive data, 61480 bytes, 1 file
                                                                                            Category:dropped
                                                                                            Size (bytes):61480
                                                                                            Entropy (8bit):7.9951219482618905
                                                                                            Encrypted:true
                                                                                            SSDEEP:1536:kmu7iDG/SCACih0/8uIGantJdjFpTE8lTeNjiXKGgUN:CeGf5gKsG4vdjFpjlYeX9gUN
                                                                                            MD5:B9F21D8DB36E88831E5352BB82C438B3
                                                                                            SHA1:4A3C330954F9F65A2F5FD7E55800E46CE228A3E2
                                                                                            SHA-256:998E0209690A48ED33B79AF30FC13851E3E3416BED97E3679B6030C10CAB361E
                                                                                            SHA-512:D4A2AC7C14227FBAF8B532398FB69053F0A0D913273F6917027C8CADBBA80113FDBEC20C2A7EB31B7BB57C99F9FDECCF8576BE5F39346D8B564FC72FB1699476
                                                                                            Malicious:false
                                                                                            Preview:MSCF....(.......,...................I........y.........Tbr .authroot.stl..$..4..CK..<Tk...c_.d....A.K.....Y.f....!.))$7*I.....e..eKT..k....n.3.......S..9.s.....3H.Mh......qV.=M6.=.4.F.....V:F..]......B`....Q...c"U.0.n....J.....4.....i7s..:.27....._...+).lE..he.4|.?,...h....7..PA..b.,. .....#1+..o...g.....2n1m...=.......Dp.;..f..ljX.Dx..r<'.1RI3B0<w.D.z..)D|..8<..c+..'XH..K,.Y..d.j.<.A.......l_lVb[w..rDp...'.....nL....!G.F....f.fX..r.. ?.....v(...L..<.\.Z..g;.>.0v...P ......|...A..(..x...T0.`g...c..7.U?...9.p..a..&..9......sV..l0..D..fhi..h.F....q...y.....Mq].4..Z.....={L....AS..9.....:.:.........+..P.N....EAQ.V. sr.....y.B.`.Efe..8../....$...y-.q.J.......nP...2.Q8...O........M.@\.>=X....V..z.4.=.@...ws.N.M3.S.c?.....C4]?..\.K.9......^...CU......O....X.`........._.gU...*..V.{V6..m..D.-|.Q.t.7.....9.~....[...I.<e...~$..>......s.I.S....~1..IV.2Ri:..]R!8...q...l.X.%.)@......2.gb,t...}..;...@.Z..<q..y..:...e3..cY.we.$....z..| .#.......I...
                                                                                            Process:C:\Windows\System32\regsvr32.exe
                                                                                            File Type:data
                                                                                            Category:modified
                                                                                            Size (bytes):330
                                                                                            Entropy (8bit):3.1185612910488687
                                                                                            Encrypted:false
                                                                                            SSDEEP:6:kKcACoJN+SkQlPlEGYRMY9z+4KlDA3RUesJ21:UAMkPlE99SNxAhUesE1
                                                                                            MD5:951CC9AC7425A64AA395521F06259B42
                                                                                            SHA1:05ED226B7FE278D17D6740D8B762D708C7360B85
                                                                                            SHA-256:C0CAF9E1064B3532F60B0E6030FA971DAE74E4F5BE8A682BB24F86A219256FE5
                                                                                            SHA-512:CA9ECF6A09DC148B11F470D0DBF841E35210A52EC074ED8BD27DD01F4AF1D8F4454DC000934A0CBF1A9A72DF231E4C5BD0584D260834973C7ED8AD9BAA91CB0B
                                                                                            Malicious:false
                                                                                            Preview:p...... ............hn..(....................................................... ........3k/"[......(...........(...h.t.t.p.:././.c.t.l.d.l...w.i.n.d.o.w.s.u.p.d.a.t.e...c.o.m./.m.s.d.o.w.n.l.o.a.d./.u.p.d.a.t.e./.v.3./.s.t.a.t.i.c./.t.r.u.s.t.e.d.r./.e.n./.a.u.t.h.r.o.o.t.s.t.l...c.a.b...".8.0.3.3.6.b.2.f.2.2.5.b.d.8.1.:.0."...
                                                                                            Process:C:\Windows\System32\svchost.exe
                                                                                            File Type:ASCII text, with no line terminators
                                                                                            Category:dropped
                                                                                            Size (bytes):55
                                                                                            Entropy (8bit):4.306461250274409
                                                                                            Encrypted:false
                                                                                            SSDEEP:3:YDQRWu83XfAw2fHbY:YMRl83Xt2f7Y
                                                                                            MD5:DCA83F08D448911A14C22EBCACC5AD57
                                                                                            SHA1:91270525521B7FE0D986DB19747F47D34B6318AD
                                                                                            SHA-256:2B4B2D4A06044AD0BD2AE3287CFCBECD90B959FEB2F503AC258D7C0A235D6FE9
                                                                                            SHA-512:96F3A02DC4AE302A30A376FC7082002065C7A35ECB74573DE66254EFD701E8FD9E9D867A2C8ABEB4C482738291B715D4965A0D2412663FDF1EE6CBC0BA9FBACA
                                                                                            Malicious:false
                                                                                            Preview:{"fontSetUri":"fontset-2017-04.json","baseUri":"fonts"}
                                                                                            Process:C:\Program Files\Windows Defender\MpCmdRun.exe
                                                                                            File Type:Little-endian UTF-16 Unicode text, with CRLF, CR line terminators
                                                                                            Category:modified
                                                                                            Size (bytes):9062
                                                                                            Entropy (8bit):3.1632571254221675
                                                                                            Encrypted:false
                                                                                            SSDEEP:192:cY+38+DJl+ibJ6+ioJJ+i3N+WtT+E9tD+Ett3d+E3zk+v:j+s+v+b+P+m+0+Q+q+D+v
                                                                                            MD5:86D372D32B844C0D01410AEC07466035
                                                                                            SHA1:2E4751A3D6B01CBCBB21ABE2895514A0759B8D7B
                                                                                            SHA-256:55D4BA2A2F176398473680E445147EE1A794FC607CB54B7EAED338A63A8B390C
                                                                                            SHA-512:D67837AD38381802D038829A1A4E19BE8CCCF4DA00CB6116364856FF01D08029735D7496EFF8022002667EA4B0BD1D41C944FDCDD5F34AF622303AF6B14E0EE4
                                                                                            Malicious:false
                                                                                            Preview:..........-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.....M.p.C.m.d.R.u.n.:. .C.o.m.m.a.n.d. .L.i.n.e.:. .".C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.W.i.n.d.o.w.s. .D.e.f.e.n.d.e.r.\.m.p.c.m.d.r.u.n...e.x.e.". .-.w.d.e.n.a.b.l.e..... .S.t.a.r.t. .T.i.m.e.:. .. T.h.u. .. J.u.n. .. 2.7. .. 2.0.1.9. .0.1.:.2.9.:.4.9.........M.p.E.n.s.u.r.e.P.r.o.c.e.s.s.M.i.t.i.g.a.t.i.o.n.P.o.l.i.c.y.:. .h.r. .=. .0.x.1.....W.D.E.n.a.b.l.e.....E.R.R.O.R.:. .M.p.W.D.E.n.a.b.l.e.(.T.R.U.E.). .f.a.i.l.e.d. .(.8.0.0.7.0.4.E.C.).....M.p.C.m.d.R.u.n.:. .E.n.d. .T.i.m.e.:. .. T.h.u. .. J.u.n. .. 2.7. .. 2.0.1.9. .0.1.:.2.9.:.4.9.....-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.............-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.
                                                                                            File type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                            Entropy (8bit):7.1527203772082135
                                                                                            TrID:
                                                                                            • Win64 Dynamic Link Library (generic) (102004/3) 86.43%
                                                                                            • Win64 Executable (generic) (12005/4) 10.17%
                                                                                            • Generic Win/DOS Executable (2004/3) 1.70%
                                                                                            • DOS Executable Generic (2002/1) 1.70%
                                                                                            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.01%
                                                                                            File name:nZNmWqwnpr.dll
                                                                                            File size:371200
                                                                                            MD5:828a9b1007dc45671d8a58e240c7c973
                                                                                            SHA1:8214993bb314d0f4c1889e507f88beeb3f6e5b63
                                                                                            SHA256:b59f16ee5e524814316a8be8ef54ea02f9a496267555e65eeb585e4ade85ffec
                                                                                            SHA512:7519b39dd811c3578e0002d5c4f35b2a6855092978004ecb2ca0030c1550aa3d38b346f83c43eb286ab9e1bf6209050078286ddb8bfea5f1d5dc3efcaafeeeef
                                                                                            SSDEEP:6144:hlNuuXQASByX7YxoJcXy16qFHJ7wwD1w3pq6jTK/V9OT0u:hlNu9ASByX7Qy/BJ7rGTK/V3
                                                                                            TLSH:34848E46F7F551E5E8F7C13889A23267F9317C948B38A7CB8A44466A4F70BA0E93D701
                                                                                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........8..ik..ik..ik...k..ik...k..ik...k..ik..hk..ik...k..ik...k..ik...k..ik...k..ikRich..ik................PE..d....{.b.........."
                                                                                            Icon Hash:74f0e4ecccdce0e4
                                                                                            Entrypoint:0x180003580
                                                                                            Entrypoint Section:.text
                                                                                            Digitally signed:false
                                                                                            Imagebase:0x180000000
                                                                                            Subsystem:windows gui
                                                                                            Image File Characteristics:EXECUTABLE_IMAGE, DLL, LARGE_ADDRESS_AWARE
                                                                                            DLL Characteristics:DYNAMIC_BASE, NX_COMPAT
                                                                                            Time Stamp:0x62877BF5 [Fri May 20 11:31:01 2022 UTC]
                                                                                            TLS Callbacks:
                                                                                            CLR (.Net) Version:
                                                                                            OS Version Major:5
                                                                                            OS Version Minor:2
                                                                                            File Version Major:5
                                                                                            File Version Minor:2
                                                                                            Subsystem Version Major:5
                                                                                            Subsystem Version Minor:2
                                                                                            Import Hash:ad5c5b0f3e2e211c551f3b5059e614d7
                                                                                            Instruction
                                                                                            dec esp
                                                                                            mov dword ptr [esp+18h], eax
                                                                                            mov dword ptr [esp+10h], edx
                                                                                            dec eax
                                                                                            mov dword ptr [esp+08h], ecx
                                                                                            dec eax
                                                                                            sub esp, 28h
                                                                                            cmp dword ptr [esp+38h], 01h
                                                                                            jne 00007F09ECB55DC7h
                                                                                            call 00007F09ECB5B127h
                                                                                            dec esp
                                                                                            mov eax, dword ptr [esp+40h]
                                                                                            mov edx, dword ptr [esp+38h]
                                                                                            dec eax
                                                                                            mov ecx, dword ptr [esp+30h]
                                                                                            call 00007F09ECB55DD4h
                                                                                            dec eax
                                                                                            add esp, 28h
                                                                                            ret
                                                                                            int3
                                                                                            int3
                                                                                            int3
                                                                                            int3
                                                                                            int3
                                                                                            int3
                                                                                            int3
                                                                                            int3
                                                                                            int3
                                                                                            int3
                                                                                            dec esp
                                                                                            mov dword ptr [esp+18h], eax
                                                                                            mov dword ptr [esp+10h], edx
                                                                                            dec eax
                                                                                            mov dword ptr [esp+08h], ecx
                                                                                            dec eax
                                                                                            sub esp, 48h
                                                                                            mov dword ptr [esp+20h], 00000001h
                                                                                            cmp dword ptr [esp+58h], 00000000h
                                                                                            jne 00007F09ECB55DD2h
                                                                                            cmp dword ptr [00028DE8h], 00000000h
                                                                                            jne 00007F09ECB55DC9h
                                                                                            xor eax, eax
                                                                                            jmp 00007F09ECB55EE4h
                                                                                            cmp dword ptr [esp+58h], 01h
                                                                                            je 00007F09ECB55DC9h
                                                                                            cmp dword ptr [esp+58h], 02h
                                                                                            jne 00007F09ECB55E10h
                                                                                            dec eax
                                                                                            cmp dword ptr [0001ED99h], 00000000h
                                                                                            je 00007F09ECB55DDAh
                                                                                            dec esp
                                                                                            mov eax, dword ptr [esp+60h]
                                                                                            mov edx, dword ptr [esp+58h]
                                                                                            dec eax
                                                                                            mov ecx, dword ptr [esp+50h]
                                                                                            call dword ptr [0001ED83h]
                                                                                            mov dword ptr [esp+20h], eax
                                                                                            cmp dword ptr [esp+20h], 00000000h
                                                                                            je 00007F09ECB55DD9h
                                                                                            dec esp
                                                                                            mov eax, dword ptr [esp+60h]
                                                                                            mov edx, dword ptr [esp+58h]
                                                                                            dec eax
                                                                                            mov ecx, dword ptr [esp+50h]
                                                                                            call 00007F09ECB55B2Ah
                                                                                            mov dword ptr [esp+20h], eax
                                                                                            cmp dword ptr [esp+20h], 00000000h
                                                                                            jne 00007F09ECB55DC9h
                                                                                            xor eax, eax
                                                                                            Programming Language:
                                                                                            • [LNK] VS2010 build 30319
                                                                                            • [ASM] VS2010 build 30319
                                                                                            • [ C ] VS2010 build 30319
                                                                                            • [C++] VS2010 build 30319
                                                                                            • [EXP] VS2010 build 30319
                                                                                            • [RES] VS2010 build 30319
                                                                                            • [IMP] VS2008 SP1 build 30729
                                                                                            NameVirtual AddressVirtual Size Is in Section
                                                                                            IMAGE_DIRECTORY_ENTRY_EXPORT0x2aab00x84.rdata
                                                                                            IMAGE_DIRECTORY_ENTRY_IMPORT0x2a1e40x50.rdata
                                                                                            IMAGE_DIRECTORY_ENTRY_RESOURCE0x300000x2e9fc.rsrc
                                                                                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x2f0000xfcc.pdata
                                                                                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x5f0000x294.reloc
                                                                                            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                            IMAGE_DIRECTORY_ENTRY_IAT0x220000x298.rdata
                                                                                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                            NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                            .text0x10000x203fa0x20400False0.405439983043zlib compressed data5.75409030586IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                                                                            .rdata0x220000x8b340x8c00False0.275474330357data4.41538934251IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                            .data0x2b0000x37980x1400False0.161328125data2.21550179132IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                                                                                            .pdata0x2f0000xfcc0x1000False0.5048828125data5.08183440168IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                            .rsrc0x300000x2e9fc0x2ea00False0.887011980563data7.85049584102IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                            .reloc0x5f0000x6fc0x800False0.21435546875data2.34217115221IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                                            NameRVASizeTypeLanguageCountry
                                                                                            RT_FONTDIR0x300a00x2e800dataEnglishUnited States
                                                                                            RT_MANIFEST0x5e8a00x15aASCII text, with CRLF line terminatorsEnglishUnited States
                                                                                            DLLImport
                                                                                            KERNEL32.dllGetTimeFormatA, GetDateFormatA, GetThreadLocale, FileTimeToSystemTime, VirtualAlloc, ExitProcess, CloseHandle, CreateFileW, SetStdHandle, GetCurrentThreadId, FlsSetValue, GetCommandLineA, TerminateProcess, GetCurrentProcess, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsDebuggerPresent, RtlVirtualUnwind, RtlLookupFunctionEntry, RtlCaptureContext, RtlUnwindEx, EncodePointer, FlsGetValue, FlsAlloc, FlsFree, SetLastError, GetLastError, HeapSize, HeapValidate, IsBadReadPtr, DecodePointer, GetProcAddress, GetModuleHandleW, SetHandleCount, GetStdHandle, InitializeCriticalSectionAndSpinCount, GetFileType, GetStartupInfoW, DeleteCriticalSection, GetModuleFileNameA, FreeEnvironmentStringsW, WideCharToMultiByte, GetEnvironmentStringsW, HeapSetInformation, GetVersion, HeapCreate, HeapDestroy, QueryPerformanceCounter, GetTickCount, GetCurrentProcessId, GetSystemTimeAsFileTime, EnterCriticalSection, LeaveCriticalSection, GetACP, GetOEMCP, GetCPInfo, IsValidCodePage, HeapAlloc, GetModuleFileNameW, HeapReAlloc, HeapQueryInformation, HeapFree, WriteFile, LoadLibraryW, LCMapStringW, MultiByteToWideChar, GetStringTypeW, OutputDebugStringA, WriteConsoleW, OutputDebugStringW, RaiseException, RtlPcToFileHeader, SetFilePointer, GetConsoleCP, GetConsoleMode, FlushFileBuffers
                                                                                            USER32.dllMessageBoxA
                                                                                            ole32.dllCoTaskMemFree, CoTaskMemAlloc, CoLoadLibrary
                                                                                            NameOrdinalAddress
                                                                                            AddIn_FileTime10x180001140
                                                                                            AddIn_SystemTime20x1800010b0
                                                                                            DllRegisterServer30x180003110
                                                                                            Language of compilation systemCountry where language is spokenMap
                                                                                            EnglishUnited States
                                                                                            TimestampSource PortDest PortSource IPDest IP
                                                                                            May 22, 2022 22:47:51.768026114 CEST497518080192.168.2.3165.22.73.229
                                                                                            May 22, 2022 22:47:51.810519934 CEST808049751165.22.73.229192.168.2.3
                                                                                            May 22, 2022 22:47:51.810641050 CEST497518080192.168.2.3165.22.73.229
                                                                                            May 22, 2022 22:47:51.872684956 CEST497518080192.168.2.3165.22.73.229
                                                                                            May 22, 2022 22:47:51.915220022 CEST808049751165.22.73.229192.168.2.3
                                                                                            May 22, 2022 22:47:51.927194118 CEST808049751165.22.73.229192.168.2.3
                                                                                            May 22, 2022 22:47:51.927237034 CEST808049751165.22.73.229192.168.2.3
                                                                                            May 22, 2022 22:47:51.928262949 CEST497518080192.168.2.3165.22.73.229
                                                                                            May 22, 2022 22:47:56.588371038 CEST497518080192.168.2.3165.22.73.229
                                                                                            May 22, 2022 22:47:56.631516933 CEST808049751165.22.73.229192.168.2.3
                                                                                            May 22, 2022 22:47:56.632893085 CEST497518080192.168.2.3165.22.73.229
                                                                                            May 22, 2022 22:47:56.646068096 CEST497518080192.168.2.3165.22.73.229
                                                                                            May 22, 2022 22:47:56.732049942 CEST808049751165.22.73.229192.168.2.3
                                                                                            May 22, 2022 22:47:56.894896984 CEST808049751165.22.73.229192.168.2.3
                                                                                            May 22, 2022 22:47:56.895087957 CEST497518080192.168.2.3165.22.73.229
                                                                                            May 22, 2022 22:47:59.897660971 CEST808049751165.22.73.229192.168.2.3
                                                                                            May 22, 2022 22:47:59.897691011 CEST808049751165.22.73.229192.168.2.3
                                                                                            May 22, 2022 22:47:59.897851944 CEST497518080192.168.2.3165.22.73.229
                                                                                            May 22, 2022 22:49:42.062587023 CEST497518080192.168.2.3165.22.73.229
                                                                                            May 22, 2022 22:49:42.062660933 CEST497518080192.168.2.3165.22.73.229

                                                                                            Click to jump to process

                                                                                            Target ID:0
                                                                                            Start time:22:48:12
                                                                                            Start date:22/05/2022
                                                                                            Path:C:\Windows\System32\loaddll64.exe
                                                                                            Wow64 process (32bit):false
                                                                                            Commandline:loaddll64.exe "C:\Users\user\Desktop\nZNmWqwnpr.dll"
                                                                                            Imagebase:0x7ff681440000
                                                                                            File size:140288 bytes
                                                                                            MD5 hash:4E8A40CAD6CCC047914E3A7830A2D8AA
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language
                                                                                            Reputation:high

                                                                                            Target ID:1
                                                                                            Start time:22:48:13
                                                                                            Start date:22/05/2022
                                                                                            Path:C:\Windows\System32\cmd.exe
                                                                                            Wow64 process (32bit):false
                                                                                            Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\nZNmWqwnpr.dll",#1
                                                                                            Imagebase:0x7ff64c2f0000
                                                                                            File size:273920 bytes
                                                                                            MD5 hash:4E2ACF4F8A396486AB4268C94A6A245F
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language
                                                                                            Reputation:high

                                                                                            Target ID:2
                                                                                            Start time:22:48:13
                                                                                            Start date:22/05/2022
                                                                                            Path:C:\Windows\System32\regsvr32.exe
                                                                                            Wow64 process (32bit):false
                                                                                            Commandline:regsvr32.exe /s C:\Users\user\Desktop\nZNmWqwnpr.dll
                                                                                            Imagebase:0x7ff7e65c0000
                                                                                            File size:24064 bytes
                                                                                            MD5 hash:D78B75FC68247E8A63ACBA846182740E
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language
                                                                                            Yara matches:
                                                                                            • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000002.00000002.270663795.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                            • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000002.00000002.270419921.0000000000E70000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                            Reputation:high

                                                                                            Target ID:3
                                                                                            Start time:22:48:13
                                                                                            Start date:22/05/2022
                                                                                            Path:C:\Windows\System32\rundll32.exe
                                                                                            Wow64 process (32bit):false
                                                                                            Commandline:rundll32.exe "C:\Users\user\Desktop\nZNmWqwnpr.dll",#1
                                                                                            Imagebase:0x7ff69ecf0000
                                                                                            File size:69632 bytes
                                                                                            MD5 hash:73C519F050C20580F8A62C849D49215A
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language
                                                                                            Yara matches:
                                                                                            • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000003.00000002.282755590.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                            • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000003.00000000.268708020.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                            • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000003.00000000.267967898.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                            • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000003.00000002.283075821.0000018D2A510000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                            • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000003.00000000.268100792.0000018D2A510000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                            • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000003.00000000.269299891.0000018D2A510000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                            Reputation:high

                                                                                            Target ID:4
                                                                                            Start time:22:48:13
                                                                                            Start date:22/05/2022
                                                                                            Path:C:\Windows\System32\rundll32.exe
                                                                                            Wow64 process (32bit):false
                                                                                            Commandline:rundll32.exe C:\Users\user\Desktop\nZNmWqwnpr.dll,AddIn_FileTime
                                                                                            Imagebase:0x7ff69ecf0000
                                                                                            File size:69632 bytes
                                                                                            MD5 hash:73C519F050C20580F8A62C849D49215A
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language
                                                                                            Yara matches:
                                                                                            • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000004.00000000.271421970.00000171DB6C0000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                            • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000004.00000000.271026048.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                            • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000004.00000002.284818839.00000171DB6C0000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                            • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000004.00000002.284590424.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                            • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000004.00000000.269618350.00000171DB6C0000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                            • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000004.00000000.269259649.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                            Reputation:high

                                                                                            Target ID:6
                                                                                            Start time:22:48:17
                                                                                            Start date:22/05/2022
                                                                                            Path:C:\Windows\System32\rundll32.exe
                                                                                            Wow64 process (32bit):false
                                                                                            Commandline:rundll32.exe C:\Users\user\Desktop\nZNmWqwnpr.dll,AddIn_SystemTime
                                                                                            Imagebase:0x7ff69ecf0000
                                                                                            File size:69632 bytes
                                                                                            MD5 hash:73C519F050C20580F8A62C849D49215A
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language
                                                                                            Reputation:high

                                                                                            Target ID:8
                                                                                            Start time:22:48:18
                                                                                            Start date:22/05/2022
                                                                                            Path:C:\Windows\System32\regsvr32.exe
                                                                                            Wow64 process (32bit):false
                                                                                            Commandline:C:\Windows\system32\regsvr32.exe "C:\Windows\system32\NhxQyxUKKifP\KOsPrJ.dll"
                                                                                            Imagebase:0x7ff7e65c0000
                                                                                            File size:24064 bytes
                                                                                            MD5 hash:D78B75FC68247E8A63ACBA846182740E
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language
                                                                                            Yara matches:
                                                                                            • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000008.00000002.653751676.00000000001D0000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                            • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000008.00000002.654694067.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                            Reputation:high

                                                                                            Target ID:9
                                                                                            Start time:22:48:19
                                                                                            Start date:22/05/2022
                                                                                            Path:C:\Windows\System32\WerFault.exe
                                                                                            Wow64 process (32bit):false
                                                                                            Commandline:C:\Windows\system32\WerFault.exe -u -p 6392 -s 324
                                                                                            Imagebase:0x7ff6c7fd0000
                                                                                            File size:494488 bytes
                                                                                            MD5 hash:2AFFE478D86272288BBEF5A00BBEF6A0
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language
                                                                                            Reputation:high

                                                                                            Target ID:10
                                                                                            Start time:22:48:20
                                                                                            Start date:22/05/2022
                                                                                            Path:C:\Windows\System32\WerFault.exe
                                                                                            Wow64 process (32bit):false
                                                                                            Commandline:C:\Windows\system32\WerFault.exe -u -p 6400 -s 316
                                                                                            Imagebase:0x7ff6c7fd0000
                                                                                            File size:494488 bytes
                                                                                            MD5 hash:2AFFE478D86272288BBEF5A00BBEF6A0
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language
                                                                                            Reputation:high

                                                                                            Target ID:11
                                                                                            Start time:22:48:21
                                                                                            Start date:22/05/2022
                                                                                            Path:C:\Windows\System32\rundll32.exe
                                                                                            Wow64 process (32bit):false
                                                                                            Commandline:rundll32.exe C:\Users\user\Desktop\nZNmWqwnpr.dll,DllRegisterServer
                                                                                            Imagebase:0x7ff69ecf0000
                                                                                            File size:69632 bytes
                                                                                            MD5 hash:73C519F050C20580F8A62C849D49215A
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language

                                                                                            Target ID:12
                                                                                            Start time:22:48:28
                                                                                            Start date:22/05/2022
                                                                                            Path:C:\Windows\System32\svchost.exe
                                                                                            Wow64 process (32bit):false
                                                                                            Commandline:C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
                                                                                            Imagebase:0x7ff73c930000
                                                                                            File size:51288 bytes
                                                                                            MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language

                                                                                            Target ID:13
                                                                                            Start time:22:48:31
                                                                                            Start date:22/05/2022
                                                                                            Path:C:\Windows\System32\svchost.exe
                                                                                            Wow64 process (32bit):false
                                                                                            Commandline:c:\windows\system32\svchost.exe -k localservice -p -s CDPSvc
                                                                                            Imagebase:0x7ff73c930000
                                                                                            File size:51288 bytes
                                                                                            MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:false
                                                                                            Programmed in:C, C++ or other language

                                                                                            Target ID:14
                                                                                            Start time:22:48:32
                                                                                            Start date:22/05/2022
                                                                                            Path:C:\Windows\System32\svchost.exe
                                                                                            Wow64 process (32bit):false
                                                                                            Commandline:c:\windows\system32\svchost.exe -k networkservice -p -s DoSvc
                                                                                            Imagebase:0x7ff73c930000
                                                                                            File size:51288 bytes
                                                                                            MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:false
                                                                                            Programmed in:C, C++ or other language

                                                                                            Target ID:16
                                                                                            Start time:22:48:33
                                                                                            Start date:22/05/2022
                                                                                            Path:C:\Windows\System32\svchost.exe
                                                                                            Wow64 process (32bit):false
                                                                                            Commandline:C:\Windows\System32\svchost.exe -k NetworkService -p
                                                                                            Imagebase:0x7ff73c930000
                                                                                            File size:51288 bytes
                                                                                            MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:false
                                                                                            Programmed in:C, C++ or other language

                                                                                            Target ID:18
                                                                                            Start time:22:48:33
                                                                                            Start date:22/05/2022
                                                                                            Path:C:\Windows\System32\SgrmBroker.exe
                                                                                            Wow64 process (32bit):false
                                                                                            Commandline:C:\Windows\system32\SgrmBroker.exe
                                                                                            Imagebase:0x7ff7a0680000
                                                                                            File size:163336 bytes
                                                                                            MD5 hash:D3170A3F3A9626597EEE1888686E3EA6
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language

                                                                                            Target ID:19
                                                                                            Start time:22:48:34
                                                                                            Start date:22/05/2022
                                                                                            Path:C:\Windows\System32\svchost.exe
                                                                                            Wow64 process (32bit):false
                                                                                            Commandline:c:\windows\system32\svchost.exe -k localservicenetworkrestricted -p -s wscsvc
                                                                                            Imagebase:0x7ff73c930000
                                                                                            File size:51288 bytes
                                                                                            MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:false
                                                                                            Programmed in:C, C++ or other language

                                                                                            Target ID:21
                                                                                            Start time:22:48:43
                                                                                            Start date:22/05/2022
                                                                                            Path:C:\Windows\System32\svchost.exe
                                                                                            Wow64 process (32bit):false
                                                                                            Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
                                                                                            Imagebase:0x7ff73c930000
                                                                                            File size:51288 bytes
                                                                                            MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language

                                                                                            Target ID:22
                                                                                            Start time:22:48:45
                                                                                            Start date:22/05/2022
                                                                                            Path:C:\Windows\System32\svchost.exe
                                                                                            Wow64 process (32bit):false
                                                                                            Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p
                                                                                            Imagebase:0x7ff73c930000
                                                                                            File size:51288 bytes
                                                                                            MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language

                                                                                            Target ID:24
                                                                                            Start time:22:49:25
                                                                                            Start date:22/05/2022
                                                                                            Path:C:\Windows\System32\svchost.exe
                                                                                            Wow64 process (32bit):false
                                                                                            Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p
                                                                                            Imagebase:0x7ff73c930000
                                                                                            File size:51288 bytes
                                                                                            MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language

                                                                                            Target ID:27
                                                                                            Start time:22:49:35
                                                                                            Start date:22/05/2022
                                                                                            Path:C:\Program Files\Windows Defender\MpCmdRun.exe
                                                                                            Wow64 process (32bit):false
                                                                                            Commandline:"C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable
                                                                                            Imagebase:0x7ff7b0320000
                                                                                            File size:455656 bytes
                                                                                            MD5 hash:A267555174BFA53844371226F482B86B
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:false
                                                                                            Programmed in:C, C++ or other language

                                                                                            Target ID:28
                                                                                            Start time:22:49:35
                                                                                            Start date:22/05/2022
                                                                                            Path:C:\Windows\System32\conhost.exe
                                                                                            Wow64 process (32bit):false
                                                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                            Imagebase:0x7ff7c9170000
                                                                                            File size:625664 bytes
                                                                                            MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:false
                                                                                            Programmed in:C, C++ or other language

                                                                                            Target ID:30
                                                                                            Start time:22:49:52
                                                                                            Start date:22/05/2022
                                                                                            Path:C:\Windows\System32\svchost.exe
                                                                                            Wow64 process (32bit):false
                                                                                            Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p
                                                                                            Imagebase:0x7ff73c930000
                                                                                            File size:51288 bytes
                                                                                            MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language

                                                                                            Target ID:32
                                                                                            Start time:22:50:04
                                                                                            Start date:22/05/2022
                                                                                            Path:C:\Windows\System32\svchost.exe
                                                                                            Wow64 process (32bit):false
                                                                                            Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p
                                                                                            Imagebase:0x7ff73c930000
                                                                                            File size:51288 bytes
                                                                                            MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language

                                                                                            No disassembly