Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
MIpuuSiSZ4.dll

Overview

General Information

Sample Name:MIpuuSiSZ4.dll
Analysis ID:671702
MD5:1dd34935a785a419fb552b5086ea682e
SHA1:c6c966e4ba623f9972273de07b842ffbb9a9efce
SHA256:8b5a10f9a8f2b25057442111a01faf021ef7e048eab875a4078a44758d952c6f
Tags:exeOpenCTIBRSandboxed
Infos:

Detection

Emotet
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Yara detected Emotet
System process connects to network (likely due to code injection or exploit)
Antivirus detection for URL or domain
Snort IDS alert for network traffic
Changes security center settings (notifications, updates, antivirus, firewall)
C2 URLs / IPs found in malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Queries the volume information (name, serial number etc) of a device
One or more processes crash
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query locales information (e.g. system language)
Deletes files inside the Windows folder
May sleep (evasive loops) to hinder dynamic analysis
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Uses code obfuscation techniques (call, push, ret)
Creates files inside the system directory
PE file contains sections with non-standard names
Internet Provider seen in connection with other malware
Detected potential crypto function
Contains functionality to query CPU information (cpuid)
Found potential string decryption / allocating functions
Sample execution stops while process was sleeping (likely an evasion)
Contains functionality to enumerate running services
Contains functionality which may be used to detect a debugger (GetProcessHeap)
IP address seen in connection with other malware
AV process strings found (often used to terminate AV products)
Tries to load missing DLLs
Drops PE files to the windows directory (C:\Windows)
Detected TCP or UDP traffic on non-standard ports
Checks if the current process is being debugged
Registers a DLL
Queries disk information (often used to detect virtual machines)
Found large amount of non-executed APIs
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • loaddll64.exe (PID: 6740 cmdline: loaddll64.exe "C:\Users\user\Desktop\MIpuuSiSZ4.dll" MD5: 4E8A40CAD6CCC047914E3A7830A2D8AA)
    • cmd.exe (PID: 6756 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\MIpuuSiSZ4.dll",#1 MD5: 4E2ACF4F8A396486AB4268C94A6A245F)
      • rundll32.exe (PID: 6776 cmdline: rundll32.exe "C:\Users\user\Desktop\MIpuuSiSZ4.dll",#1 MD5: 73C519F050C20580F8A62C849D49215A)
        • WerFault.exe (PID: 1992 cmdline: C:\Windows\system32\WerFault.exe -u -p 6776 -s 324 MD5: 2AFFE478D86272288BBEF5A00BBEF6A0)
    • regsvr32.exe (PID: 6764 cmdline: regsvr32.exe /s C:\Users\user\Desktop\MIpuuSiSZ4.dll MD5: D78B75FC68247E8A63ACBA846182740E)
      • regsvr32.exe (PID: 5660 cmdline: C:\Windows\system32\regsvr32.exe "C:\Windows\system32\GAjjZRZVj\QFdWkQKkPokX.dll" MD5: D78B75FC68247E8A63ACBA846182740E)
    • rundll32.exe (PID: 6792 cmdline: rundll32.exe C:\Users\user\Desktop\MIpuuSiSZ4.dll,AddStroke MD5: 73C519F050C20580F8A62C849D49215A)
      • WerFault.exe (PID: 3660 cmdline: C:\Windows\system32\WerFault.exe -u -p 6792 -s 328 MD5: 2AFFE478D86272288BBEF5A00BBEF6A0)
    • rundll32.exe (PID: 6836 cmdline: rundll32.exe C:\Users\user\Desktop\MIpuuSiSZ4.dll,AddWordsToWordList MD5: 73C519F050C20580F8A62C849D49215A)
    • rundll32.exe (PID: 6852 cmdline: rundll32.exe C:\Users\user\Desktop\MIpuuSiSZ4.dll,AdviseInkChange MD5: 73C519F050C20580F8A62C849D49215A)
    • regsvr32.exe (PID: 5852 cmdline: C:\Windows\system32\regsvr32.exe "C:\Windows\system32\ZcjkHmdxs\qpwRIIkrlFzB.dll" MD5: D78B75FC68247E8A63ACBA846182740E)
  • svchost.exe (PID: 6880 cmdline: C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 6984 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 908 cmdline: c:\windows\system32\svchost.exe -k localservice -p -s CDPSvc MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 6380 cmdline: c:\windows\system32\svchost.exe -k networkservice -p -s DoSvc MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 1524 cmdline: C:\Windows\System32\svchost.exe -k NetworkService -p MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • SgrmBroker.exe (PID: 5112 cmdline: C:\Windows\system32\SgrmBroker.exe MD5: D3170A3F3A9626597EEE1888686E3EA6)
  • svchost.exe (PID: 1428 cmdline: c:\windows\system32\svchost.exe -k localservicenetworkrestricted -p -s wscsvc MD5: 32569E403279B3FD2EDB7EBD036273FA)
    • MpCmdRun.exe (PID: 6256 cmdline: "C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable MD5: A267555174BFA53844371226F482B86B)
      • conhost.exe (PID: 6352 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • svchost.exe (PID: 7100 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 5604 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 3308 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 3052 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • cleanup
{"C2 list": ["101.69.85.108:20", "200.18.0.0:1", "208.9.0.0:2512", "82.10.0.0:2642", "144.1.49.1:2", "20.7.0.0:1", "176.6.0.0:1", "232.6.0.0:1", "136.6.0.0:1", "24.7.0.0:1", "248.6.0.0:1", "68.7.0.0:1", "80.7.0.0:1", "172.6.0.0:1", "96.7.0.0:1", "84.7.0.0:1", "4.7.0.0:1", "100.7.0.0:1", "112.7.0.0:1", "116.7.0.0:1", "180.6.0.0:1", "8.7.0.0:1", "236.6.0.0:1", "64.7.0.0:1", "204.6.0.0:1"]}
SourceRuleDescriptionAuthorStrings
00000000.00000002.364452628.0000015738060000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
    00000002.00000002.345850399.0000000000710000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
      00000005.00000002.351700174.0000020000071000.00000020.00001000.00020000.00000000.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
        0000000C.00000002.662977936.0000000002D11000.00000020.00001000.00020000.00000000.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
          00000003.00000000.348541554.0000022FC4510000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
            Click to see the 18 entries
            SourceRuleDescriptionAuthorStrings
            2.2.regsvr32.exe.710000.0.raw.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
              3.0.rundll32.exe.22fc4510000.1.raw.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
                12.2.regsvr32.exe.2cb0000.0.raw.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
                  3.0.rundll32.exe.22fc4510000.3.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
                    4.0.rundll32.exe.14980010000.3.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
                      Click to see the 17 entries
                      No Sigma rule has matched
                      Timestamp:192.168.2.7174.138.33.494979470802404316 07/22/22-13:58:44.263207
                      SID:2404316
                      Source Port:49794
                      Destination Port:7080
                      Protocol:TCP
                      Classtype:A Network Trojan was detected

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection

                      barindex
                      Source: MIpuuSiSZ4.dllVirustotal: Detection: 72%Perma Link
                      Source: MIpuuSiSZ4.dllMetadefender: Detection: 54%Perma Link
                      Source: MIpuuSiSZ4.dllReversingLabs: Detection: 88%
                      Source: https://174.138.33.49:7080/xAvira URL Cloud: Label: malware
                      Source: https://174.138.33.49/TAvira URL Cloud: Label: malware
                      Source: https://174.138.33.49:7080/temURL Reputation: Label: malware
                      Source: https://174.138.33.49:7080/944Avira URL Cloud: Label: malware
                      Source: 0000000C.00000002.662226882.000000000132F000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: Emotet {"C2 list": ["101.69.85.108:20", "200.18.0.0:1", "208.9.0.0:2512", "82.10.0.0:2642", "144.1.49.1:2", "20.7.0.0:1", "176.6.0.0:1", "232.6.0.0:1", "136.6.0.0:1", "24.7.0.0:1", "248.6.0.0:1", "68.7.0.0:1", "80.7.0.0:1", "172.6.0.0:1", "96.7.0.0:1", "84.7.0.0:1", "4.7.0.0:1", "100.7.0.0:1", "112.7.0.0:1", "116.7.0.0:1", "180.6.0.0:1", "8.7.0.0:1", "236.6.0.0:1", "64.7.0.0:1", "204.6.0.0:1"]}
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001800427CC _invalid_parameter_noinfo,_invalid_parameter_noinfo,FindFirstFileExW,FindNextFileW,FindClose,FindClose,
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001800427CC _invalid_parameter_noinfo,_invalid_parameter_noinfo,FindFirstFileExW,FindNextFileW,FindClose,FindClose,
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180042F88 FindFirstFileExW,
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180043464 FindFirstFileExW,FindNextFileW,FindClose,FindClose,
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800427CC _invalid_parameter_noinfo,_invalid_parameter_noinfo,FindFirstFileExW,FindNextFileW,FindClose,FindClose,
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800427CC _invalid_parameter_noinfo,_invalid_parameter_noinfo,FindFirstFileExW,FindNextFileW,FindClose,FindClose,
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180042F88 FindFirstFileExW,
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180043464 FindFirstFileExW,FindNextFileW,FindClose,FindClose,
                      Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_02D2C9F0 FindFirstFileW,FindNextFileW,

                      Networking

                      barindex
                      Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 174.138.33.49 7080
                      Source: TrafficSnort IDS: 2404316 ET CNC Feodo Tracker Reported CnC Server TCP group 9 192.168.2.7:49794 -> 174.138.33.49:7080
                      Source: Malware configuration extractorIPs: 101.69.85.108:20
                      Source: Malware configuration extractorIPs: 200.18.0.0:1
                      Source: Malware configuration extractorIPs: 208.9.0.0:2512
                      Source: Malware configuration extractorIPs: 82.10.0.0:2642
                      Source: Malware configuration extractorIPs: 144.1.49.1:2
                      Source: Malware configuration extractorIPs: 20.7.0.0:1
                      Source: Malware configuration extractorIPs: 176.6.0.0:1
                      Source: Malware configuration extractorIPs: 232.6.0.0:1
                      Source: Malware configuration extractorIPs: 136.6.0.0:1
                      Source: Malware configuration extractorIPs: 24.7.0.0:1
                      Source: Malware configuration extractorIPs: 248.6.0.0:1
                      Source: Malware configuration extractorIPs: 68.7.0.0:1
                      Source: Malware configuration extractorIPs: 80.7.0.0:1
                      Source: Malware configuration extractorIPs: 172.6.0.0:1
                      Source: Malware configuration extractorIPs: 96.7.0.0:1
                      Source: Malware configuration extractorIPs: 84.7.0.0:1
                      Source: Malware configuration extractorIPs: 4.7.0.0:1
                      Source: Malware configuration extractorIPs: 100.7.0.0:1
                      Source: Malware configuration extractorIPs: 112.7.0.0:1
                      Source: Malware configuration extractorIPs: 116.7.0.0:1
                      Source: Malware configuration extractorIPs: 180.6.0.0:1
                      Source: Malware configuration extractorIPs: 8.7.0.0:1
                      Source: Malware configuration extractorIPs: 236.6.0.0:1
                      Source: Malware configuration extractorIPs: 64.7.0.0:1
                      Source: Malware configuration extractorIPs: 204.6.0.0:1
                      Source: Joe Sandbox ViewASN Name: DIGITALOCEAN-ASNUS DIGITALOCEAN-ASNUS
                      Source: Joe Sandbox ViewASN Name: MICROSOFT-CORP-MSN-AS-BLOCKUS MICROSOFT-CORP-MSN-AS-BLOCKUS
                      Source: Joe Sandbox ViewIP Address: 174.138.33.49 174.138.33.49
                      Source: global trafficTCP traffic: 192.168.2.3:49761 -> 174.138.33.49:7080
                      Source: unknownTCP traffic detected without corresponding DNS query: 174.138.33.49
                      Source: unknownTCP traffic detected without corresponding DNS query: 174.138.33.49
                      Source: unknownTCP traffic detected without corresponding DNS query: 174.138.33.49
                      Source: unknownTCP traffic detected without corresponding DNS query: 174.138.33.49
                      Source: unknownTCP traffic detected without corresponding DNS query: 174.138.33.49
                      Source: unknownTCP traffic detected without corresponding DNS query: 174.138.33.49
                      Source: unknownTCP traffic detected without corresponding DNS query: 174.138.33.49
                      Source: unknownTCP traffic detected without corresponding DNS query: 174.138.33.49
                      Source: unknownTCP traffic detected without corresponding DNS query: 174.138.33.49
                      Source: unknownTCP traffic detected without corresponding DNS query: 174.138.33.49
                      Source: unknownTCP traffic detected without corresponding DNS query: 174.138.33.49
                      Source: svchost.exe, 00000020.00000003.605789439.00000298A2773000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Try it free for 30 days, no strings attached\r\n\r\nLike us on Facebook: http://www.facebook.com/spotify \r\nFollow us on Twitter: http://twitter.com/spotify","ProductTitle":"Spotify - Music and Podcasts","SearchTitles":[{"SearchTitleString":"Spotify","SearchTitleType":"SearchHint"},{"SearchTitleString":"Music","SearchTitleType":"SearchHint"},{"SearchTitleString":"music apps","SearchTitleType":"SearchHint"},{"SearchTitleString":"free music","SearchTitleType":"SearchHint"},{"SearchTitleString":"podcasts","SearchTitleType":"SearchHint"},{"SearchTitleString":"streaming","SearchTitleType":"SearchHint"},{"SearchTitleString":"soundcloud","SearchTitleType":"SearchHint"}],"Language":"en-us","Markets":["US","DZ","AR","AU","AT","BH","BD","BE","BR","BG","CA","CL","CN","CO","CR","HR","CY","CZ","DK","EG","EE","FI","FR","DE","GR","GT","HK","HU","IS","IN","ID","IQ","IE","IL","IT","JP","JO","KZ","KE","KW","LV","LB","LI","LT","LU","MY","MT","MR","MX","MA","NL","NZ","NG","NO","OM","PK","PE","PH","PL","PT","QA","RO","RU","SA","RS","SG","SK","SI","ZA","KR","ES","SE","CH","TW","TH","TT","TN","TR","UA","AE","GB","VN","YE","LY","LK","UY","VE","AF","AX","AL","AS","AO","AI","AQ","AG","AM","AW","BO","BQ","BA","BW","BV","IO","BN","BF","BI","KH","CM","CV","KY","CF","TD","TL","DJ","DM","DO","EC","SV","GQ","ER","ET","FK","FO","FJ","GF","PF","TF","GA","GM","GE","GH","GI","GL","GD","GP","GU","GG","GN","GW","GY","HT","HM","HN","AZ","BS","BB","BY","BZ","BJ","BM","BT","KM","CG","CD","CK","CX","CC","CI","CW","JM","SJ","JE","KI","KG","LA","LS","LR","MO","MK","MG","MW","IM","MH","MQ","MU","YT","FM","MD","MN","MS","MZ","MM","NA","NR","NP","MV","ML","NC","NI","NE","NU","NF","PW","PS","PA","PG","PY","RE","RW","BL","MF","WS","ST","SN","MP","PN","SX","SB","SO","SC","SL","GS","SH","KN","LC","PM","VC","TJ","TZ","TG","TK","TO","TM","TC","TV","UM","UG", equals www.facebook.com (Facebook)
                      Source: svchost.exe, 00000020.00000003.605789439.00000298A2773000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Try it free for 30 days, no strings attached\r\n\r\nLike us on Facebook: http://www.facebook.com/spotify \r\nFollow us on Twitter: http://twitter.com/spotify","ProductTitle":"Spotify - Music and Podcasts","SearchTitles":[{"SearchTitleString":"Spotify","SearchTitleType":"SearchHint"},{"SearchTitleString":"Music","SearchTitleType":"SearchHint"},{"SearchTitleString":"music apps","SearchTitleType":"SearchHint"},{"SearchTitleString":"free music","SearchTitleType":"SearchHint"},{"SearchTitleString":"podcasts","SearchTitleType":"SearchHint"},{"SearchTitleString":"streaming","SearchTitleType":"SearchHint"},{"SearchTitleString":"soundcloud","SearchTitleType":"SearchHint"}],"Language":"en-us","Markets":["US","DZ","AR","AU","AT","BH","BD","BE","BR","BG","CA","CL","CN","CO","CR","HR","CY","CZ","DK","EG","EE","FI","FR","DE","GR","GT","HK","HU","IS","IN","ID","IQ","IE","IL","IT","JP","JO","KZ","KE","KW","LV","LB","LI","LT","LU","MY","MT","MR","MX","MA","NL","NZ","NG","NO","OM","PK","PE","PH","PL","PT","QA","RO","RU","SA","RS","SG","SK","SI","ZA","KR","ES","SE","CH","TW","TH","TT","TN","TR","UA","AE","GB","VN","YE","LY","LK","UY","VE","AF","AX","AL","AS","AO","AI","AQ","AG","AM","AW","BO","BQ","BA","BW","BV","IO","BN","BF","BI","KH","CM","CV","KY","CF","TD","TL","DJ","DM","DO","EC","SV","GQ","ER","ET","FK","FO","FJ","GF","PF","TF","GA","GM","GE","GH","GI","GL","GD","GP","GU","GG","GN","GW","GY","HT","HM","HN","AZ","BS","BB","BY","BZ","BJ","BM","BT","KM","CG","CD","CK","CX","CC","CI","CW","JM","SJ","JE","KI","KG","LA","LS","LR","MO","MK","MG","MW","IM","MH","MQ","MU","YT","FM","MD","MN","MS","MZ","MM","NA","NR","NP","MV","ML","NC","NI","NE","NU","NF","PW","PS","PA","PG","PY","RE","RW","BL","MF","WS","ST","SN","MP","PN","SX","SB","SO","SC","SL","GS","SH","KN","LC","PM","VC","TJ","TZ","TG","TK","TO","TM","TC","TV","UM","UG", equals www.twitter.com (Twitter)
                      Source: svchost.exe, 00000020.00000003.605789439.00000298A2773000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000020.00000003.605830890.00000298A2784000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Try it free for 30 days, no strings attached\r\n\r\nLike us on Facebook: http://www.facebook.com/spotify \r\nFollow us on Twitter: http://twitter.com/spotify","ProductTitle":"Spotify - Music and Podcasts","SearchTitles":[{"SearchTitleString":"Spotify","SearchTitleType":"SearchHint"},{"SearchTitleString":"Music","SearchTitleType":"SearchHint"},{"SearchTitleString":"music apps","SearchTitleType":"SearchHint"},{"SearchTitleString":"free music","SearchTitleType":"SearchHint"},{"SearchTitleString":"podcasts","SearchTitleType":"SearchHint"},{"SearchTitleString":"streaming","SearchTitleType":"SearchHint"},{"SearchTitleString":"soundcloud","SearchTitleType":"SearchHint"}],"Language":"en-us","Markets":["US","DZ","AR","AU","AT","BH","BD","BE","BR","BG","CA","CL","CN","CO","CR","HR","CY","CZ","DK","EG","EE","FI","FR","DE","GR","GT","HK","HU","IS","IN","ID","IQ","IE","IL","IT","JP","JO","KZ","KE","KW","LV","LB","LI","LT","LU","MY","MT","MR","MX","MA","NL","NZ","NG","NO","OM","PK","PE","PH","PL","PT","QA","RO","RU","SA","RS","SG","SK","SI","ZA","KR","ES","SE","CH","TW","TH","TT","TN","TR","UA","AE","GB","VN","YE","LY","LK","UY","VE","AF","AX","AL","AS","AO","AI","AQ","AG","AM","AW","BO","BQ","BA","BW","BV","IO","BN","BF","BI","KH","CM","CV","KY","CF","TD","TL","DJ","DM","DO","EC","SV","GQ","ER","ET","FK","FO","FJ","GF","PF","TF","GA","GM","GE","GH","GI","GL","GD","GP","GU","GG","GN","GW","GY","HT","HM","HN","AZ","BS","BB","BY","BZ","BJ","BM","BT","KM","CG","CD","CK","CX","CC","CI","CW","JM","SJ","JE","KI","KG","LA","LS","LR","MO","MK","MG","MW","IM","MH","MQ","MU","YT","FM","MD","MN","MS","MZ","MM","NA","NR","NP","MV","ML","NC","NI","NE","NU","NF","PW","PS","PA","PG","PY","RE","RW","BL","MF","WS","ST","SN","MP","PN","SX","SB","SO","SC","SL","GS","SH","KN","LC","PM","VC","TJ","TZ","TG","TK","TO","TM","TC","TV","UM","UG","VI","VG","WF","EH","ZM","ZW","UZ","VU","SR","SZ","AD","MC","SM","ME","VA","NEUTRAL"]}],"MarketProperties":[{"RelatedProducts":[],"Markets":["US"]}],"ProductASchema":"Product;3","ProductBSchema":"ProductUnifiedApp;3","ProductId":"9NCBCSZSJRSB","Properties":{"PackageFamilyName":"SpotifyAB.SpotifyMusic_zpdnekdrzrea0","PackageIdentityName":"SpotifyAB.SpotifyMusic","PublisherCertificateName":"CN=453637B3-4E12-4CDF-B0D3-2A3C863BF6EF","XboxCrossGenSetId":null,"XboxConsoleGenOptimized":null,"XboxConsoleGenCompatible":null},"AlternateIds":[{"IdType":"LegacyWindowsStoreProductId","Value":"ceac5d3f-8a4f-40e1-9a67-76d9108c7cb5"},{"IdType":"LegacyWindowsPhoneProductId","Value":"caac1b9d-621b-4f96-b143-e10e1397740a"},{"IdType":"XboxTitleId","Value":"1681279293"}],"IngestionSource":"DCE","IsMicrosoftProduct":false,"PreferredSkuId":"0010","ProductType":"Application","ValidationData":{"PassedValidation":false,"RevisionId":"2022-07-22T07:55:01.8237416Z||.||b7e2ac48-308b-4ab0-ad70-c01dd95863e0||1152921505695074449||Null||fullrelease","ValidationResultUri":""},"MerchandizingTags":[],"PartD":"","ProductFamily":"Apps","ProductKind":"Application","DisplaySkuAvailab
                      Source: svchost.exe, 00000020.00000003.605789439.00000298A2773000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000020.00000003.605830890.00000298A2784000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Try it free for 30 days, no strings attached\r\n\r\nLike us on Facebook: http://www.facebook.com/spotify \r\nFollow us on Twitter: http://twitter.com/spotify","ProductTitle":"Spotify - Music and Podcasts","SearchTitles":[{"SearchTitleString":"Spotify","SearchTitleType":"SearchHint"},{"SearchTitleString":"Music","SearchTitleType":"SearchHint"},{"SearchTitleString":"music apps","SearchTitleType":"SearchHint"},{"SearchTitleString":"free music","SearchTitleType":"SearchHint"},{"SearchTitleString":"podcasts","SearchTitleType":"SearchHint"},{"SearchTitleString":"streaming","SearchTitleType":"SearchHint"},{"SearchTitleString":"soundcloud","SearchTitleType":"SearchHint"}],"Language":"en-us","Markets":["US","DZ","AR","AU","AT","BH","BD","BE","BR","BG","CA","CL","CN","CO","CR","HR","CY","CZ","DK","EG","EE","FI","FR","DE","GR","GT","HK","HU","IS","IN","ID","IQ","IE","IL","IT","JP","JO","KZ","KE","KW","LV","LB","LI","LT","LU","MY","MT","MR","MX","MA","NL","NZ","NG","NO","OM","PK","PE","PH","PL","PT","QA","RO","RU","SA","RS","SG","SK","SI","ZA","KR","ES","SE","CH","TW","TH","TT","TN","TR","UA","AE","GB","VN","YE","LY","LK","UY","VE","AF","AX","AL","AS","AO","AI","AQ","AG","AM","AW","BO","BQ","BA","BW","BV","IO","BN","BF","BI","KH","CM","CV","KY","CF","TD","TL","DJ","DM","DO","EC","SV","GQ","ER","ET","FK","FO","FJ","GF","PF","TF","GA","GM","GE","GH","GI","GL","GD","GP","GU","GG","GN","GW","GY","HT","HM","HN","AZ","BS","BB","BY","BZ","BJ","BM","BT","KM","CG","CD","CK","CX","CC","CI","CW","JM","SJ","JE","KI","KG","LA","LS","LR","MO","MK","MG","MW","IM","MH","MQ","MU","YT","FM","MD","MN","MS","MZ","MM","NA","NR","NP","MV","ML","NC","NI","NE","NU","NF","PW","PS","PA","PG","PY","RE","RW","BL","MF","WS","ST","SN","MP","PN","SX","SB","SO","SC","SL","GS","SH","KN","LC","PM","VC","TJ","TZ","TG","TK","TO","TM","TC","TV","UM","UG","VI","VG","WF","EH","ZM","ZW","UZ","VU","SR","SZ","AD","MC","SM","ME","VA","NEUTRAL"]}],"MarketProperties":[{"RelatedProducts":[],"Markets":["US"]}],"ProductASchema":"Product;3","ProductBSchema":"ProductUnifiedApp;3","ProductId":"9NCBCSZSJRSB","Properties":{"PackageFamilyName":"SpotifyAB.SpotifyMusic_zpdnekdrzrea0","PackageIdentityName":"SpotifyAB.SpotifyMusic","PublisherCertificateName":"CN=453637B3-4E12-4CDF-B0D3-2A3C863BF6EF","XboxCrossGenSetId":null,"XboxConsoleGenOptimized":null,"XboxConsoleGenCompatible":null},"AlternateIds":[{"IdType":"LegacyWindowsStoreProductId","Value":"ceac5d3f-8a4f-40e1-9a67-76d9108c7cb5"},{"IdType":"LegacyWindowsPhoneProductId","Value":"caac1b9d-621b-4f96-b143-e10e1397740a"},{"IdType":"XboxTitleId","Value":"1681279293"}],"IngestionSource":"DCE","IsMicrosoftProduct":false,"PreferredSkuId":"0010","ProductType":"Application","ValidationData":{"PassedValidation":false,"RevisionId":"2022-07-22T07:55:01.8237416Z||.||b7e2ac48-308b-4ab0-ad70-c01dd95863e0||1152921505695074449||Null||fullrelease","ValidationResultUri":""},"MerchandizingTags":[],"PartD":"","ProductFamily":"Apps","ProductKind":"Application","DisplaySkuAvailab
                      Source: svchost.exe, 00000009.00000002.626913081.000002413A266000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000C.00000002.662226882.000000000132F000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000C.00000003.444256705.000000000132F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000020.00000002.649942559.00000298A2711000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
                      Source: svchost.exe, 00000009.00000002.626913081.000002413A266000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000020.00000002.649749481.00000298A1EEA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.ver)
                      Source: regsvr32.exe, 0000000C.00000002.661740445.00000000012D3000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000C.00000003.444163231.00000000012E2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en
                      Source: regsvr32.exe, 0000000C.00000003.444256705.000000000132F000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000C.00000002.662502712.000000000136D000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000C.00000003.445329795.000000000136D000.00000004.00000020.00020000.00000000.sdmp, 77EC63BDA74BD0D0E0426DC8F80085060.12.drString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
                      Source: regsvr32.exe, 0000000C.00000003.443936950.000000000138D000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000C.00000003.445018013.00000000034A1000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000C.00000002.663236738.000000000350D000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000C.00000003.445267551.000000000350D000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000C.00000003.445153458.00000000034E7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab?e0707f5d6733f
                      Source: regsvr32.exe, 0000000C.00000002.662226882.000000000132F000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000C.00000003.444256705.000000000132F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cabvH
                      Source: regsvr32.exe, 0000000C.00000003.444256705.000000000132F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/pXX
                      Source: svchost.exe, 00000020.00000003.627116814.00000298A279A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://help.disneyplus.com.
                      Source: svchost.exe, 00000012.00000002.405412295.000002D970813000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.bingmapsportal.com
                      Source: svchost.exe, 00000010.00000002.661987254.000002D0F6641000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://%s.dnet.xboxlive.com
                      Source: svchost.exe, 00000010.00000002.661987254.000002D0F6641000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://%s.xboxlive.com
                      Source: svchost.exe, 00000010.00000002.661987254.000002D0F6641000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://%s.xboxlive.come
                      Source: regsvr32.exe, 0000000C.00000002.661956267.0000000001301000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000C.00000003.444203872.0000000001301000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://174.138.33.49/
                      Source: regsvr32.exe, 0000000C.00000002.661956267.0000000001301000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000C.00000003.444203872.0000000001301000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://174.138.33.49/T
                      Source: regsvr32.exe, 0000000C.00000002.661956267.0000000001301000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000C.00000002.661740445.00000000012D3000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000C.00000003.444163231.00000000012E2000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000C.00000003.444203872.0000000001301000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://174.138.33.49:7080/
                      Source: regsvr32.exe, 0000000C.00000002.661740445.00000000012D3000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000C.00000003.444163231.00000000012E2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://174.138.33.49:7080/944
                      Source: regsvr32.exe, 0000000C.00000002.661740445.00000000012D3000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000C.00000003.444163231.00000000012E2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://174.138.33.49:7080/tem
                      Source: regsvr32.exe, 0000000C.00000002.661956267.0000000001301000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000C.00000003.444203872.0000000001301000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://174.138.33.49:7080/x
                      Source: svchost.exe, 00000010.00000002.661987254.000002D0F6641000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://activity.windows.com
                      Source: svchost.exe, 00000012.00000003.404914654.000002D970861000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://appexmapsappupdate.blob.core.windows.net
                      Source: svchost.exe, 00000010.00000002.661987254.000002D0F6641000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bn2.notify.windows.com/v2/register/xplatform/device
                      Source: svchost.exe, 00000010.00000002.661987254.000002D0F6641000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://co4-df.notify.windows.com/v2/register/xplatform/device
                      Source: svchost.exe, 00000012.00000003.404945537.000002D97085A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.ditu.live.com/REST/v1/Imagery/Copyright/
                      Source: svchost.exe, 00000012.00000002.405473479.000002D97085C000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000012.00000003.404945537.000002D97085A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.ditu.live.com/REST/v1/JsonFilter/VenueMaps/data/
                      Source: svchost.exe, 00000012.00000003.404914654.000002D970861000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.ditu.live.com/REST/v1/Locations
                      Source: svchost.exe, 00000012.00000002.405452602.000002D97083D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.ditu.live.com/REST/v1/Routes/
                      Source: svchost.exe, 00000012.00000002.405473479.000002D97085C000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000012.00000003.404945537.000002D97085A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.ditu.live.com/REST/v1/Traffic/Incidents/
                      Source: svchost.exe, 00000012.00000003.404914654.000002D970861000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.ditu.live.com/mapcontrol/logging.ashx
                      Source: svchost.exe, 00000012.00000002.405466984.000002D97084E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000012.00000003.404854812.000002D970849000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.ditu.live.com/mapcontrol/mapconfiguration.ashx?name=native&v=
                      Source: svchost.exe, 00000012.00000002.405473479.000002D97085C000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000012.00000003.404945537.000002D97085A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/JsonFilter/VenueMaps/data/
                      Source: svchost.exe, 00000012.00000003.404914654.000002D970861000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Locations
                      Source: svchost.exe, 00000012.00000002.405452602.000002D97083D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Routes/
                      Source: svchost.exe, 00000012.00000003.404914654.000002D970861000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Routes/Driving
                      Source: svchost.exe, 00000012.00000003.404914654.000002D970861000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Routes/Transit
                      Source: svchost.exe, 00000012.00000003.404914654.000002D970861000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Routes/Walking
                      Source: svchost.exe, 00000012.00000002.405457932.000002D970842000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000012.00000003.404980940.000002D970840000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000012.00000003.405017263.000002D970841000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Transit/Schedules/
                      Source: svchost.exe, 00000012.00000002.405457932.000002D970842000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000012.00000003.404980940.000002D970840000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000012.00000003.405017263.000002D970841000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/mapcontrol/HumanScaleServices/GetBubbles.ashx?n=
                      Source: svchost.exe, 00000012.00000003.404914654.000002D970861000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/mapcontrol/logging.ashx
                      Source: svchost.exe, 00000012.00000002.405473479.000002D97085C000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000012.00000003.404980940.000002D970840000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000012.00000003.404945537.000002D97085A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/webservices/v1/LoggingService/LoggingService.svc/Log?
                      Source: svchost.exe, 00000020.00000003.627116814.00000298A279A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://disneyplus.com/legal.
                      Source: svchost.exe, 00000012.00000003.404945537.000002D97085A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dynamic.api.tiles.ditu.live.com/odvs/gd?pv=1&r=
                      Source: svchost.exe, 00000012.00000002.405473479.000002D97085C000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000012.00000003.404945537.000002D97085A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dynamic.api.tiles.ditu.live.com/odvs/gdi?pv=1&r=
                      Source: svchost.exe, 00000012.00000003.404945537.000002D97085A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dynamic.api.tiles.ditu.live.com/odvs/gdv?pv=1&r=
                      Source: svchost.exe, 00000012.00000003.404854812.000002D970849000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dynamic.t
                      Source: svchost.exe, 00000012.00000003.404914654.000002D970861000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dynamic.t0.tiles.ditu.live.com/comp/gen.ashx
                      Source: svchost.exe, 00000012.00000002.405452602.000002D97083D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ecn.dev.virtualearth.net/REST/v1/Imagery/Copyright/
                      Source: svchost.exe, 00000012.00000003.383087363.000002D970831000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ecn.dev.virtualearth.net/mapcontrol/mapconfiguration.ashx?name=native&v=
                      Source: svchost.exe, 00000020.00000003.620490256.00000298A2781000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000020.00000003.620519716.00000298A2C19000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000020.00000003.620333446.00000298A279D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000020.00000003.620402747.00000298A2C02000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000020.00000003.620475663.00000298A27AD000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000020.00000003.620374463.00000298A27AD000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000020.00000003.620430135.00000298A2C03000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://support.hotspotshield.com/
                      Source: svchost.exe, 00000012.00000002.405452602.000002D97083D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/comp/gen.ashx
                      Source: svchost.exe, 00000012.00000002.405412295.000002D970813000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000012.00000002.405452602.000002D97083D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gd?pv=1&r=
                      Source: svchost.exe, 00000012.00000003.383087363.000002D970831000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdi?pv=1&r=
                      Source: svchost.exe, 00000012.00000003.404980940.000002D970840000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000012.00000003.405005326.000002D970845000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdv?pv=1&r=
                      Source: svchost.exe, 00000012.00000003.383087363.000002D970831000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gri?pv=1&r=
                      Source: svchost.exe, 00000012.00000003.383087363.000002D970831000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000012.00000002.405447191.000002D97083A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t0.ssl.ak.tiles.virtualearth.net/tiles/gen
                      Source: svchost.exe, 00000012.00000002.405412295.000002D970813000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t0.tiles.ditu.live.com/tiles/gen
                      Source: svchost.exe, 00000020.00000003.627116814.00000298A279A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.disneyplus.com/legal/privacy-policy
                      Source: svchost.exe, 00000020.00000003.627116814.00000298A279A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.disneyplus.com/legal/your-california-privacy-rights
                      Source: svchost.exe, 00000020.00000003.620490256.00000298A2781000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000020.00000003.620519716.00000298A2C19000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000020.00000003.620333446.00000298A279D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000020.00000003.620402747.00000298A2C02000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000020.00000003.620475663.00000298A27AD000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000020.00000003.620374463.00000298A27AD000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000020.00000003.620430135.00000298A2C03000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.hotspotshield.com/terms/
                      Source: svchost.exe, 00000020.00000003.620490256.00000298A2781000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000020.00000003.620519716.00000298A2C19000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000020.00000003.620333446.00000298A279D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000020.00000003.620402747.00000298A2C02000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000020.00000003.620475663.00000298A27AD000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000020.00000003.620374463.00000298A27AD000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000020.00000003.620430135.00000298A2C03000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.pango.co/privacy
                      Source: svchost.exe, 00000020.00000003.629383351.00000298A279F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.tiktok.com/legal/report/feedback

                      E-Banking Fraud

                      barindex
                      Source: Yara matchFile source: 0000000C.00000002.661348004.0000000001298000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 2.2.regsvr32.exe.710000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.0.rundll32.exe.22fc4510000.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 12.2.regsvr32.exe.2cb0000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.0.rundll32.exe.22fc4510000.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.0.rundll32.exe.14980010000.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.0.rundll32.exe.22fc4510000.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.rundll32.exe.20000010000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.rundll32.exe.22fc4510000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.14980010000.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.2.rundll32.exe.1a029ee0000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.0.rundll32.exe.22fc4510000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.2.rundll32.exe.1a029ee0000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.0.rundll32.exe.14980010000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.rundll32.exe.22fc4510000.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.rundll32.exe.20000010000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.0.rundll32.exe.14980010000.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.regsvr32.exe.710000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.0.rundll32.exe.14980010000.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.14980010000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 12.2.regsvr32.exe.2cb0000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.loaddll64.exe.15738060000.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.loaddll64.exe.15738060000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000002.364452628.0000015738060000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.345850399.0000000000710000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.351700174.0000020000071000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000C.00000002.662977936.0000000002D11000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000000.348541554.0000022FC4510000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.351638703.0000020000010000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.377797661.0000022FC4510000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.378702987.0000014980010000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.378747717.0000014980071000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.346021007.0000000002061000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000000.348813253.0000022FC4571000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000006.00000002.358968494.000001A029F41000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000000.338942505.0000022FC4510000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.377880147.0000022FC4571000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000C.00000002.662715077.0000000002CB0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000000.352241442.0000014980010000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000000.338998123.0000022FC4571000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.364805521.0000015739971000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000000.345097590.0000014980010000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000000.349632978.0000014980071000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000000.352325443.0000014980071000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000006.00000002.358868561.000001A029EE0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 6776 -s 324
                      Source: C:\Windows\System32\regsvr32.exeFile deleted: C:\Windows\System32\GAjjZRZVj\QFdWkQKkPokX.dll:Zone.IdentifierJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeFile created: C:\Windows\system32\ZcjkHmdxs\Jump to behavior
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018001A098
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018003E0D0
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001800180E0
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018001C0F4
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018001E134
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018002C150
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018001A1A0
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018004E1C0
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001800181E4
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180026288
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018001A2A8
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001800182E8
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018001E320
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018001C324
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180058338
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018001A3B4
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001800063E0
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001800183F0
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018002E420
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018001E508
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018001C510
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180028514
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018002C51C
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180018548
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018005A5A4
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180026618
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180018650
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180028668
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018004067C
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018004E6F0
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018001C6FC
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018001E734
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180018758
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001800427CC
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001800287E4
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180018860
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180016870
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001800548F8
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018002C900
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018001E91C
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018001C92C
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180016978
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001800189CC
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001800427CC
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180026A24
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180016A80
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018001EB04
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180018B10
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018001CB18
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180016B8C
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018004EBA0
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180018C54
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018002CCCC
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180016CE8
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018001CD00
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018001ED30
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180018D98
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180016DF0
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018004CEC8
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180018EC8
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180016EF8
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018001EF18
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018001CF2C
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180042F88
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180018FD0
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180017000
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001800190D8
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018001F104
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018001D114
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180017158
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018002D19C
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001800191E0
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180017260
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018001D2FC
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018004F2FC
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018001B310
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018001F334
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180019338
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180017368
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180019440
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180017474
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018002B49C
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018001B4F8
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018001F520
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018001D528
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180019548
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001800175D0
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180019650
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018002D680
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001800176D4
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018001F70C
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018001D710
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018001B724
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018004972C
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180025740
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001800197B8
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018004B7E8
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180017800
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001800198C0
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018002B8D0
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018001D8FC
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180017908
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018001B90C
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018001F93C
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001800199C8
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180017A10
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018003FA6C
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180045A70
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180019AD0
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180025AD4
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018001BAF4
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180017B18
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018001DB2C
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018002DB50
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180019C28
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180017C70
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018003BD00
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018001DD18
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018002BD1C
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018001BD20
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180019D30
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180017D78
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180045A70
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180019E38
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180017E80
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180049EEC
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180025EFC
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018001DF04
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018001BF08
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018003FF1C
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180019F40
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180017F88
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018002DFAC
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000015738050000
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000015739987414
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000001573998A804
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000001573999B6BC
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000001573998FC70
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000015739981B88
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000001573998EB08
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000015739975B18
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000015739988B3C
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000015739997E28
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000001573998BD64
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000001573997CCC8
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000015739971014
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000001573998B028
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000015739994020
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000001573998406C
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000015739982F94
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000001573998EFAC
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000001573997DFCC
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000001573997EFCC
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000001573997AFE4
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000015739992F3C
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000015739996F3C
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000015739973F40
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000015739978F5C
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000001573999BE90
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000015739989EC0
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000015739994EF4
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000015739998EE8
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000015739983210
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000001573997E254
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000001573998D254
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000001573998F238
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000157399741A8
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000001573997B1A8
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000015739975198
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000157399731F0
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000015739986110
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000001573997B0F8
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000001573998A130
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000015739987144
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000001573999A088
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000015739974078
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000157399790D4
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000157399730BC
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000001573999B0EC
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000001573998A408
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000157399913FC
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000015739986418
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000001573999344C
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000001573997C458
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000157399793AC
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000157399893E0
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000001573997B3E4
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000001573999A304
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000015739993304
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000157399912FC
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000001573997D300
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000015739994330
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000001573999632C
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000015739971368
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000015739984368
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000001573997F290
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000001573997B2BC
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000157399772E0
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000015739983610
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000001573998762C
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000001573998D620
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000001573998F61C
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000015739992638
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000015739984594
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000015739986594
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000001573997F580
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000015739980578
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000001573998C5AC
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000157399725D8
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000015739996520
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000001573999B570
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000001573998B558
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000001573999155C
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000015739975484
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000001573998E4A8
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000157399814A0
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000001573998D4D0
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000157399824E4
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000157399984DC
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000015739972820
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000001573997F850
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000015739974848
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000001573998484C
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000001573998E7A4
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000157399827A4
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000157399907D0
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000015739972708
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000015739989720
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000001573998C720
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000015739983724
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000001573998F764
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000015739980680
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000157399846B4
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000157399916A8
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000157399976A4
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000001573997B698
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000015739976698
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000001573999369C
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000157399736E0
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000015739999A40
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000015739998990
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000015739986978
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000001573998D9C4
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000157399829BC
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000001573998C9F0
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000157399899F4
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000001573997D92C
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000015739994918
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000015739974948
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000001573999093C
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000001573999796C
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000015739993894
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000001573998C8C0
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000157399878C4
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000001573997BC08
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000015739987C30
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000015739985C50
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000015739992C48
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000015739990C68
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000015739980C68
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000015739974C64
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000015739983BB4
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000015739977BB4
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000001573998ABD8
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000015739992AFC
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000015739998B28
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000015739987B24
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000015739996B40
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000001573997CB6C
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000001573997DB74
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000015739980B60
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000015739973A9C
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000001573997FAD0
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000015739990AC4
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000015739991AE0
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000015739972AE4
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000015739992E04
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000015739995E30
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000015739983E18
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000001573997FE58
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000001573998EE5C
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000001573997ED84
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000015739987DB0
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000015739999DA8
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000015739993DD4
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000015739990DBC
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000015739972DC0
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000015739991D2C
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000001573999BD20
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000001573997BD24
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000015739983D1C
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000015739989D5C
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000015739977CAC
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000015739973CE8
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000001573998ACEC
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000015739978CE0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001A098
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018003E0D0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800180E0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001C0F4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001E134
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018002C150
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001A1A0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018004E1C0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800181E4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180026288
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001A2A8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800182E8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001E320
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001C324
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180058338
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001A3B4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800063E0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800183F0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018002E420
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001E508
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001C510
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180028514
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018002C51C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180018548
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018005A5A4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180026618
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180018650
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180028668
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018004067C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018004E6F0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001C6FC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001E734
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180018758
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800427CC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800287E4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180018860
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180016870
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800548F8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018002C900
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001E91C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001C92C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180016978
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800189CC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800427CC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180026A24
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180016A80
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001EB04
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180018B10
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001CB18
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180016B8C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018004EBA0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180018C54
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018002CCCC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180016CE8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001CD00
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001ED30
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180018D98
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180016DF0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018004CEC8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180018EC8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180016EF8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001EF18
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001CF2C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180042F88
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180018FD0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180017000
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800190D8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001F104
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001D114
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180017158
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018002D19C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800191E0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180017260
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001D2FC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018004F2FC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001B310
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001F334
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180019338
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180017368
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180019440
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180017474
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018002B49C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001B4F8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001F520
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001D528
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180019548
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800175D0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180019650
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018002D680
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800176D4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001F70C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001D710
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001B724
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018004972C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180025740
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800197B8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018004B7E8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180017800
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800198C0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018002B8D0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001D8FC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180017908
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001B90C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001F93C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800199C8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180017A10
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018003FA6C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180045A70
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180019AD0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180025AD4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001BAF4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180017B18
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001DB2C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018002DB50
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180019C28
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180017C70
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018003BD00
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001DD18
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018002BD1C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001BD20
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180019D30
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180017D78
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180045A70
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180019E38
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180017E80
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180049EEC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180025EFC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001DF04
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001BF08
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018003FF1C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180019F40
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180017F88
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018002DFAC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_006C0000
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0208B6BC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_02077414
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0207EB08
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_02065B18
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_02078B3C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_02071B88
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0207A804
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0207C8C0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_02087E28
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0206CCC8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0207BD64
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_02073210
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0207F238
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0206E254
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0207D254
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0206F290
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0206B2BC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_020672E0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_020812FC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0206D300
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0208A304
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_02083304
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0208632C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_02084330
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_02061368
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_02074368
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_020693AC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0206B3E4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_020793E0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_020813FC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_02061014
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_02084020
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0207B028
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0207406C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_02064078
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0208A088
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_020630BC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_020690D4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0208B0EC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0206B0F8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_02076110
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0207A130
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_02077144
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_02065198
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_020641A8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0206B1A8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_020631F0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_02073610
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0207F61C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0207D620
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0207762C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_02082638
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_02070680
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0208369C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0206B698
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_02066698
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_020816A8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_020876A4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_020746B4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_020636E0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_02062708
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_02073724
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_02079720
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0207C720
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0207F764
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0207E7A4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_020727A4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_020807D0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0207A408
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_02076418
                      Source: C:\Windows\System32\loaddll64.exeCode function: String function: 0000000180046D38 appears 44 times
                      Source: C:\Windows\System32\regsvr32.exeCode function: String function: 0000000180046D38 appears 44 times
                      Source: C:\Windows\System32\regsvr32.exeSection loaded: sfc.dll
                      Source: C:\Windows\System32\regsvr32.exeSection loaded: sfc.dll
                      Source: C:\Windows\System32\regsvr32.exeSection loaded: sfc.dll
                      Source: C:\Windows\System32\svchost.exeSection loaded: xboxlivetitleid.dll
                      Source: C:\Windows\System32\svchost.exeSection loaded: cdpsgshims.dll
                      Source: MIpuuSiSZ4.dllVirustotal: Detection: 72%
                      Source: MIpuuSiSZ4.dllMetadefender: Detection: 54%
                      Source: MIpuuSiSZ4.dllReversingLabs: Detection: 88%
                      Source: MIpuuSiSZ4.dllStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      Source: C:\Windows\System32\loaddll64.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                      Source: unknownProcess created: C:\Windows\System32\loaddll64.exe loaddll64.exe "C:\Users\user\Desktop\MIpuuSiSZ4.dll"
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\MIpuuSiSZ4.dll",#1
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\MIpuuSiSZ4.dll
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\MIpuuSiSZ4.dll",#1
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\MIpuuSiSZ4.dll,AddStroke
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\MIpuuSiSZ4.dll,AddWordsToWordList
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\MIpuuSiSZ4.dll,AdviseInkChange
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
                      Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\System32\regsvr32.exe C:\Windows\system32\regsvr32.exe "C:\Windows\system32\GAjjZRZVj\QFdWkQKkPokX.dll"
                      Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 6776 -s 324
                      Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 6792 -s 328
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\regsvr32.exe C:\Windows\system32\regsvr32.exe "C:\Windows\system32\ZcjkHmdxs\qpwRIIkrlFzB.dll"
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe c:\windows\system32\svchost.exe -k localservice -p -s CDPSvc
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe c:\windows\system32\svchost.exe -k networkservice -p -s DoSvc
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k NetworkService -p
                      Source: unknownProcess created: C:\Windows\System32\SgrmBroker.exe C:\Windows\system32\SgrmBroker.exe
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe c:\windows\system32\svchost.exe -k localservicenetworkrestricted -p -s wscsvc
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p
                      Source: C:\Windows\System32\svchost.exeProcess created: C:\Program Files\Windows Defender\MpCmdRun.exe "C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable
                      Source: C:\Program Files\Windows Defender\MpCmdRun.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\MIpuuSiSZ4.dll",#1
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\MIpuuSiSZ4.dll
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\MIpuuSiSZ4.dll,AddStroke
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\MIpuuSiSZ4.dll,AddWordsToWordList
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\MIpuuSiSZ4.dll,AdviseInkChange
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\regsvr32.exe C:\Windows\system32\regsvr32.exe "C:\Windows\system32\ZcjkHmdxs\qpwRIIkrlFzB.dll"
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\MIpuuSiSZ4.dll",#1
                      Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\System32\regsvr32.exe C:\Windows\system32\regsvr32.exe "C:\Windows\system32\GAjjZRZVj\QFdWkQKkPokX.dll"
                      Source: C:\Windows\System32\svchost.exeProcess created: C:\Program Files\Windows Defender\MpCmdRun.exe "C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable
                      Source: C:\Windows\System32\loaddll64.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32
                      Source: C:\Windows\System32\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\WER31C2.tmpJump to behavior
                      Source: classification engineClassification label: mal100.troj.evad.winDLL@33/16@0/28
                      Source: C:\Windows\System32\loaddll64.exeFile read: C:\Users\desktop.iniJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000001573998A804 Process32FirstW,CreateToolhelp32Snapshot,Process32NextW,FindCloseChangeNotification,
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\MIpuuSiSZ4.dll",#1
                      Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess6792
                      Source: C:\Windows\System32\conhost.exeMutant created: \BaseNamedObjects\Local\SM0:6352:120:WilError_01
                      Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess6776
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001800011AC LoadStringW,LoadStringW,FindResourceA,LoadResource,LockResource,
                      Source: C:\Windows\System32\svchost.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Windows\System32\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Windows\System32\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Windows\System32\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Windows\System32\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile read: C:\Windows\System32\drivers\etc\hosts
                      Source: C:\Windows\System32\svchost.exeFile read: C:\Windows\System32\drivers\etc\hosts
                      Source: MIpuuSiSZ4.dllStatic PE information: Image base 0x180000000 > 0x60000000
                      Source: MIpuuSiSZ4.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                      Source: MIpuuSiSZ4.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                      Source: MIpuuSiSZ4.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                      Source: MIpuuSiSZ4.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                      Source: MIpuuSiSZ4.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                      Source: MIpuuSiSZ4.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                      Source: MIpuuSiSZ4.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                      Source: MIpuuSiSZ4.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                      Source: MIpuuSiSZ4.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                      Source: MIpuuSiSZ4.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                      Source: MIpuuSiSZ4.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                      Source: MIpuuSiSZ4.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000015739978C72 push ebp; ret
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_02068C72 push ebp; ret
                      Source: MIpuuSiSZ4.dllStatic PE information: section name: _RDATA
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\MIpuuSiSZ4.dll
                      Source: C:\Windows\System32\regsvr32.exePE file moved: C:\Windows\System32\GAjjZRZVj\QFdWkQKkPokX.dllJump to behavior

                      Hooking and other Techniques for Hiding and Protection

                      barindex
                      Source: C:\Windows\System32\loaddll64.exeFile opened: C:\Windows\system32\ZcjkHmdxs\qpwRIIkrlFzB.dll:Zone.Identifier read attributes | delete
                      Source: C:\Windows\System32\regsvr32.exeFile opened: C:\Windows\system32\GAjjZRZVj\QFdWkQKkPokX.dll:Zone.Identifier read attributes | delete
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\svchost.exe TID: 7016Thread sleep time: -30000s >= -30000s
                      Source: C:\Windows\System32\svchost.exe TID: 7020Thread sleep time: -30000s >= -30000s
                      Source: C:\Windows\System32\svchost.exe TID: 1032Thread sleep time: -30000s >= -30000s
                      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                      Source: C:\Windows\System32\regsvr32.exeCode function: EnumServicesStatusExW,
                      Source: C:\Windows\System32\svchost.exeFile opened: PhysicalDrive0
                      Source: C:\Windows\System32\loaddll64.exeAPI coverage: 9.0 %
                      Source: C:\Windows\System32\regsvr32.exeAPI coverage: 7.1 %
                      Source: C:\Windows\System32\loaddll64.exeProcess information queried: ProcessInformation
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001800427CC _invalid_parameter_noinfo,_invalid_parameter_noinfo,FindFirstFileExW,FindNextFileW,FindClose,FindClose,
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001800427CC _invalid_parameter_noinfo,_invalid_parameter_noinfo,FindFirstFileExW,FindNextFileW,FindClose,FindClose,
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180042F88 FindFirstFileExW,
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180043464 FindFirstFileExW,FindNextFileW,FindClose,FindClose,
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800427CC _invalid_parameter_noinfo,_invalid_parameter_noinfo,FindFirstFileExW,FindNextFileW,FindClose,FindClose,
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800427CC _invalid_parameter_noinfo,_invalid_parameter_noinfo,FindFirstFileExW,FindNextFileW,FindClose,FindClose,
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180042F88 FindFirstFileExW,
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180043464 FindFirstFileExW,FindNextFileW,FindClose,FindClose,
                      Source: C:\Windows\System32\regsvr32.exeCode function: 12_2_02D2C9F0 FindFirstFileW,FindNextFileW,
                      Source: C:\Windows\System32\regsvr32.exeFile Volume queried: C:\ FullSizeInformation
                      Source: svchost.exe, 00000009.00000002.626913081.000002413A266000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: "@Hyper-V RAWGlobal\BFE_Notify_Event_{f3c219e5-8073-4743-9b26-35724d75b7c3}LMEM
                      Source: svchost.exe, 00000020.00000002.649906463.00000298A2700000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: @Hyper-V RAW
                      Source: svchost.exe, 00000007.00000002.661391909.0000017603802000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: HvHostWdiSystemHostScDeviceEnumWiaRpctrkwksAudioEndpointBuilderhidservdot3svcDsSvcfhsvcWPDBusEnumsvsvcwlansvcEmbeddedModeirmonSensorServicevmicvssNgcSvcsysmainDevQueryBrokerStorSvcvmickvpexchangevmicshutdownvmicguestinterfacevmicvmsessionNcbServiceNetmanDeviceAssociationServiceTabletInputServicePcaSvcIPxlatCfgSvcCscServiceUmRdpService
                      Source: svchost.exe, 00000009.00000002.626869690.000002413A259000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000009.00000002.625682040.0000024134C29000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000C.00000002.661956267.0000000001301000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000C.00000002.661740445.00000000012D3000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000C.00000003.444163231.00000000012E2000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000C.00000003.444203872.0000000001301000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000020.00000002.649749481.00000298A1EEA000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000020.00000002.649489638.00000298A1E70000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                      Source: regsvr32.exe, 00000002.00000003.338636942.0000000000814000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
                      Source: svchost.exe, 00000007.00000002.661773254.0000017603840000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000010.00000002.661987254.000002D0F6641000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000011.00000002.661749128.000001E262629000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018001360C RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180048198 GetProcessHeap,
                      Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPort
                      Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPort
                      Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPort
                      Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPort
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180002F14 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018001360C RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018000386C IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180003A54 SetUnhandledExceptionFilter,
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180002F14 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001360C RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000386C IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180003A54 SetUnhandledExceptionFilter,

                      HIPS / PFW / Operating System Protection Evasion

                      barindex
                      Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 174.138.33.49 7080
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\MIpuuSiSZ4.dll",#1
                      Source: C:\Windows\System32\regsvr32.exeQueries volume information: C:\ VolumeInformation
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformation
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm VolumeInformation
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformation
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformation
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformation
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformation
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation
                      Source: C:\Windows\System32\regsvr32.exeQueries volume information: C:\ VolumeInformation
                      Source: C:\Windows\System32\loaddll64.exeCode function: EnumSystemLocalesW,
                      Source: C:\Windows\System32\loaddll64.exeCode function: EnumSystemLocalesW,
                      Source: C:\Windows\System32\loaddll64.exeCode function: EnumSystemLocalesW,
                      Source: C:\Windows\System32\loaddll64.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,
                      Source: C:\Windows\System32\loaddll64.exeCode function: GetLocaleInfoW,
                      Source: C:\Windows\System32\loaddll64.exeCode function: EnumSystemLocalesW,
                      Source: C:\Windows\System32\loaddll64.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,
                      Source: C:\Windows\System32\loaddll64.exeCode function: EnumSystemLocalesW,
                      Source: C:\Windows\System32\loaddll64.exeCode function: GetLocaleInfoW,
                      Source: C:\Windows\System32\loaddll64.exeCode function: EnumSystemLocalesW,
                      Source: C:\Windows\System32\loaddll64.exeCode function: EnumSystemLocalesW,GetUserDefaultLCID,ProcessCodePage,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,
                      Source: C:\Windows\System32\loaddll64.exeCode function: GetLocaleInfoW,
                      Source: C:\Windows\System32\loaddll64.exeCode function: TranslateName,TranslateName,GetACP,IsValidCodePage,GetLocaleInfoW,
                      Source: C:\Windows\System32\regsvr32.exeCode function: EnumSystemLocalesW,
                      Source: C:\Windows\System32\regsvr32.exeCode function: EnumSystemLocalesW,
                      Source: C:\Windows\System32\regsvr32.exeCode function: EnumSystemLocalesW,
                      Source: C:\Windows\System32\regsvr32.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,
                      Source: C:\Windows\System32\regsvr32.exeCode function: GetLocaleInfoW,
                      Source: C:\Windows\System32\regsvr32.exeCode function: EnumSystemLocalesW,
                      Source: C:\Windows\System32\regsvr32.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,
                      Source: C:\Windows\System32\regsvr32.exeCode function: EnumSystemLocalesW,
                      Source: C:\Windows\System32\regsvr32.exeCode function: GetLocaleInfoW,
                      Source: C:\Windows\System32\regsvr32.exeCode function: EnumSystemLocalesW,
                      Source: C:\Windows\System32\regsvr32.exeCode function: EnumSystemLocalesW,GetUserDefaultLCID,ProcessCodePage,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,
                      Source: C:\Windows\System32\regsvr32.exeCode function: GetLocaleInfoW,
                      Source: C:\Windows\System32\regsvr32.exeCode function: TranslateName,TranslateName,GetACP,IsValidCodePage,GetLocaleInfoW,
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180059100 cpuid
                      Source: C:\Windows\System32\regsvr32.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001800032C0 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,

                      Lowering of HIPS / PFW / Operating System Security Settings

                      barindex
                      Source: C:\Windows\System32\svchost.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center cval
                      Source: C:\Windows\System32\svchost.exeWMI Queries: IWbemServices::ExecNotificationQuery - ROOT\SecurityCenter : SELECT * FROM __InstanceOperationEvent WHERE TargetInstance ISA 'AntiVirusProduct' OR TargetInstance ISA 'FirewallProduct' OR TargetInstance ISA 'AntiSpywareProduct'
                      Source: C:\Windows\System32\svchost.exeWMI Queries: IWbemServices::CreateInstanceEnum - ROOT\SecurityCenter2 : FirewallProduct
                      Source: C:\Windows\System32\svchost.exeWMI Queries: IWbemServices::CreateInstanceEnum - ROOT\SecurityCenter2 : AntiVirusProduct
                      Source: C:\Windows\System32\svchost.exeWMI Queries: IWbemServices::CreateInstanceEnum - ROOT\SecurityCenter2 : AntiSpywareProduct
                      Source: svchost.exe, 00000014.00000002.662009877.000001B1E9902000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
                      Source: svchost.exe, 00000014.00000002.661820829.000001B1E983D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: $@V%ProgramFiles%\Windows Defender\MsMpeng.exe

                      Stealing of Sensitive Information

                      barindex
                      Source: Yara matchFile source: 0000000C.00000002.661348004.0000000001298000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 2.2.regsvr32.exe.710000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.0.rundll32.exe.22fc4510000.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 12.2.regsvr32.exe.2cb0000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.0.rundll32.exe.22fc4510000.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.0.rundll32.exe.14980010000.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.0.rundll32.exe.22fc4510000.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.rundll32.exe.20000010000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.rundll32.exe.22fc4510000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.14980010000.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.2.rundll32.exe.1a029ee0000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.0.rundll32.exe.22fc4510000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.2.rundll32.exe.1a029ee0000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.0.rundll32.exe.14980010000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.rundll32.exe.22fc4510000.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.rundll32.exe.20000010000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.0.rundll32.exe.14980010000.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.regsvr32.exe.710000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.0.rundll32.exe.14980010000.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.14980010000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 12.2.regsvr32.exe.2cb0000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.loaddll64.exe.15738060000.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.loaddll64.exe.15738060000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000002.364452628.0000015738060000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.345850399.0000000000710000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.351700174.0000020000071000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000C.00000002.662977936.0000000002D11000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000000.348541554.0000022FC4510000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.351638703.0000020000010000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.377797661.0000022FC4510000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.378702987.0000014980010000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.378747717.0000014980071000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.346021007.0000000002061000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000000.348813253.0000022FC4571000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000006.00000002.358968494.000001A029F41000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000000.338942505.0000022FC4510000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.377880147.0000022FC4571000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000C.00000002.662715077.0000000002CB0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000000.352241442.0000014980010000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000000.338998123.0000022FC4571000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.364805521.0000015739971000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000000.345097590.0000014980010000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000000.349632978.0000014980071000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000000.352325443.0000014980071000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000006.00000002.358868561.000001A029EE0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                      Valid Accounts1
                      Windows Management Instrumentation
                      1
                      DLL Side-Loading
                      111
                      Process Injection
                      2
                      Masquerading
                      OS Credential Dumping1
                      System Time Discovery
                      Remote Services1
                      Archive Collected Data
                      Exfiltration Over Other Network Medium1
                      Encrypted Channel
                      Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                      Default AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
                      DLL Side-Loading
                      1
                      Disable or Modify Tools
                      LSASS Memory61
                      Security Software Discovery
                      Remote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth1
                      Non-Standard Port
                      Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                      Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)3
                      Virtualization/Sandbox Evasion
                      Security Account Manager3
                      Virtualization/Sandbox Evasion
                      SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration1
                      Application Layer Protocol
                      Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                      Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)111
                      Process Injection
                      NTDS2
                      Process Discovery
                      Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
                      Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
                      Deobfuscate/Decode Files or Information
                      LSA Secrets1
                      System Service Discovery
                      SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                      Replication Through Removable MediaLaunchdRc.commonRc.common1
                      Hidden Files and Directories
                      Cached Domain Credentials1
                      Remote System Discovery
                      VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                      External Remote ServicesScheduled TaskStartup ItemsStartup Items2
                      Obfuscated Files or Information
                      DCSync2
                      File and Directory Discovery
                      Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                      Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job1
                      Regsvr32
                      Proc Filesystem44
                      System Information Discovery
                      Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
                      Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)1
                      Rundll32
                      /etc/passwd and /etc/shadowSystem Network Connections DiscoverySoftware Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
                      Supply Chain CompromiseAppleScriptAt (Windows)At (Windows)1
                      DLL Side-Loading
                      Network SniffingProcess DiscoveryTaint Shared ContentLocal Data StagingExfiltration Over Unencrypted/Obfuscated Non-C2 ProtocolFile Transfer ProtocolsData Encrypted for Impact
                      Compromise Software Dependencies and Development ToolsWindows Command ShellCronCron1
                      File Deletion
                      Input CapturePermission Groups DiscoveryReplication Through Removable MediaRemote Data StagingExfiltration Over Physical MediumMail ProtocolsService Stop
                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet
                      behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 671702 Sample: MIpuuSiSZ4.dll Startdate: 22/07/2022 Architecture: WINDOWS Score: 100 42 200.18.0.0 UniversidadeFederaldeSantaCatarinaBR Brazil 2->42 44 100.7.0.0 UUNETUS United States 2->44 46 23 other IPs or domains 2->46 54 Snort IDS alert for network traffic 2->54 56 Antivirus detection for URL or domain 2->56 58 Multi AV Scanner detection for submitted file 2->58 60 3 other signatures 2->60 9 loaddll64.exe 3 2->9         started        12 svchost.exe 2->12         started        14 svchost.exe 9 1 2->14         started        17 9 other processes 2->17 signatures3 process4 dnsIp5 64 Hides that the sample has been downloaded from the Internet (zone.identifier) 9->64 19 regsvr32.exe 5 9->19         started        22 cmd.exe 1 9->22         started        24 rundll32.exe 9->24         started        28 3 other processes 9->28 66 Changes security center settings (notifications, updates, antivirus, firewall) 12->66 26 MpCmdRun.exe 12->26         started        48 127.0.0.1 unknown unknown 14->48 50 192.168.2.1 unknown unknown 17->50 signatures6 process7 signatures8 62 Hides that the sample has been downloaded from the Internet (zone.identifier) 19->62 30 regsvr32.exe 19->30         started        34 rundll32.exe 22->34         started        36 WerFault.exe 9 24->36         started        38 conhost.exe 26->38         started        process9 dnsIp10 52 174.138.33.49, 49761, 7080 DIGITALOCEAN-ASNUS United States 30->52 68 System process connects to network (likely due to code injection or exploit) 30->68 40 WerFault.exe 20 9 34->40         started        signatures11 process12

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                      windows-stand
                      SourceDetectionScannerLabelLink
                      MIpuuSiSZ4.dll72%VirustotalBrowse
                      MIpuuSiSZ4.dll54%MetadefenderBrowse
                      MIpuuSiSZ4.dll88%ReversingLabsWin64.Trojan.Emotet
                      No Antivirus matches
                      No Antivirus matches
                      No Antivirus matches
                      SourceDetectionScannerLabelLink
                      https://174.138.33.49/0%URL Reputationsafe
                      https://174.138.33.49:7080/0%URL Reputationsafe
                      https://www.pango.co/privacy0%URL Reputationsafe
                      https://174.138.33.49:7080/x100%Avira URL Cloudmalware
                      https://www.disneyplus.com/legal/your-california-privacy-rights0%URL Reputationsafe
                      https://174.138.33.49/T100%Avira URL Cloudmalware
                      https://174.138.33.49:7080/tem100%URL Reputationmalware
                      http://crl.ver)0%Avira URL Cloudsafe
                      https://www.tiktok.com/legal/report/feedback0%URL Reputationsafe
                      https://%s.xboxlive.com0%URL Reputationsafe
                      https://www.disneyplus.com/legal/privacy-policy0%URL Reputationsafe
                      https://dynamic.t0%URL Reputationsafe
                      https://174.138.33.49:7080/944100%Avira URL Cloudmalware
                      https://disneyplus.com/legal.0%URL Reputationsafe
                      https://%s.xboxlive.come0%Avira URL Cloudsafe
                      http://help.disneyplus.com.0%URL Reputationsafe
                      https://%s.dnet.xboxlive.com0%URL Reputationsafe
                      No contacted domains info
                      NameSourceMaliciousAntivirus DetectionReputation
                      https://dev.ditu.live.com/REST/v1/Routes/svchost.exe, 00000012.00000002.405452602.000002D97083D000.00000004.00000020.00020000.00000000.sdmpfalse
                        high
                        https://dev.virtualearth.net/REST/v1/Routes/Drivingsvchost.exe, 00000012.00000003.404914654.000002D970861000.00000004.00000020.00020000.00000000.sdmpfalse
                          high
                          https://t0.ssl.ak.dynamic.tiles.virtualearth.net/comp/gen.ashxsvchost.exe, 00000012.00000002.405452602.000002D97083D000.00000004.00000020.00020000.00000000.sdmpfalse
                            high
                            https://dev.ditu.live.com/REST/v1/Traffic/Incidents/svchost.exe, 00000012.00000002.405473479.000002D97085C000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000012.00000003.404945537.000002D97085A000.00000004.00000020.00020000.00000000.sdmpfalse
                              high
                              https://t0.tiles.ditu.live.com/tiles/gensvchost.exe, 00000012.00000002.405412295.000002D970813000.00000004.00000020.00020000.00000000.sdmpfalse
                                high
                                https://dev.virtualearth.net/REST/v1/Routes/Walkingsvchost.exe, 00000012.00000003.404914654.000002D970861000.00000004.00000020.00020000.00000000.sdmpfalse
                                  high
                                  https://dev.virtualearth.net/mapcontrol/HumanScaleServices/GetBubbles.ashx?n=svchost.exe, 00000012.00000002.405457932.000002D970842000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000012.00000003.404980940.000002D970840000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000012.00000003.405017263.000002D970841000.00000004.00000020.00020000.00000000.sdmpfalse
                                    high
                                    https://dev.ditu.live.com/mapcontrol/logging.ashxsvchost.exe, 00000012.00000003.404914654.000002D970861000.00000004.00000020.00020000.00000000.sdmpfalse
                                      high
                                      https://174.138.33.49/regsvr32.exe, 0000000C.00000002.661956267.0000000001301000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000C.00000003.444203872.0000000001301000.00000004.00000020.00020000.00000000.sdmpfalse
                                      • URL Reputation: safe
                                      unknown
                                      https://dev.ditu.live.com/REST/v1/Imagery/Copyright/svchost.exe, 00000012.00000003.404945537.000002D97085A000.00000004.00000020.00020000.00000000.sdmpfalse
                                        high
                                        https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gri?pv=1&r=svchost.exe, 00000012.00000003.383087363.000002D970831000.00000004.00000020.00020000.00000000.sdmpfalse
                                          high
                                          https://dev.virtualearth.net/REST/v1/Transit/Schedules/svchost.exe, 00000012.00000002.405457932.000002D970842000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000012.00000003.404980940.000002D970840000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000012.00000003.405017263.000002D970841000.00000004.00000020.00020000.00000000.sdmpfalse
                                            high
                                            https://174.138.33.49:7080/regsvr32.exe, 0000000C.00000002.661956267.0000000001301000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000C.00000002.661740445.00000000012D3000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000C.00000003.444163231.00000000012E2000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000C.00000003.444203872.0000000001301000.00000004.00000020.00020000.00000000.sdmpfalse
                                            • URL Reputation: safe
                                            unknown
                                            https://www.hotspotshield.com/terms/svchost.exe, 00000020.00000003.620490256.00000298A2781000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000020.00000003.620519716.00000298A2C19000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000020.00000003.620333446.00000298A279D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000020.00000003.620402747.00000298A2C02000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000020.00000003.620475663.00000298A27AD000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000020.00000003.620374463.00000298A27AD000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000020.00000003.620430135.00000298A2C03000.00000004.00000020.00020000.00000000.sdmpfalse
                                              high
                                              https://www.pango.co/privacysvchost.exe, 00000020.00000003.620490256.00000298A2781000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000020.00000003.620519716.00000298A2C19000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000020.00000003.620333446.00000298A279D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000020.00000003.620402747.00000298A2C02000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000020.00000003.620475663.00000298A27AD000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000020.00000003.620374463.00000298A27AD000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000020.00000003.620430135.00000298A2C03000.00000004.00000020.00020000.00000000.sdmpfalse
                                              • URL Reputation: safe
                                              unknown
                                              http://www.bingmapsportal.comsvchost.exe, 00000012.00000002.405412295.000002D970813000.00000004.00000020.00020000.00000000.sdmpfalse
                                                high
                                                https://174.138.33.49:7080/xregsvr32.exe, 0000000C.00000002.661956267.0000000001301000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000C.00000003.444203872.0000000001301000.00000004.00000020.00020000.00000000.sdmptrue
                                                • Avira URL Cloud: malware
                                                unknown
                                                https://ecn.dev.virtualearth.net/REST/v1/Imagery/Copyright/svchost.exe, 00000012.00000002.405452602.000002D97083D000.00000004.00000020.00020000.00000000.sdmpfalse
                                                  high
                                                  https://dynamic.t0.tiles.ditu.live.com/comp/gen.ashxsvchost.exe, 00000012.00000003.404914654.000002D970861000.00000004.00000020.00020000.00000000.sdmpfalse
                                                    high
                                                    https://www.disneyplus.com/legal/your-california-privacy-rightssvchost.exe, 00000020.00000003.627116814.00000298A279A000.00000004.00000020.00020000.00000000.sdmpfalse
                                                    • URL Reputation: safe
                                                    unknown
                                                    https://174.138.33.49/Tregsvr32.exe, 0000000C.00000002.661956267.0000000001301000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000C.00000003.444203872.0000000001301000.00000004.00000020.00020000.00000000.sdmptrue
                                                    • Avira URL Cloud: malware
                                                    unknown
                                                    https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdv?pv=1&r=svchost.exe, 00000012.00000003.404980940.000002D970840000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000012.00000003.405005326.000002D970845000.00000004.00000020.00020000.00000000.sdmpfalse
                                                      high
                                                      https://174.138.33.49:7080/temregsvr32.exe, 0000000C.00000002.661740445.00000000012D3000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000C.00000003.444163231.00000000012E2000.00000004.00000020.00020000.00000000.sdmptrue
                                                      • URL Reputation: malware
                                                      unknown
                                                      https://dev.virtualearth.net/REST/v1/Routes/svchost.exe, 00000012.00000002.405452602.000002D97083D000.00000004.00000020.00020000.00000000.sdmpfalse
                                                        high
                                                        https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdi?pv=1&r=svchost.exe, 00000012.00000003.383087363.000002D970831000.00000004.00000020.00020000.00000000.sdmpfalse
                                                          high
                                                          http://crl.ver)svchost.exe, 00000009.00000002.626913081.000002413A266000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000020.00000002.649749481.00000298A1EEA000.00000004.00000020.00020000.00000000.sdmpfalse
                                                          • Avira URL Cloud: safe
                                                          low
                                                          https://dev.virtualearth.net/webservices/v1/LoggingService/LoggingService.svc/Log?svchost.exe, 00000012.00000002.405473479.000002D97085C000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000012.00000003.404980940.000002D970840000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000012.00000003.404945537.000002D97085A000.00000004.00000020.00020000.00000000.sdmpfalse
                                                            high
                                                            https://www.tiktok.com/legal/report/feedbacksvchost.exe, 00000020.00000003.629383351.00000298A279F000.00000004.00000020.00020000.00000000.sdmpfalse
                                                            • URL Reputation: safe
                                                            unknown
                                                            https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gd?pv=1&r=svchost.exe, 00000012.00000002.405412295.000002D970813000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000012.00000002.405452602.000002D97083D000.00000004.00000020.00020000.00000000.sdmpfalse
                                                              high
                                                              https://%s.xboxlive.comsvchost.exe, 00000010.00000002.661987254.000002D0F6641000.00000004.00000020.00020000.00000000.sdmpfalse
                                                              • URL Reputation: safe
                                                              low
                                                              https://dev.ditu.live.com/mapcontrol/mapconfiguration.ashx?name=native&v=svchost.exe, 00000012.00000002.405466984.000002D97084E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000012.00000003.404854812.000002D970849000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                high
                                                                https://dev.virtualearth.net/REST/v1/Locationssvchost.exe, 00000012.00000003.404914654.000002D970861000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                  high
                                                                  https://ecn.dev.virtualearth.net/mapcontrol/mapconfiguration.ashx?name=native&v=svchost.exe, 00000012.00000003.383087363.000002D970831000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                    high
                                                                    https://dev.virtualearth.net/mapcontrol/logging.ashxsvchost.exe, 00000012.00000003.404914654.000002D970861000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                      high
                                                                      https://support.hotspotshield.com/svchost.exe, 00000020.00000003.620490256.00000298A2781000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000020.00000003.620519716.00000298A2C19000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000020.00000003.620333446.00000298A279D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000020.00000003.620402747.00000298A2C02000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000020.00000003.620475663.00000298A27AD000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000020.00000003.620374463.00000298A27AD000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000020.00000003.620430135.00000298A2C03000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                        high
                                                                        https://dynamic.api.tiles.ditu.live.com/odvs/gdi?pv=1&r=svchost.exe, 00000012.00000002.405473479.000002D97085C000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000012.00000003.404945537.000002D97085A000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                          high
                                                                          https://www.disneyplus.com/legal/privacy-policysvchost.exe, 00000020.00000003.627116814.00000298A279A000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                          • URL Reputation: safe
                                                                          unknown
                                                                          https://dev.virtualearth.net/REST/v1/JsonFilter/VenueMaps/data/svchost.exe, 00000012.00000002.405473479.000002D97085C000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000012.00000003.404945537.000002D97085A000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                            high
                                                                            https://dynamic.tsvchost.exe, 00000012.00000003.404854812.000002D970849000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                            • URL Reputation: safe
                                                                            unknown
                                                                            https://dev.virtualearth.net/REST/v1/Routes/Transitsvchost.exe, 00000012.00000003.404914654.000002D970861000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                              high
                                                                              https://174.138.33.49:7080/944regsvr32.exe, 0000000C.00000002.661740445.00000000012D3000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 0000000C.00000003.444163231.00000000012E2000.00000004.00000020.00020000.00000000.sdmptrue
                                                                              • Avira URL Cloud: malware
                                                                              unknown
                                                                              https://disneyplus.com/legal.svchost.exe, 00000020.00000003.627116814.00000298A279A000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                              • URL Reputation: safe
                                                                              unknown
                                                                              https://t0.ssl.ak.tiles.virtualearth.net/tiles/gensvchost.exe, 00000012.00000003.383087363.000002D970831000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000012.00000002.405447191.000002D97083A000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                high
                                                                                https://%s.xboxlive.comesvchost.exe, 00000010.00000002.661987254.000002D0F6641000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                • Avira URL Cloud: safe
                                                                                low
                                                                                https://dynamic.api.tiles.ditu.live.com/odvs/gdv?pv=1&r=svchost.exe, 00000012.00000003.404945537.000002D97085A000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                  high
                                                                                  https://activity.windows.comsvchost.exe, 00000010.00000002.661987254.000002D0F6641000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                    high
                                                                                    https://dev.ditu.live.com/REST/v1/Locationssvchost.exe, 00000012.00000003.404914654.000002D970861000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                      high
                                                                                      http://help.disneyplus.com.svchost.exe, 00000020.00000003.627116814.00000298A279A000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                      • URL Reputation: safe
                                                                                      unknown
                                                                                      https://%s.dnet.xboxlive.comsvchost.exe, 00000010.00000002.661987254.000002D0F6641000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                      • URL Reputation: safe
                                                                                      low
                                                                                      https://dev.ditu.live.com/REST/v1/JsonFilter/VenueMaps/data/svchost.exe, 00000012.00000002.405473479.000002D97085C000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000012.00000003.404945537.000002D97085A000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                        high
                                                                                        https://dynamic.api.tiles.ditu.live.com/odvs/gd?pv=1&r=svchost.exe, 00000012.00000003.404945537.000002D97085A000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                          high
                                                                                          • No. of IPs < 25%
                                                                                          • 25% < No. of IPs < 50%
                                                                                          • 50% < No. of IPs < 75%
                                                                                          • 75% < No. of IPs
                                                                                          IPDomainCountryFlagASNASN NameMalicious
                                                                                          174.138.33.49
                                                                                          unknownUnited States
                                                                                          14061DIGITALOCEAN-ASNUStrue
                                                                                          248.6.0.0
                                                                                          unknownReserved
                                                                                          unknownunknowntrue
                                                                                          20.7.0.0
                                                                                          unknownUnited States
                                                                                          8075MICROSOFT-CORP-MSN-AS-BLOCKUStrue
                                                                                          101.69.85.108
                                                                                          unknownChina
                                                                                          4837CHINA169-BACKBONECHINAUNICOMChina169BackboneCNtrue
                                                                                          176.6.0.0
                                                                                          unknownGermany
                                                                                          12638AS12638DuesseldorfDEtrue
                                                                                          144.1.49.1
                                                                                          unknownunknown
                                                                                          58541CHINATELECOM-SHANDONG-QINGDAO-IDCQingdao266000CNtrue
                                                                                          80.7.0.0
                                                                                          unknownUnited Kingdom
                                                                                          5089NTLGBtrue
                                                                                          64.7.0.0
                                                                                          unknownUnited States
                                                                                          4565MEGAPATH2-UStrue
                                                                                          24.7.0.0
                                                                                          unknownUnited States
                                                                                          7922COMCAST-7922UStrue
                                                                                          112.7.0.0
                                                                                          unknownChina
                                                                                          24444CMNET-V4SHANDONG-AS-APShandongMobileCommunicationCompanytrue
                                                                                          4.7.0.0
                                                                                          unknownUnited States
                                                                                          3356LEVEL3UStrue
                                                                                          208.9.0.0
                                                                                          unknownUnited States
                                                                                          1239SPRINTLINKUStrue
                                                                                          232.6.0.0
                                                                                          unknownReserved
                                                                                          unknownunknowntrue
                                                                                          96.7.0.0
                                                                                          unknownUnited States
                                                                                          262589INTERNEXABRASILOPERADORADETELECOMUNICACOESSABRtrue
                                                                                          204.6.0.0
                                                                                          unknownUnited States
                                                                                          174COGENT-174UStrue
                                                                                          172.6.0.0
                                                                                          unknownUnited States
                                                                                          7018ATT-INTERNET4UStrue
                                                                                          100.7.0.0
                                                                                          unknownUnited States
                                                                                          701UUNETUStrue
                                                                                          180.6.0.0
                                                                                          unknownJapan4713OCNNTTCommunicationsCorporationJPtrue
                                                                                          84.7.0.0
                                                                                          unknownFrance
                                                                                          8228CEGETEL-ASFRtrue
                                                                                          200.18.0.0
                                                                                          unknownBrazil
                                                                                          10715UniversidadeFederaldeSantaCatarinaBRtrue
                                                                                          136.6.0.0
                                                                                          unknownUnited States
                                                                                          60311ONEFMCHtrue
                                                                                          236.6.0.0
                                                                                          unknownReserved
                                                                                          unknownunknowntrue
                                                                                          68.7.0.0
                                                                                          unknownUnited States
                                                                                          22773ASN-CXA-ALL-CCI-22773-RDCUStrue
                                                                                          116.7.0.0
                                                                                          unknownChina
                                                                                          4809CHINATELECOM-CORE-WAN-CN2ChinaTelecomNextGenerationCarrtrue
                                                                                          8.7.0.0
                                                                                          unknownUnited States
                                                                                          3356LEVEL3UStrue
                                                                                          82.10.0.0
                                                                                          unknownUnited Kingdom
                                                                                          5089NTLGBtrue
                                                                                          IP
                                                                                          192.168.2.1
                                                                                          127.0.0.1
                                                                                          Joe Sandbox Version:35.0.0 Citrine
                                                                                          Analysis ID:671702
                                                                                          Start date and time: 22/07/202214:09:072022-07-22 14:09:07 +02:00
                                                                                          Joe Sandbox Product:CloudBasic
                                                                                          Overall analysis duration:0h 10m 25s
                                                                                          Hypervisor based Inspection enabled:false
                                                                                          Report type:light
                                                                                          Sample file name:MIpuuSiSZ4.dll
                                                                                          Cookbook file name:default.jbs
                                                                                          Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                                                                          Run name:Run with higher sleep bypass
                                                                                          Number of analysed new started processes analysed:36
                                                                                          Number of new started drivers analysed:0
                                                                                          Number of existing processes analysed:0
                                                                                          Number of existing drivers analysed:0
                                                                                          Number of injected processes analysed:0
                                                                                          Technologies:
                                                                                          • HCA enabled
                                                                                          • EGA enabled
                                                                                          • HDC enabled
                                                                                          • AMSI enabled
                                                                                          Analysis Mode:default
                                                                                          Analysis stop reason:Timeout
                                                                                          Detection:MAL
                                                                                          Classification:mal100.troj.evad.winDLL@33/16@0/28
                                                                                          EGA Information:
                                                                                          • Successful, ratio: 100%
                                                                                          HDC Information:
                                                                                          • Successful, ratio: 86.9% (good quality ratio 81.6%)
                                                                                          • Quality average: 75%
                                                                                          • Quality standard deviation: 30.3%
                                                                                          HCA Information:
                                                                                          • Successful, ratio: 99%
                                                                                          • Number of executed functions: 0
                                                                                          • Number of non-executed functions: 0
                                                                                          Cookbook Comments:
                                                                                          • Found application associated with file extension: .dll
                                                                                          • Adjust boot time
                                                                                          • Enable AMSI
                                                                                          • Sleeps bigger than 300000ms are automatically reduced to 1000ms
                                                                                          • Exclude process from analysis (whitelisted): audiodg.exe, BackgroundTransferHost.exe, WerFault.exe, WMIADAP.exe, backgroundTaskHost.exe, WmiPrvSE.exe, wuapihost.exe
                                                                                          • Excluded IPs from analysis (whitelisted): 23.35.236.56, 93.184.221.240, 52.182.143.212, 20.189.173.21, 173.222.108.226, 173.222.108.210, 20.223.24.244
                                                                                          • Excluded domains from analysis (whitelisted): a767.dspw65.akamai.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, arc.msn.com, wu.azureedge.net, rp-consumer-prod-displaycatalog-geomap.trafficmanager.net, onedsblobprdcus15.centralus.cloudapp.azure.com, login.live.com, bg.apr-52dd2-0503.edgecastdns.net, cs11.wpc.v0cdn.net, sls.update.microsoft.com, hlb.apr-52dd2-0.edgecastdns.net, onedsblobprdwus16.westus.cloudapp.azure.com, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, watson.telemetry.microsoft.com, prod.fs.microsoft.com.akadns.net, www.bing.com, fs.microsoft.com, wu.ec.azureedge.net, neu-displaycatalogrp.frontdoor.bigcatalog.commerce.microsoft.com, e1723.g.akamaiedge.net, ctldl.windowsupdate.com, wu-bg-shim.trafficmanager.net, download.windowsupdate.com.edgesuite.net, ris.api.iris.microsoft.com, store-images.s-microsoft.com, blobcollector.events.data.trafficmanager.net, displaycatalog-rp.md.mp.microsoft.com.akadns.net
                                                                                          • Not all processes where analyzed, report is missing behavior information
                                                                                          • Report size exceeded maximum capacity and may have missing behavior information.
                                                                                          • Report size exceeded maximum capacity and may have missing disassembly code.
                                                                                          • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                                          • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                                                          • Report size getting too big, too many NtQueryValueKey calls found.
                                                                                          No simulations
                                                                                          No context
                                                                                          No context
                                                                                          No context
                                                                                          No context
                                                                                          No context
                                                                                          Process:C:\Windows\System32\svchost.exe
                                                                                          File Type:data
                                                                                          Category:dropped
                                                                                          Size (bytes):8192
                                                                                          Entropy (8bit):0.3593198815979092
                                                                                          Encrypted:false
                                                                                          SSDEEP:12:SnaaD0JcaaD0JwQQU2naaD0JcaaD0JwQQU:4tgJctgJw/tgJctgJw
                                                                                          MD5:BF1DC7D5D8DAD7478F426DF8B3F8BAA6
                                                                                          SHA1:C6B0BDE788F553F865D65F773D8F6A3546887E42
                                                                                          SHA-256:BE47C764C38CA7A90A345BE183F5261E89B98743B5E35989E9A8BE0DA498C0F2
                                                                                          SHA-512:00F2412AA04E09EA19A8315D80BE66D2727C713FC0F5AE6A9334BABA539817F568A98CA3A45B2673282BDD325B8B0E2840A393A4DCFADCB16473F5EAF2AF3180
                                                                                          Malicious:false
                                                                                          Preview:.............*..........3...w..................C:\ProgramData\Microsoft\Network\Downloader\.........................................................................................................................................................................................................................C:\ProgramData\Microsoft\Network\Downloader\..........................................................................................................................................................................................................................0u..................@...@......................................................*.............................................................................................................................................................................................................................................................................................................................................................
                                                                                          Process:C:\Windows\System32\svchost.exe
                                                                                          File Type:MPEG-4 LOAS
                                                                                          Category:dropped
                                                                                          Size (bytes):1310720
                                                                                          Entropy (8bit):0.2494601363776735
                                                                                          Encrypted:false
                                                                                          SSDEEP:1536:BJiRdfVzkZm3lyf49uyc0ga04PdHS9LrM/oVMUdSRU4Z:BJiRdwfu2SRU4Z
                                                                                          MD5:70A5B7D8E2DEE8170DC1E083CCA3CE17
                                                                                          SHA1:F3B8F17368F39ED7713E65721C93D6D3B7B9A2C2
                                                                                          SHA-256:8D6AA38C684CD3C65C1F854E1B31676DD9E332B2134F06DF5BCCB0D91689F781
                                                                                          SHA-512:A6C3D29A63E811A0CE4BEDD374CA271ED825E4FAA61B301FCE12B7BE26618BE99DAD311B4DCF521A304457744DDA18FFAE216563A93ABBC0B136C523F0D9AF1F
                                                                                          Malicious:false
                                                                                          Preview:V.d.........@..@.3...w...........................3...w..................C:\ProgramData\Microsoft\Network\Downloader\.........................................................................................................................................................................................................................C:\ProgramData\Microsoft\Network\Downloader\..........................................................................................................................................................................................................................0u..................@...@.........................................d#.................................................................................................................................................................................................................................................................................................................................................
                                                                                          Process:C:\Windows\System32\svchost.exe
                                                                                          File Type:Extensible storage engine DataBase, version 0x620, checksum 0x9fe2e37f, page size 16384, Windows version 10.0
                                                                                          Category:dropped
                                                                                          Size (bytes):786432
                                                                                          Entropy (8bit):0.2505993140506313
                                                                                          Encrypted:false
                                                                                          SSDEEP:384:Ax9xz+W0StseCJ48EApW0StseCJ48E2rTSjlK/ebmLerYSRSY1J2:An+SB2nSB2RSjlK/+mLesOj1J2
                                                                                          MD5:19F8855F774735CCC8BCE5F79ED231B6
                                                                                          SHA1:C105EA75CC9D92EBD60BF55AE5522FEE898489B9
                                                                                          SHA-256:12C3290682DD6BB02DC0360DC3DA9575C5C400597D69DEECACE4DC70F99E5917
                                                                                          SHA-512:E7EC65EB221DE16E577EAFE4E7174E4740786B50A210183903AC6751DABC1E2D85067CD8FDFD3FB02B44291F3CDA85AE105B74AC4103497BC935DA2091BD9301
                                                                                          Malicious:false
                                                                                          Preview:....... ................e.f.3...w........................)..........z..0....z..h.(..........z....)..............3...w...........................................................................................................B...........@...................................................................................................... ...................................................................................................................................................................................................................................................oXl0.....z...................`k......z..........................................................................................................................................................................................................................................................................................................................................................................................
                                                                                          Process:C:\Windows\System32\svchost.exe
                                                                                          File Type:data
                                                                                          Category:dropped
                                                                                          Size (bytes):16384
                                                                                          Entropy (8bit):0.07550297560210162
                                                                                          Encrypted:false
                                                                                          SSDEEP:3:S+llJ7vVtulfwOGgAmmtOfyQllRB8ewll3Vkttlmlnl:S+/Jr/ulAgAmYwhlRB8eQ3
                                                                                          MD5:CD01E4F23E04035414BA9B9633F9F1EF
                                                                                          SHA1:EFE4C001C27E9C473AC3A4B7C8471E215781E2A1
                                                                                          SHA-256:DE5735C8E68FAA5BBB3AD2934EAB9B2E8103ACCF6E22179CDDC14081F9FE9558
                                                                                          SHA-512:C2BDCD9E6EA1411D7D1E58D8961BF473FA39499F1633C61EAA357EE6CFCFF43E2174AC9704743176EF18DC4E9BC64BE47185C4B3C6A07C2AF594F347D8F61060
                                                                                          Malicious:false
                                                                                          Preview:..Lf.....................................3...w..0....z.......z...............z.......z...._......z.u.................`k......z..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                          Process:C:\Windows\System32\WerFault.exe
                                                                                          File Type:Little-endian UTF-16 Unicode text, with CRLF line terminators
                                                                                          Category:dropped
                                                                                          Size (bytes):65536
                                                                                          Entropy (8bit):0.7738439296664732
                                                                                          Encrypted:false
                                                                                          SSDEEP:192:8pHrig1JKvHkhyJdJsj9U/u7s8S274ltN:wHriOKvkEJdJsjO/u7s8X4ltN
                                                                                          MD5:7DC9F73DEF29002E1206FA23948F2E42
                                                                                          SHA1:1514D0E4D04F00199CB62E657FE2EEA370DD278D
                                                                                          SHA-256:A63786AA6434919A07EA05F40E5E86AEC6326D065C90A85C2F81BD5E2F0009B1
                                                                                          SHA-512:E7E95D086D06B780D7C2121D3A3EC1812005AE0AE10E9E598A3AE2E9F82865D5AD004073569199730AAF6CBE21F997059B4363EBFBE2AB2C09A9BFC4B98E6269
                                                                                          Malicious:false
                                                                                          Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.0.2.9.9.7.8.6.2.3.6.3.9.9.4.1.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.0.2.9.9.7.8.6.7.0.6.7.1.0.8.6.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.d.4.f.d.1.8.f.3.-.2.0.b.a.-.4.f.f.0.-.b.8.5.1.-.e.6.d.5.0.c.c.5.7.e.9.3.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.1.a.b.d.5.e.7.7.-.0.1.0.e.-.4.3.a.4.-.9.b.0.c.-.e.9.2.b.6.9.3.7.f.a.a.7.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.r.u.n.d.l.l.3.2...e.x.e._.M.I.p.u.u.S.i.S.Z.4...d.l.l.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.R.U.N.D.L.L.3.2...E.X.E.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.a.8.8.-.0.0.0.1.-.0.0.1.d.-.2.f.2.5.-.c.1.7.2.0.f.9.e.d.8.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.2.f.3.4.c.c.f.d.d.8.1.4.1.a.e.e.e.2.e.8.9.f.f.b.0.7.0.c.e.2.3.9.c.7.d.0.0.7.
                                                                                          Process:C:\Windows\System32\WerFault.exe
                                                                                          File Type:Little-endian UTF-16 Unicode text, with CRLF line terminators
                                                                                          Category:dropped
                                                                                          Size (bytes):65536
                                                                                          Entropy (8bit):0.7729218762588249
                                                                                          Encrypted:false
                                                                                          SSDEEP:96:krgFa4QidJPnyEjT55I73f2pXIQcQqc620ycEBcw3pXaXz+HbHgSQgJPbmIDV9wR:ggOidJKgHkhyLtj9U/u7s8S274ltN3
                                                                                          MD5:311D9D5DD757DFFCA2D4B6C46870D415
                                                                                          SHA1:99417DC19B7ACFA4A69EEB8AAFAA08B956B455C4
                                                                                          SHA-256:AFFA8D1168A1B8417E115A4B9C95BA8A68AD43287E0798545D518E72A72DFC1E
                                                                                          SHA-512:2B8E6A134F98417A238288016E0F6B8D4073BEC251AC2589286FCAD00B2937F0523565819368C81CFB3EE1F047B0DD8426BB463976ECC14059179F0F0A89B1C5
                                                                                          Malicious:false
                                                                                          Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.0.2.9.9.7.8.6.0.1.1.9.1.7.1.3.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.0.2.9.9.7.8.6.4.3.2.2.2.6.8.5.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.7.6.5.5.5.f.c.8.-.f.c.e.3.-.4.7.2.d.-.a.0.f.9.-.e.9.0.7.3.d.7.5.6.3.2.1.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.0.6.b.a.4.b.d.2.-.e.1.e.3.-.4.f.4.b.-.a.5.f.f.-.c.e.f.c.2.6.6.0.b.7.5.6.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.r.u.n.d.l.l.3.2...e.x.e._.M.I.p.u.u.S.i.S.Z.4...d.l.l.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.R.U.N.D.L.L.3.2...E.X.E.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.a.7.8.-.0.0.0.1.-.0.0.1.d.-.6.0.7.b.-.8.0.7.2.0.f.9.e.d.8.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.2.f.3.4.c.c.f.d.d.8.1.4.1.a.e.e.e.2.e.8.9.f.f.b.0.7.0.c.e.2.3.9.c.7.d.0.0.7.
                                                                                          Process:C:\Windows\System32\WerFault.exe
                                                                                          File Type:Mini DuMP crash report, 15 streams, Fri Jul 22 21:11:02 2022, 0x1205a4 type
                                                                                          Category:dropped
                                                                                          Size (bytes):62478
                                                                                          Entropy (8bit):2.362625578819154
                                                                                          Encrypted:false
                                                                                          SSDEEP:384:MQj1V4z7BXVjaYCr9x1lwdW4EaoO0w52SF8l:MQjz4xrCRxrqW4Ea7ZF6
                                                                                          MD5:04E27A5A5CD926209E9DF3277BFD5568
                                                                                          SHA1:B0F8A53B134CDCCB30E1950AE5DF92D52741CA2C
                                                                                          SHA-256:1A3DF93B9CF4E8B649F71E40438CFD3D809684B16DB6C70BD278D4967FF7A39D
                                                                                          SHA-512:8E5BA9B91ABABC7EE1363CA9D6E99DFD8ED770C4837FB56CCE3233AB27B9912CB6768FD3478F5CA487C29BDC0E5347F8D88ACD9917FAD162F55C609CCB985C4C
                                                                                          Malicious:false
                                                                                          Preview:MDMP....... .......f..b....................................h...8.......D...8:..........`.......8...........T...........0................!...........#...................................................................U...........B......$$......Lw..................S...T.......x...;..b.............................0..................P.a.c.i.f.i.c. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................P.a.c.i.f.i.c. .D.a.y.l.i.g.h.t. .T.i.m.e...........................................1.7.1.3.4...1...a.m.d.6.4.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.....................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                          Process:C:\Windows\System32\WerFault.exe
                                                                                          File Type:Mini DuMP crash report, 15 streams, Fri Jul 22 21:11:04 2022, 0x1205a4 type
                                                                                          Category:dropped
                                                                                          Size (bytes):64482
                                                                                          Entropy (8bit):2.303579767806309
                                                                                          Encrypted:false
                                                                                          SSDEEP:384:DjWV4z7BXVjaaCmys8FqDMtlwdWke1EFfV6n+lk:DjI4xBC5q3e1EC
                                                                                          MD5:B91B0DF6830BF2C08315A77C6D835667
                                                                                          SHA1:E87AC87670539F0D814421700F853EA438EF304E
                                                                                          SHA-256:8AD8C29581A4743FEF9C7C2772FB721797C5017052C86EF3EDB3368198D26345
                                                                                          SHA-512:E0ACE2FBDFFA43B82BFE9DD19E652607248607D5C1BA457E41A85F6468797DE37E7DA2F3F704676D4255A2259518865E478413B43AB6995F47A89017A685F9A3
                                                                                          Malicious:false
                                                                                          Preview:MDMP....... .......h..b....................................h...8.......D...8:..........`.......8...........T............................!...........#...................................................................U...........B......$$......Lw................h.....T...........;..b.............................0..................P.a.c.i.f.i.c. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................P.a.c.i.f.i.c. .D.a.y.l.i.g.h.t. .T.i.m.e...........................................1.7.1.3.4...1...a.m.d.6.4.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.....................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                          Process:C:\Windows\System32\WerFault.exe
                                                                                          File Type:XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
                                                                                          Category:dropped
                                                                                          Size (bytes):8748
                                                                                          Entropy (8bit):3.6996177533951498
                                                                                          Encrypted:false
                                                                                          SSDEEP:192:Rrl7r3GLNilDfCzG6Yx+Ygmf1RS/sCpr989bnhFhKfQtm:RrlsNiBfCS6YIYgmf1RSmnhFsf3
                                                                                          MD5:76CC5955C86EA809660608C5BA848DAC
                                                                                          SHA1:EDACA74055FDD4B7342A3ACEA1D0ECC7C76FE968
                                                                                          SHA-256:F43D48F38CFECA62BAA7A6DF8C5563926432D4B4A754E320D6A219E829943282
                                                                                          SHA-512:CBD881EC4AADF1D34AAE9991AFD750B7047515F28F000B3E6102EB8E7A3662DB5A34DD985E5974044ED7108AAB56CE6ED3DEC5415B86B604721B9A3F99BBE921
                                                                                          Malicious:false
                                                                                          Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.7.1.3.4.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.7.1.3.4...1...a.m.d.6.4.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.1.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.1.0.3.3.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.6.7.7.6.<./.P.i.d.>.......
                                                                                          Process:C:\Windows\System32\WerFault.exe
                                                                                          File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                          Category:dropped
                                                                                          Size (bytes):4733
                                                                                          Entropy (8bit):4.487431331312363
                                                                                          Encrypted:false
                                                                                          SSDEEP:48:cvIwSD8zsLJgtBI9LLWgc8sqYjws8fm8M4JC/WC/J8Frbyq85m/E7ZESC5Sh6d:uITflN6grsqYURJ8bWb9+Vvh6d
                                                                                          MD5:F022773265E899347C4417FE0AA02F68
                                                                                          SHA1:DB1D3257D2301DFFF5014571A7DC99147CA3754F
                                                                                          SHA-256:36AFA68F591F873B69550113030DE17EDC4B060E0F99CCBD34D9DC82D80E3EA5
                                                                                          SHA-512:BA50C2B624639284BFD2351870F05BBBD28D2254857C123EC0E684C9687C941A6F7E91F59C1DB955712E357D1A0DD2BE2E79ED75D0545BD2DBBF0CF9F106D577
                                                                                          Malicious:false
                                                                                          Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="17134" />.. <arg nm="vercsdbld" val="1" />.. <arg nm="verqfe" val="1" />.. <arg nm="csdbld" val="1" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="1033" />.. <arg nm="geoid" val="244" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="1614621" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.1.17134.0-11.0.47" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="4096" />..
                                                                                          Process:C:\Windows\System32\WerFault.exe
                                                                                          File Type:XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
                                                                                          Category:dropped
                                                                                          Size (bytes):8780
                                                                                          Entropy (8bit):3.7010000674473056
                                                                                          Encrypted:false
                                                                                          SSDEEP:192:Rrl7r3GLNiPCyC86YUNC5LOgmf15S/3JPCprZ89bIYSfok4m:RrlsNi6yC86Y+C5LOgmf15SvJxItfo6
                                                                                          MD5:E5C28F8EEFAB76EF6FD043E7608A16E4
                                                                                          SHA1:32F14F79BEF26CC67FE114647893CC62A07A196D
                                                                                          SHA-256:3C0CC2A7F21369758FF51B4B2C18961FB3041FC6129B15DF9401065054CAB076
                                                                                          SHA-512:F9422786CB0A3018399FB284062E99C5043CCD5AAA980A887C365455816FE15B3E9A6D04CCFB0D108F4C3865F95ABC0DB8DC2C482AD386651FAF12CAC0886245
                                                                                          Malicious:false
                                                                                          Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.7.1.3.4.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.7.1.3.4...1...a.m.d.6.4.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.1.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.1.0.3.3.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.6.7.9.2.<./.P.i.d.>.......
                                                                                          Process:C:\Windows\System32\WerFault.exe
                                                                                          File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                          Category:dropped
                                                                                          Size (bytes):4733
                                                                                          Entropy (8bit):4.487281289926747
                                                                                          Encrypted:false
                                                                                          SSDEEP:48:cvIwSD8zsLJgtBI9LLWgc8sqYjS8fm8M4JC/WC/JsFAqyq85m/EsTZESC5Sld:uITflN6grsqYbJ8bU9vTVvld
                                                                                          MD5:400AF3467BEA945FF08EEEEA48E212D4
                                                                                          SHA1:0B3A96CCE356B960C83CBC001F9FB855441B408D
                                                                                          SHA-256:D9870892CC9112382DBAD15D17931C7EC4CE4181B1F5237AA1F3C9B8F4BFDF88
                                                                                          SHA-512:CC70BD271678E3EAA94366FB7F5940F59FCAB8B5BF4C395DC1D4FBD78DA8C4D174D8A619A3328715416501C50AA7A6C4FA9A1BA958F32ABDC4611FA38676D9C9
                                                                                          Malicious:false
                                                                                          Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="17134" />.. <arg nm="vercsdbld" val="1" />.. <arg nm="verqfe" val="1" />.. <arg nm="csdbld" val="1" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="1033" />.. <arg nm="geoid" val="244" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="1614621" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.1.17134.0-11.0.47" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="4096" />..
                                                                                          Process:C:\Windows\System32\regsvr32.exe
                                                                                          File Type:Microsoft Cabinet archive data, 61712 bytes, 1 file
                                                                                          Category:dropped
                                                                                          Size (bytes):61712
                                                                                          Entropy (8bit):7.995044632446497
                                                                                          Encrypted:true
                                                                                          SSDEEP:1536:gzjJiDImMsrjCtGLaexX/zL09mX/lZHIxs:gPJiDI/sr0Hexv/0S/zx
                                                                                          MD5:589C442FC7A0C70DCA927115A700D41E
                                                                                          SHA1:66A07DACE3AFBFD1AA07A47E6875BEAB62C4BB31
                                                                                          SHA-256:2E5CB72E9EB43BAAFB6C6BFCC573AAC92F49A8064C483F9D378A9E8E781A526A
                                                                                          SHA-512:1B5FA79E52BE495C42CF49618441FB7012E28C02E7A08A91DA9213DB3AB810F0E83485BC1DD5F625A47D0BA7CFCDD5EA50ACC9A8DCEBB39F048C40F01E94155B
                                                                                          Malicious:false
                                                                                          Preview:MSCF............,...................I........y.........Tf. .authroot.stl..W.`.4..CK..8U[...q.yL'sf!d.D..."2.2g.<dVI.!.....$).\...!2s..(...[.T7..{}...g....g.....w.km$.&|..qe.n.8+..&...O...`...+..C......`h!0.I.(C..1Q*L.p..".s..B.....H......fUP@..5...(X#.t.2lX.>.y|D.0Z0...M....I(.#.-... ...(.J....2..`.hO..{l+.bd7y.j..u.....3....<......3....s.T...._.'...%{v...s..............KgV.0..X=.A.9w9.Ea.x..........\.=.e.C2......9.......`.o... .......@pm.. a.....-M.....{...s.mW.....;.+...A......0.g..L9#.v.&O>./xSH.S.....GH.6.j...`2.(0g..... Lt........h4.iQ?....[.K.....uI......}.....d....M.....6q.Q~.0.\.'U^)`..u.....-........d..7...2.-.2+3.....A./.%Q...k...Q.,...H.B.%..O..x..5\...Hk.......B.';"Ym.'....X.l.E.6..a8.6..nq..x.r4..1t.....,..u.O..O.L...Uf...X.u.F .(.(.....".q...n{%U.-u....l6!....Z....~o0.}Q'.s.i....7...>4x...A.h.Mk].O.z.].6...53...b^;..>e..x.'1..\p.O.k..B1w..|..K.R.....2.e0..X.^...I...w..!.v5B]x..z.6.G^uF..].b.W...'..I.;..p..@L{.E..@W..3.&...
                                                                                          Process:C:\Windows\System32\regsvr32.exe
                                                                                          File Type:data
                                                                                          Category:modified
                                                                                          Size (bytes):326
                                                                                          Entropy (8bit):3.135891594007862
                                                                                          Encrypted:false
                                                                                          SSDEEP:6:kKDu+N+SkQlPlEGYRMY9z+4KlDA3RUeWlEZ21:6NkPlE99SNxAhUeE1
                                                                                          MD5:393A75620FA9245A499CC73005C86D0E
                                                                                          SHA1:556A243C5C445F94D53A27B455BB4C5997DA58B8
                                                                                          SHA-256:074F48DB61AAE7BAE1D2CB0A71B962643B737A4B82A2EE57E3D1BA81C69F0937
                                                                                          SHA-512:1BD9CD7B547AAC9F141E3BE355598CA09DA13A12318087C9B59E685E752BF01B0F7F3CD2264870457661378C507A14B3FFE58478EAAE2E0F494EE867E47D57EC
                                                                                          Malicious:false
                                                                                          Preview:p...... ...............(....................................................... .........L.........$...............h.t.t.p.:././.c.t.l.d.l...w.i.n.d.o.w.s.u.p.d.a.t.e...c.o.m./.m.s.d.o.w.n.l.o.a.d./.u.p.d.a.t.e./.v.3./.s.t.a.t.i.c./.t.r.u.s.t.e.d.r./.e.n./.a.u.t.h.r.o.o.t.s.t.l...c.a.b...".0.9.f.4.c.9.6.9.8.b.d.8.1.:.0."...
                                                                                          Process:C:\Windows\System32\svchost.exe
                                                                                          File Type:ASCII text, with no line terminators
                                                                                          Category:dropped
                                                                                          Size (bytes):55
                                                                                          Entropy (8bit):4.306461250274409
                                                                                          Encrypted:false
                                                                                          SSDEEP:3:YDQRWu83XfAw2fHbY:YMRl83Xt2f7Y
                                                                                          MD5:DCA83F08D448911A14C22EBCACC5AD57
                                                                                          SHA1:91270525521B7FE0D986DB19747F47D34B6318AD
                                                                                          SHA-256:2B4B2D4A06044AD0BD2AE3287CFCBECD90B959FEB2F503AC258D7C0A235D6FE9
                                                                                          SHA-512:96F3A02DC4AE302A30A376FC7082002065C7A35ECB74573DE66254EFD701E8FD9E9D867A2C8ABEB4C482738291B715D4965A0D2412663FDF1EE6CBC0BA9FBACA
                                                                                          Malicious:false
                                                                                          Preview:{"fontSetUri":"fontset-2017-04.json","baseUri":"fonts"}
                                                                                          Process:C:\Program Files\Windows Defender\MpCmdRun.exe
                                                                                          File Type:Little-endian UTF-16 Unicode text, with CRLF, CR line terminators
                                                                                          Category:modified
                                                                                          Size (bytes):9062
                                                                                          Entropy (8bit):3.1630398757988987
                                                                                          Encrypted:false
                                                                                          SSDEEP:192:cY+38+DJl+ibJ6+ioJJ+i3N+WtT+E9tD+Ett3d+E3zEy+fs:j+s+v+b+P+m+0+Q+q+I+k
                                                                                          MD5:79C0D9DDA6271582B2DD5E96FD072C8F
                                                                                          SHA1:C6E2EFC633A02091186D2EEF6B6E6D9728BB8C20
                                                                                          SHA-256:F0AAA959E0E482063E0A73C441F227AD4D89864BB1369BD9F04DCE2416064DBB
                                                                                          SHA-512:985C3595CBC558823F96682BA09945350EEB386D76299E438F705099AC7ADADBACCBB1BC941C7A1C9041CBC4643416ACFB94362B7537D6109C6DD8B5EC9B48F5
                                                                                          Malicious:false
                                                                                          Preview:..........-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.....M.p.C.m.d.R.u.n.:. .C.o.m.m.a.n.d. .L.i.n.e.:. .".C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.W.i.n.d.o.w.s. .D.e.f.e.n.d.e.r.\.m.p.c.m.d.r.u.n...e.x.e.". .-.w.d.e.n.a.b.l.e..... .S.t.a.r.t. .T.i.m.e.:. .. T.h.u. .. J.u.n. .. 2.7. .. 2.0.1.9. .0.1.:.2.9.:.4.9.........M.p.E.n.s.u.r.e.P.r.o.c.e.s.s.M.i.t.i.g.a.t.i.o.n.P.o.l.i.c.y.:. .h.r. .=. .0.x.1.....W.D.E.n.a.b.l.e.....E.R.R.O.R.:. .M.p.W.D.E.n.a.b.l.e.(.T.R.U.E.). .f.a.i.l.e.d. .(.8.0.0.7.0.4.E.C.).....M.p.C.m.d.R.u.n.:. .E.n.d. .T.i.m.e.:. .. T.h.u. .. J.u.n. .. 2.7. .. 2.0.1.9. .0.1.:.2.9.:.4.9.....-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.............-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.
                                                                                          File type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                          Entropy (8bit):7.372720093100094
                                                                                          TrID:
                                                                                          • Win64 Dynamic Link Library (generic) (102004/3) 86.43%
                                                                                          • Win64 Executable (generic) (12005/4) 10.17%
                                                                                          • Generic Win/DOS Executable (2004/3) 1.70%
                                                                                          • DOS Executable Generic (2002/1) 1.70%
                                                                                          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.01%
                                                                                          File name:MIpuuSiSZ4.dll
                                                                                          File size:850944
                                                                                          MD5:1dd34935a785a419fb552b5086ea682e
                                                                                          SHA1:c6c966e4ba623f9972273de07b842ffbb9a9efce
                                                                                          SHA256:8b5a10f9a8f2b25057442111a01faf021ef7e048eab875a4078a44758d952c6f
                                                                                          SHA512:79ab4a827fd581cd87fad4b0470bfcaf26f9471181c6c199706c54cc1b636cc7719306feac1b50c24d051f65c3b4d84bc662b8e33c03a1fced07f8023689dcfc
                                                                                          SSDEEP:12288:jRCGXj4KVB9abMfyzfqvHWnyPv+LVHT2+2JNdX712kBjtOJZObrGzifb97Vw+Uvf:kGXj3X7FjkZqrqiBVwDbu5nP2F
                                                                                          TLSH:7005D06773A509B5E0B7D139CA128E86FAB2BC091720F74B03E495752F23750A67F722
                                                                                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........d..t7..t7..t7w.w6..t7w.q6!.t7w.p6..t7..q6..t7..p6..t7..w6..t7w.u6..t7..u7..t7e.q6..t7e.t6..t7e..7..t7...7..t7e.v6..t7Rich..t
                                                                                          Icon Hash:74f0e4ecccdce0e4
                                                                                          Entrypoint:0x180002c54
                                                                                          Entrypoint Section:.text
                                                                                          Digitally signed:false
                                                                                          Imagebase:0x180000000
                                                                                          Subsystem:windows gui
                                                                                          Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, DLL
                                                                                          DLL Characteristics:HIGH_ENTROPY_VA, NX_COMPAT
                                                                                          Time Stamp:0x62CC7629 [Mon Jul 11 19:12:41 2022 UTC]
                                                                                          TLS Callbacks:
                                                                                          CLR (.Net) Version:
                                                                                          OS Version Major:6
                                                                                          OS Version Minor:0
                                                                                          File Version Major:6
                                                                                          File Version Minor:0
                                                                                          Subsystem Version Major:6
                                                                                          Subsystem Version Minor:0
                                                                                          Import Hash:c2b03f92959f67ac494853faf0032582
                                                                                          Instruction
                                                                                          dec eax
                                                                                          mov dword ptr [esp+08h], ebx
                                                                                          dec eax
                                                                                          mov dword ptr [esp+10h], esi
                                                                                          push edi
                                                                                          dec eax
                                                                                          sub esp, 20h
                                                                                          dec ecx
                                                                                          mov edi, eax
                                                                                          mov ebx, edx
                                                                                          dec eax
                                                                                          mov esi, ecx
                                                                                          cmp edx, 01h
                                                                                          jne 00007FD5E8C48D07h
                                                                                          call 00007FD5E8C493BCh
                                                                                          dec esp
                                                                                          mov eax, edi
                                                                                          mov edx, ebx
                                                                                          dec eax
                                                                                          mov ecx, esi
                                                                                          dec eax
                                                                                          mov ebx, dword ptr [esp+30h]
                                                                                          dec eax
                                                                                          mov esi, dword ptr [esp+38h]
                                                                                          dec eax
                                                                                          add esp, 20h
                                                                                          pop edi
                                                                                          jmp 00007FD5E8C48B70h
                                                                                          int3
                                                                                          int3
                                                                                          int3
                                                                                          dec eax
                                                                                          and dword ptr [ecx+10h], 00000000h
                                                                                          dec eax
                                                                                          lea eax, dword ptr [0005B5E0h]
                                                                                          dec eax
                                                                                          mov dword ptr [ecx], eax
                                                                                          dec eax
                                                                                          mov eax, ecx
                                                                                          dec eax
                                                                                          mov dword ptr [ecx+08h], edx
                                                                                          ret
                                                                                          int3
                                                                                          inc eax
                                                                                          push ebx
                                                                                          dec eax
                                                                                          sub esp, 20h
                                                                                          dec eax
                                                                                          mov ebx, ecx
                                                                                          dec eax
                                                                                          mov eax, edx
                                                                                          dec eax
                                                                                          lea ecx, dword ptr [0005B591h]
                                                                                          xorps xmm0, xmm0
                                                                                          dec eax
                                                                                          mov dword ptr [ebx], ecx
                                                                                          dec eax
                                                                                          lea edx, dword ptr [ebx+08h]
                                                                                          dec eax
                                                                                          lea ecx, dword ptr [eax+08h]
                                                                                          movups dqword ptr [edx], xmm0
                                                                                          call 00007FD5E8C4AAD0h
                                                                                          dec eax
                                                                                          lea eax, dword ptr [0005B5A4h]
                                                                                          dec eax
                                                                                          mov dword ptr [ebx], eax
                                                                                          dec eax
                                                                                          mov eax, ebx
                                                                                          dec eax
                                                                                          add esp, 20h
                                                                                          pop ebx
                                                                                          ret
                                                                                          dec eax
                                                                                          and dword ptr [ecx+10h], 00000000h
                                                                                          dec eax
                                                                                          lea eax, dword ptr [0005B59Ch]
                                                                                          dec eax
                                                                                          mov dword ptr [ecx+08h], eax
                                                                                          dec eax
                                                                                          lea eax, dword ptr [0005B581h]
                                                                                          dec eax
                                                                                          mov dword ptr [ecx], eax
                                                                                          dec eax
                                                                                          mov eax, ecx
                                                                                          ret
                                                                                          int3
                                                                                          int3
                                                                                          inc eax
                                                                                          push ebx
                                                                                          dec eax
                                                                                          sub esp, 20h
                                                                                          dec eax
                                                                                          mov ebx, ecx
                                                                                          dec eax
                                                                                          mov eax, edx
                                                                                          dec eax
                                                                                          lea ecx, dword ptr [0005B535h]
                                                                                          NameVirtual AddressVirtual Size Is in Section
                                                                                          IMAGE_DIRECTORY_ENTRY_EXPORT0x6eeb00x414.rdata
                                                                                          IMAGE_DIRECTORY_ENTRY_IMPORT0x6f2c40x64.rdata
                                                                                          IMAGE_DIRECTORY_ENTRY_RESOURCE0x790000x5b020.rsrc
                                                                                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x730000x4638.pdata
                                                                                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                          IMAGE_DIRECTORY_ENTRY_BASERELOC0xd50000x80c.reloc
                                                                                          IMAGE_DIRECTORY_ENTRY_DEBUG0x687c00x1c.rdata
                                                                                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x687e00x138.rdata
                                                                                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                          IMAGE_DIRECTORY_ENTRY_IAT0x5d0000x338.rdata
                                                                                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                          NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                          .text0x10000x5b4c00x5b600False0.39445376624487005data6.495530086549807IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                          .rdata0x5d0000x12dae0x12e00False0.39502276490066224data5.29311907790045IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                          .data0x700000x27400xe00False0.17606026785714285data2.4721317906474725IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                          .pdata0x730000x46380x4800False0.5061848958333334data5.700987254121771IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                          _RDATA0x780000xf40x200False0.306640625data1.9910589321100538IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                          .rsrc0x790000x5b0200x5b200False0.9233324759945131data7.923209381955667IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                          .reloc0xd50000x80c0xa00False0.453515625data4.916763645477666IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                                          NameRVASizeTypeLanguageCountry
                                                                                          RT_HTML0x790a00x5ae00dataEnglishUnited States
                                                                                          RT_MANIFEST0xd3ea00x17dXML 1.0 document textEnglishUnited States
                                                                                          DLLImport
                                                                                          KERNEL32.dllLockResource, CreateFileW, OutputDebugStringW, LoadResource, GetModuleFileNameW, VirtualAllocExNuma, WriteConsoleW, FindResourceA, GetCurrentProcess, CloseHandle, ReadConsoleW, ReadFile, RtlCaptureContext, RtlLookupFunctionEntry, RtlVirtualUnwind, UnhandledExceptionFilter, SetUnhandledExceptionFilter, TerminateProcess, IsProcessorFeaturePresent, QueryPerformanceCounter, GetCurrentProcessId, GetCurrentThreadId, GetSystemTimeAsFileTime, InitializeSListHead, IsDebuggerPresent, GetStartupInfoW, GetModuleHandleW, RtlUnwindEx, RtlPcToFileHeader, RaiseException, InterlockedPushEntrySList, InterlockedFlushSList, GetLastError, SetLastError, EnterCriticalSection, LeaveCriticalSection, DeleteCriticalSection, InitializeCriticalSectionAndSpinCount, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, FreeLibrary, GetProcAddress, LoadLibraryExW, EncodePointer, ExitProcess, GetModuleHandleExW, GetCurrentThread, HeapFree, HeapAlloc, GetStdHandle, GetFileType, FindClose, FindFirstFileExW, FindNextFileW, IsValidCodePage, GetACP, GetOEMCP, GetCPInfo, GetCommandLineA, GetCommandLineW, MultiByteToWideChar, WideCharToMultiByte, GetEnvironmentStringsW, FreeEnvironmentStringsW, SetEnvironmentVariableW, FlsAlloc, FlsGetValue, FlsSetValue, FlsFree, GetDateFormatW, GetTimeFormatW, CompareStringW, LCMapStringW, GetLocaleInfoW, IsValidLocale, GetUserDefaultLCID, EnumSystemLocalesW, GetProcessHeap, SetConsoleCtrlHandler, GetStringTypeW, GetFileSizeEx, SetFilePointerEx, SetStdHandle, HeapSize, HeapReAlloc, FlushFileBuffers, WriteFile, GetConsoleOutputCP, GetConsoleMode, RtlUnwind
                                                                                          USER32.dllLoadStringW
                                                                                          ADVAPI32.dllRegDeleteKeyW, RegCreateKeyExW, RegCloseKey, RegSetValueExW
                                                                                          ole32.dllStringFromCLSID, CoTaskMemFree
                                                                                          NameOrdinalAddress
                                                                                          AddStroke20x180001744
                                                                                          AddWordsToWordList30x180001970
                                                                                          AdviseInkChange40x180001978
                                                                                          CloneContext50x18000197c
                                                                                          CreateContext60x180001984
                                                                                          CreateRecognizer70x1800019ec
                                                                                          DestroyAlternate80x180001a54
                                                                                          DestroyContext90x180001a5c
                                                                                          DestroyRecognizer100x180001ac4
                                                                                          DestroyWordList110x180001ae8
                                                                                          DllRegisterServer120x180001e0c
                                                                                          DllUnregisterServer130x180001fc0
                                                                                          GetBestResultString10x1800010b8
                                                                                          GetContextPreferenceFlags140x18000201c
                                                                                          GetContextPropertyList150x180002024
                                                                                          GetContextPropertyValue160x18000202c
                                                                                          GetEnabledUnicodeRanges170x180002034
                                                                                          GetGuide180x18000203c
                                                                                          GetLatticePtr190x180002080
                                                                                          GetLeftSeparator200x1800022a4
                                                                                          GetPreferredPacketDescription210x1800022ac
                                                                                          GetRecoAttributes220x180002328
                                                                                          GetResultPropertyList230x180002340
                                                                                          GetRightSeparator240x180002348
                                                                                          GetUnicodeRanges250x180002350
                                                                                          IsStringSupported260x180002358
                                                                                          MakeWordList270x180002360
                                                                                          Process280x180002368
                                                                                          ResetContext290x180002688
                                                                                          SetCACMode300x1800026e0
                                                                                          SetContextPropertyValue310x1800026e8
                                                                                          SetEnabledUnicodeRanges320x1800026f0
                                                                                          SetFactoid330x1800026f8
                                                                                          SetFlags340x1800026fc
                                                                                          SetGuide350x180002700
                                                                                          SetTextContext360x1800027a8
                                                                                          SetWordList370x1800027b0
                                                                                          Language of compilation systemCountry where language is spokenMap
                                                                                          EnglishUnited States
                                                                                          TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                                                                          192.168.2.7174.138.33.494979470802404316 07/22/22-13:58:44.263207TCP2404316ET CNC Feodo Tracker Reported CnC Server TCP group 9497947080192.168.2.7174.138.33.49
                                                                                          TimestampSource PortDest PortSource IPDest IP
                                                                                          Jul 22, 2022 14:11:39.982661963 CEST497617080192.168.2.3174.138.33.49
                                                                                          Jul 22, 2022 14:11:40.086760998 CEST708049761174.138.33.49192.168.2.3
                                                                                          Jul 22, 2022 14:11:40.086891890 CEST497617080192.168.2.3174.138.33.49
                                                                                          Jul 22, 2022 14:11:40.112767935 CEST497617080192.168.2.3174.138.33.49
                                                                                          Jul 22, 2022 14:11:40.215147972 CEST708049761174.138.33.49192.168.2.3
                                                                                          Jul 22, 2022 14:11:40.233104944 CEST708049761174.138.33.49192.168.2.3
                                                                                          Jul 22, 2022 14:11:40.233135939 CEST708049761174.138.33.49192.168.2.3
                                                                                          Jul 22, 2022 14:11:40.233262062 CEST497617080192.168.2.3174.138.33.49
                                                                                          Jul 22, 2022 14:11:42.999223948 CEST497617080192.168.2.3174.138.33.49
                                                                                          Jul 22, 2022 14:11:43.104422092 CEST708049761174.138.33.49192.168.2.3
                                                                                          Jul 22, 2022 14:11:43.105884075 CEST497617080192.168.2.3174.138.33.49
                                                                                          Jul 22, 2022 14:11:43.111108065 CEST497617080192.168.2.3174.138.33.49
                                                                                          Jul 22, 2022 14:11:43.250535965 CEST708049761174.138.33.49192.168.2.3
                                                                                          Jul 22, 2022 14:11:43.646327019 CEST708049761174.138.33.49192.168.2.3
                                                                                          Jul 22, 2022 14:11:43.648586035 CEST497617080192.168.2.3174.138.33.49
                                                                                          Jul 22, 2022 14:11:46.647919893 CEST708049761174.138.33.49192.168.2.3
                                                                                          Jul 22, 2022 14:11:46.647969007 CEST708049761174.138.33.49192.168.2.3
                                                                                          Jul 22, 2022 14:11:46.648163080 CEST497617080192.168.2.3174.138.33.49
                                                                                          Jul 22, 2022 14:13:29.858473063 CEST497617080192.168.2.3174.138.33.49
                                                                                          Jul 22, 2022 14:13:29.858508110 CEST497617080192.168.2.3174.138.33.49

                                                                                          Click to jump to process

                                                                                          Target ID:0
                                                                                          Start time:14:10:18
                                                                                          Start date:22/07/2022
                                                                                          Path:C:\Windows\System32\loaddll64.exe
                                                                                          Wow64 process (32bit):false
                                                                                          Commandline:loaddll64.exe "C:\Users\user\Desktop\MIpuuSiSZ4.dll"
                                                                                          Imagebase:0x7ff682600000
                                                                                          File size:140288 bytes
                                                                                          MD5 hash:4E8A40CAD6CCC047914E3A7830A2D8AA
                                                                                          Has elevated privileges:true
                                                                                          Has administrator privileges:true
                                                                                          Programmed in:C, C++ or other language
                                                                                          Yara matches:
                                                                                          • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000000.00000002.364452628.0000015738060000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                          • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000000.00000002.364805521.0000015739971000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                          Reputation:high

                                                                                          Target ID:1
                                                                                          Start time:14:10:18
                                                                                          Start date:22/07/2022
                                                                                          Path:C:\Windows\System32\cmd.exe
                                                                                          Wow64 process (32bit):false
                                                                                          Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\MIpuuSiSZ4.dll",#1
                                                                                          Imagebase:0x7ff689bc0000
                                                                                          File size:273920 bytes
                                                                                          MD5 hash:4E2ACF4F8A396486AB4268C94A6A245F
                                                                                          Has elevated privileges:true
                                                                                          Has administrator privileges:true
                                                                                          Programmed in:C, C++ or other language
                                                                                          Reputation:high

                                                                                          Target ID:2
                                                                                          Start time:14:10:19
                                                                                          Start date:22/07/2022
                                                                                          Path:C:\Windows\System32\regsvr32.exe
                                                                                          Wow64 process (32bit):false
                                                                                          Commandline:regsvr32.exe /s C:\Users\user\Desktop\MIpuuSiSZ4.dll
                                                                                          Imagebase:0x7ff6da7e0000
                                                                                          File size:24064 bytes
                                                                                          MD5 hash:D78B75FC68247E8A63ACBA846182740E
                                                                                          Has elevated privileges:true
                                                                                          Has administrator privileges:true
                                                                                          Programmed in:C, C++ or other language
                                                                                          Yara matches:
                                                                                          • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000002.00000002.345850399.0000000000710000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                          • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000002.00000002.346021007.0000000002061000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                          Reputation:high

                                                                                          Target ID:3
                                                                                          Start time:14:10:19
                                                                                          Start date:22/07/2022
                                                                                          Path:C:\Windows\System32\rundll32.exe
                                                                                          Wow64 process (32bit):false
                                                                                          Commandline:rundll32.exe "C:\Users\user\Desktop\MIpuuSiSZ4.dll",#1
                                                                                          Imagebase:0x7ff643150000
                                                                                          File size:69632 bytes
                                                                                          MD5 hash:73C519F050C20580F8A62C849D49215A
                                                                                          Has elevated privileges:true
                                                                                          Has administrator privileges:true
                                                                                          Programmed in:C, C++ or other language
                                                                                          Yara matches:
                                                                                          • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000003.00000000.348541554.0000022FC4510000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                          • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000003.00000002.377797661.0000022FC4510000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                          • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000003.00000000.348813253.0000022FC4571000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                          • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000003.00000000.338942505.0000022FC4510000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                          • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000003.00000002.377880147.0000022FC4571000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                          • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000003.00000000.338998123.0000022FC4571000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                          Reputation:high

                                                                                          Target ID:4
                                                                                          Start time:14:10:19
                                                                                          Start date:22/07/2022
                                                                                          Path:C:\Windows\System32\rundll32.exe
                                                                                          Wow64 process (32bit):false
                                                                                          Commandline:rundll32.exe C:\Users\user\Desktop\MIpuuSiSZ4.dll,AddStroke
                                                                                          Imagebase:0x7ff643150000
                                                                                          File size:69632 bytes
                                                                                          MD5 hash:73C519F050C20580F8A62C849D49215A
                                                                                          Has elevated privileges:true
                                                                                          Has administrator privileges:true
                                                                                          Programmed in:C, C++ or other language
                                                                                          Yara matches:
                                                                                          • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000004.00000002.378702987.0000014980010000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                          • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000004.00000002.378747717.0000014980071000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                          • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000004.00000000.352241442.0000014980010000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                          • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000004.00000000.345097590.0000014980010000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                          • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000004.00000000.349632978.0000014980071000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                          • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000004.00000000.352325443.0000014980071000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                          Reputation:high

                                                                                          Target ID:5
                                                                                          Start time:14:10:24
                                                                                          Start date:22/07/2022
                                                                                          Path:C:\Windows\System32\rundll32.exe
                                                                                          Wow64 process (32bit):false
                                                                                          Commandline:rundll32.exe C:\Users\user\Desktop\MIpuuSiSZ4.dll,AddWordsToWordList
                                                                                          Imagebase:0x7ff643150000
                                                                                          File size:69632 bytes
                                                                                          MD5 hash:73C519F050C20580F8A62C849D49215A
                                                                                          Has elevated privileges:true
                                                                                          Has administrator privileges:true
                                                                                          Programmed in:C, C++ or other language
                                                                                          Yara matches:
                                                                                          • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000005.00000002.351700174.0000020000071000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                          • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000005.00000002.351638703.0000020000010000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                          Reputation:high

                                                                                          Target ID:6
                                                                                          Start time:14:10:28
                                                                                          Start date:22/07/2022
                                                                                          Path:C:\Windows\System32\rundll32.exe
                                                                                          Wow64 process (32bit):false
                                                                                          Commandline:rundll32.exe C:\Users\user\Desktop\MIpuuSiSZ4.dll,AdviseInkChange
                                                                                          Imagebase:0x7ff643150000
                                                                                          File size:69632 bytes
                                                                                          MD5 hash:73C519F050C20580F8A62C849D49215A
                                                                                          Has elevated privileges:true
                                                                                          Has administrator privileges:true
                                                                                          Programmed in:C, C++ or other language
                                                                                          Yara matches:
                                                                                          • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000006.00000002.358968494.000001A029F41000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                          • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000006.00000002.358868561.000001A029EE0000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                          Reputation:high

                                                                                          Target ID:7
                                                                                          Start time:14:10:30
                                                                                          Start date:22/07/2022
                                                                                          Path:C:\Windows\System32\svchost.exe
                                                                                          Wow64 process (32bit):false
                                                                                          Commandline:C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
                                                                                          Imagebase:0x7ff73c930000
                                                                                          File size:51288 bytes
                                                                                          MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                                          Has elevated privileges:true
                                                                                          Has administrator privileges:true
                                                                                          Programmed in:C, C++ or other language
                                                                                          Reputation:high

                                                                                          Target ID:9
                                                                                          Start time:14:10:45
                                                                                          Start date:22/07/2022
                                                                                          Path:C:\Windows\System32\svchost.exe
                                                                                          Wow64 process (32bit):false
                                                                                          Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
                                                                                          Imagebase:0x7ff73c930000
                                                                                          File size:51288 bytes
                                                                                          MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                                          Has elevated privileges:true
                                                                                          Has administrator privileges:true
                                                                                          Programmed in:C, C++ or other language

                                                                                          Target ID:12
                                                                                          Start time:14:10:54
                                                                                          Start date:22/07/2022
                                                                                          Path:C:\Windows\System32\regsvr32.exe
                                                                                          Wow64 process (32bit):false
                                                                                          Commandline:C:\Windows\system32\regsvr32.exe "C:\Windows\system32\GAjjZRZVj\QFdWkQKkPokX.dll"
                                                                                          Imagebase:0x7ff6da7e0000
                                                                                          File size:24064 bytes
                                                                                          MD5 hash:D78B75FC68247E8A63ACBA846182740E
                                                                                          Has elevated privileges:true
                                                                                          Has administrator privileges:true
                                                                                          Programmed in:C, C++ or other language
                                                                                          Yara matches:
                                                                                          • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000C.00000002.662977936.0000000002D11000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                          • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000C.00000002.662715077.0000000002CB0000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                          • Rule: JoeSecurity_Emotet_3, Description: , Source: 0000000C.00000002.661348004.0000000001298000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security

                                                                                          Target ID:13
                                                                                          Start time:14:10:58
                                                                                          Start date:22/07/2022
                                                                                          Path:C:\Windows\System32\WerFault.exe
                                                                                          Wow64 process (32bit):false
                                                                                          Commandline:C:\Windows\system32\WerFault.exe -u -p 6776 -s 324
                                                                                          Imagebase:0x7ff61dc30000
                                                                                          File size:494488 bytes
                                                                                          MD5 hash:2AFFE478D86272288BBEF5A00BBEF6A0
                                                                                          Has elevated privileges:true
                                                                                          Has administrator privileges:true
                                                                                          Programmed in:C, C++ or other language

                                                                                          Target ID:14
                                                                                          Start time:14:11:00
                                                                                          Start date:22/07/2022
                                                                                          Path:C:\Windows\System32\WerFault.exe
                                                                                          Wow64 process (32bit):false
                                                                                          Commandline:C:\Windows\system32\WerFault.exe -u -p 6792 -s 328
                                                                                          Imagebase:0x7ff61dc30000
                                                                                          File size:494488 bytes
                                                                                          MD5 hash:2AFFE478D86272288BBEF5A00BBEF6A0
                                                                                          Has elevated privileges:true
                                                                                          Has administrator privileges:true
                                                                                          Programmed in:C, C++ or other language

                                                                                          Target ID:15
                                                                                          Start time:14:11:03
                                                                                          Start date:22/07/2022
                                                                                          Path:C:\Windows\System32\regsvr32.exe
                                                                                          Wow64 process (32bit):false
                                                                                          Commandline:C:\Windows\system32\regsvr32.exe "C:\Windows\system32\ZcjkHmdxs\qpwRIIkrlFzB.dll"
                                                                                          Imagebase:0x7ff6da7e0000
                                                                                          File size:24064 bytes
                                                                                          MD5 hash:D78B75FC68247E8A63ACBA846182740E
                                                                                          Has elevated privileges:true
                                                                                          Has administrator privileges:true
                                                                                          Programmed in:C, C++ or other language

                                                                                          Target ID:16
                                                                                          Start time:14:11:04
                                                                                          Start date:22/07/2022
                                                                                          Path:C:\Windows\System32\svchost.exe
                                                                                          Wow64 process (32bit):false
                                                                                          Commandline:c:\windows\system32\svchost.exe -k localservice -p -s CDPSvc
                                                                                          Imagebase:0x7ff73c930000
                                                                                          File size:51288 bytes
                                                                                          MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                                          Has elevated privileges:true
                                                                                          Has administrator privileges:false
                                                                                          Programmed in:C, C++ or other language

                                                                                          Target ID:17
                                                                                          Start time:14:11:11
                                                                                          Start date:22/07/2022
                                                                                          Path:C:\Windows\System32\svchost.exe
                                                                                          Wow64 process (32bit):false
                                                                                          Commandline:c:\windows\system32\svchost.exe -k networkservice -p -s DoSvc
                                                                                          Imagebase:0x7ff73c930000
                                                                                          File size:51288 bytes
                                                                                          MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                                          Has elevated privileges:true
                                                                                          Has administrator privileges:false
                                                                                          Programmed in:C, C++ or other language

                                                                                          Target ID:18
                                                                                          Start time:14:11:13
                                                                                          Start date:22/07/2022
                                                                                          Path:C:\Windows\System32\svchost.exe
                                                                                          Wow64 process (32bit):false
                                                                                          Commandline:C:\Windows\System32\svchost.exe -k NetworkService -p
                                                                                          Imagebase:0x7ff73c930000
                                                                                          File size:51288 bytes
                                                                                          MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                                          Has elevated privileges:true
                                                                                          Has administrator privileges:false
                                                                                          Programmed in:C, C++ or other language

                                                                                          Target ID:19
                                                                                          Start time:14:11:13
                                                                                          Start date:22/07/2022
                                                                                          Path:C:\Windows\System32\SgrmBroker.exe
                                                                                          Wow64 process (32bit):false
                                                                                          Commandline:C:\Windows\system32\SgrmBroker.exe
                                                                                          Imagebase:0x7ff7b9e90000
                                                                                          File size:163336 bytes
                                                                                          MD5 hash:D3170A3F3A9626597EEE1888686E3EA6
                                                                                          Has elevated privileges:true
                                                                                          Has administrator privileges:true
                                                                                          Programmed in:C, C++ or other language

                                                                                          Target ID:20
                                                                                          Start time:14:11:14
                                                                                          Start date:22/07/2022
                                                                                          Path:C:\Windows\System32\svchost.exe
                                                                                          Wow64 process (32bit):false
                                                                                          Commandline:c:\windows\system32\svchost.exe -k localservicenetworkrestricted -p -s wscsvc
                                                                                          Imagebase:0x7ff73c930000
                                                                                          File size:51288 bytes
                                                                                          MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                                          Has elevated privileges:true
                                                                                          Has administrator privileges:false
                                                                                          Programmed in:C, C++ or other language

                                                                                          Target ID:21
                                                                                          Start time:14:11:32
                                                                                          Start date:22/07/2022
                                                                                          Path:C:\Windows\System32\svchost.exe
                                                                                          Wow64 process (32bit):false
                                                                                          Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p
                                                                                          Imagebase:0x7ff73c930000
                                                                                          File size:51288 bytes
                                                                                          MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                                          Has elevated privileges:true
                                                                                          Has administrator privileges:true
                                                                                          Programmed in:C, C++ or other language

                                                                                          Target ID:23
                                                                                          Start time:14:12:03
                                                                                          Start date:22/07/2022
                                                                                          Path:C:\Windows\System32\svchost.exe
                                                                                          Wow64 process (32bit):false
                                                                                          Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p
                                                                                          Imagebase:0x7ff73c930000
                                                                                          File size:51288 bytes
                                                                                          MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                                          Has elevated privileges:true
                                                                                          Has administrator privileges:true
                                                                                          Programmed in:C, C++ or other language

                                                                                          Target ID:26
                                                                                          Start time:14:12:15
                                                                                          Start date:22/07/2022
                                                                                          Path:C:\Program Files\Windows Defender\MpCmdRun.exe
                                                                                          Wow64 process (32bit):false
                                                                                          Commandline:"C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable
                                                                                          Imagebase:0x7ff7a3c50000
                                                                                          File size:455656 bytes
                                                                                          MD5 hash:A267555174BFA53844371226F482B86B
                                                                                          Has elevated privileges:true
                                                                                          Has administrator privileges:false
                                                                                          Programmed in:C, C++ or other language

                                                                                          Target ID:27
                                                                                          Start time:14:12:15
                                                                                          Start date:22/07/2022
                                                                                          Path:C:\Windows\System32\conhost.exe
                                                                                          Wow64 process (32bit):false
                                                                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                          Imagebase:0x7ff7c9170000
                                                                                          File size:625664 bytes
                                                                                          MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                                          Has elevated privileges:true
                                                                                          Has administrator privileges:false
                                                                                          Programmed in:C, C++ or other language

                                                                                          Target ID:29
                                                                                          Start time:14:12:29
                                                                                          Start date:22/07/2022
                                                                                          Path:C:\Windows\System32\svchost.exe
                                                                                          Wow64 process (32bit):false
                                                                                          Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p
                                                                                          Imagebase:0x7ff73c930000
                                                                                          File size:51288 bytes
                                                                                          MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                                          Has elevated privileges:true
                                                                                          Has administrator privileges:true
                                                                                          Programmed in:C, C++ or other language

                                                                                          Target ID:32
                                                                                          Start time:14:12:50
                                                                                          Start date:22/07/2022
                                                                                          Path:C:\Windows\System32\svchost.exe
                                                                                          Wow64 process (32bit):false
                                                                                          Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p
                                                                                          Imagebase:0x7ff73c930000
                                                                                          File size:51288 bytes
                                                                                          MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                                          Has elevated privileges:true
                                                                                          Has administrator privileges:true
                                                                                          Programmed in:C, C++ or other language

                                                                                          No disassembly