Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
548IrCt4hj.dll

Overview

General Information

Sample Name:548IrCt4hj.dll
Analysis ID:672062
MD5:7301880b88f87cd3a593f7106d5743cc
SHA1:c8a2b0ae061b612f4d4a4cfc4ee3e1f7079b4240
SHA256:c409ad4f64a1ad925ffbfdb88f57dd9177123364a1875caf6cbb6f5ba3970cc3
Tags:exeOpenCTIBRSandboxed
Infos:

Detection

Emotet
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Yara detected Emotet
System process connects to network (likely due to code injection or exploit)
Antivirus detection for URL or domain
Snort IDS alert for network traffic
Changes security center settings (notifications, updates, antivirus, firewall)
C2 URLs / IPs found in malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Queries the volume information (name, serial number etc) of a device
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query locales information (e.g. system language)
Deletes files inside the Windows folder
May sleep (evasive loops) to hinder dynamic analysis
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Uses code obfuscation techniques (call, push, ret)
Creates files inside the system directory
PE file contains sections with non-standard names
Internet Provider seen in connection with other malware
Detected potential crypto function
Found potential string decryption / allocating functions
Sample execution stops while process was sleeping (likely an evasion)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality which may be used to detect a debugger (GetProcessHeap)
IP address seen in connection with other malware
AV process strings found (often used to terminate AV products)
PE file contains an invalid checksum
Tries to load missing DLLs
Drops PE files to the windows directory (C:\Windows)
Detected TCP or UDP traffic on non-standard ports
Checks if the current process is being debugged
Connects to several IPs in different countries
Registers a DLL
Queries disk information (often used to detect virtual machines)
Found large amount of non-executed APIs
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • loaddll64.exe (PID: 5724 cmdline: loaddll64.exe "C:\Users\user\Desktop\548IrCt4hj.dll" MD5: 4E8A40CAD6CCC047914E3A7830A2D8AA)
    • cmd.exe (PID: 244 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\548IrCt4hj.dll",#1 MD5: 4E2ACF4F8A396486AB4268C94A6A245F)
      • rundll32.exe (PID: 3080 cmdline: rundll32.exe "C:\Users\user\Desktop\548IrCt4hj.dll",#1 MD5: 73C519F050C20580F8A62C849D49215A)
    • regsvr32.exe (PID: 4760 cmdline: regsvr32.exe /s C:\Users\user\Desktop\548IrCt4hj.dll MD5: D78B75FC68247E8A63ACBA846182740E)
      • regsvr32.exe (PID: 5996 cmdline: C:\Windows\system32\regsvr32.exe "C:\Windows\system32\MbnmzGnNg\joXcB.dll" MD5: D78B75FC68247E8A63ACBA846182740E)
    • rundll32.exe (PID: 2924 cmdline: rundll32.exe C:\Users\user\Desktop\548IrCt4hj.dll,DllCanUnloadNow MD5: 73C519F050C20580F8A62C849D49215A)
    • rundll32.exe (PID: 3740 cmdline: rundll32.exe C:\Users\user\Desktop\548IrCt4hj.dll,DllGetClassObject MD5: 73C519F050C20580F8A62C849D49215A)
    • rundll32.exe (PID: 2560 cmdline: rundll32.exe C:\Users\user\Desktop\548IrCt4hj.dll,DllRegisterServer MD5: 73C519F050C20580F8A62C849D49215A)
  • svchost.exe (PID: 1012 cmdline: C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 1428 cmdline: c:\windows\system32\svchost.exe -k localservice -p -s CDPSvc MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 5892 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 4348 cmdline: c:\windows\system32\svchost.exe -k networkservice -p -s DoSvc MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 2572 cmdline: C:\Windows\System32\svchost.exe -k NetworkService -p MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • SgrmBroker.exe (PID: 3628 cmdline: C:\Windows\system32\SgrmBroker.exe MD5: D3170A3F3A9626597EEE1888686E3EA6)
  • svchost.exe (PID: 3532 cmdline: c:\windows\system32\svchost.exe -k localservicenetworkrestricted -p -s wscsvc MD5: 32569E403279B3FD2EDB7EBD036273FA)
    • MpCmdRun.exe (PID: 6056 cmdline: "C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable MD5: A267555174BFA53844371226F482B86B)
      • conhost.exe (PID: 5948 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • svchost.exe (PID: 5732 cmdline: c:\windows\system32\svchost.exe -k unistacksvcgroup MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 5244 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 6272 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 6280 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 6532 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 6756 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • cleanup
{"C2 list": ["118.98.72.86:443", "85.214.67.203:8080", "103.254.12.236:7080", "43.129.209.178:443", "88.217.172.165:8080", "78.47.204.80:443", "103.41.204.169:8080", "178.238.225.252:8080", "188.165.79.151:443", "104.244.79.94:443", "157.245.111.0:8080", "93.104.209.107:8080", "178.62.112.199:8080", "103.56.149.105:8080", "198.199.70.22:8080", "175.126.176.79:8080", "46.101.98.60:8080", "202.28.34.99:8080", "165.22.254.236:8080", "139.59.80.108:8080", "5.253.30.17:7080", "190.145.8.4:443", "54.37.228.122:443", "54.37.106.167:8080", "188.225.32.231:4143", "103.126.216.86:443", "196.44.98.190:8080", "104.248.225.227:8080", "37.44.244.177:8080", "87.106.97.83:7080", "64.227.55.231:8080", "210.57.209.142:8080", "83.229.80.93:8080", "174.138.33.49:7080", "85.25.120.45:8080", "139.196.72.155:8080", "190.107.19.179:443", "103.85.95.4:8080", "157.230.99.206:8080", "195.77.239.39:8080", "128.199.242.164:8080"], "Public Key": ["RUNTMSAAAAD0LxqDNhonUYwk8sqo7IWuUllRdUiUBnACc6romsQoe1YJD7wIe4AheqYofpZFucPDXCZ0z9i+ooUffqeoLZU0ObJw/wAXAJA=", "RUNLMSAAAADYNZPXY4tQxd/N4Wn5sTYAm5tUOxY2ol1ELrI4MNhHNi640vSLasjYTHpFRBoG+o84vtr7AJachCzOHjaAJFCWwrKX/wAcAJA="]}
SourceRuleDescriptionAuthorStrings
00000005.00000002.637949653.0000000000E40000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
    00000004.00000002.249040025.000001C7434E0000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
      00000005.00000002.638413256.0000000000EA8000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_Emotet_3Joe Security
        00000003.00000002.248792041.000001F26FD71000.00000020.00001000.00020000.00000000.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
          00000005.00000002.638139112.0000000000E71000.00000020.00001000.00020000.00000000.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
            Click to see the 4 entries
            SourceRuleDescriptionAuthorStrings
            2.2.regsvr32.exe.2060000.0.raw.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
              3.2.rundll32.exe.1f26fd40000.0.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
                5.2.regsvr32.exe.e40000.0.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
                  2.2.regsvr32.exe.2060000.0.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
                    5.2.regsvr32.exe.e40000.0.raw.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
                      Click to see the 3 entries
                      No Sigma rule has matched
                      Timestamp:192.168.2.5174.138.33.494976870802404316 07/23/22-04:56:42.473067
                      SID:2404316
                      Source Port:49768
                      Destination Port:7080
                      Protocol:TCP
                      Classtype:A Network Trojan was detected

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection

                      barindex
                      Source: 548IrCt4hj.dllVirustotal: Detection: 70%Perma Link
                      Source: 548IrCt4hj.dllMetadefender: Detection: 45%Perma Link
                      Source: 548IrCt4hj.dllReversingLabs: Detection: 88%
                      Source: https://174.138.33.49/UAvira URL Cloud: Label: malware
                      Source: https://174.138.33.49:7080/hInAvira URL Cloud: Label: malware
                      Source: https://174.138.33.49/QAvira URL Cloud: Label: malware
                      Source: 00000005.00000002.638413256.0000000000EA8000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: Emotet {"C2 list": ["118.98.72.86:443", "85.214.67.203:8080", "103.254.12.236:7080", "43.129.209.178:443", "88.217.172.165:8080", "78.47.204.80:443", "103.41.204.169:8080", "178.238.225.252:8080", "188.165.79.151:443", "104.244.79.94:443", "157.245.111.0:8080", "93.104.209.107:8080", "178.62.112.199:8080", "103.56.149.105:8080", "198.199.70.22:8080", "175.126.176.79:8080", "46.101.98.60:8080", "202.28.34.99:8080", "165.22.254.236:8080", "139.59.80.108:8080", "5.253.30.17:7080", "190.145.8.4:443", "54.37.228.122:443", "54.37.106.167:8080", "188.225.32.231:4143", "103.126.216.86:443", "196.44.98.190:8080", "104.248.225.227:8080", "37.44.244.177:8080", "87.106.97.83:7080", "64.227.55.231:8080", "210.57.209.142:8080", "83.229.80.93:8080", "174.138.33.49:7080", "85.25.120.45:8080", "139.196.72.155:8080", "190.107.19.179:443", "103.85.95.4:8080", "157.230.99.206:8080", "195.77.239.39:8080", "128.199.242.164:8080"], "Public Key": ["RUNTMSAAAAD0LxqDNhonUYwk8sqo7IWuUllRdUiUBnACc6romsQoe1YJD7wIe4AheqYofpZFucPDXCZ0z9i+ooUffqeoLZU0ObJw/wAXAJA=", "RUNLMSAAAADYNZPXY4tQxd/N4Wn5sTYAm5tUOxY2ol1ELrI4MNhHNi640vSLasjYTHpFRBoG+o84vtr7AJachCzOHjaAJFCWwrKX/wAcAJA="]}
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018006680C FindFirstFileExW,FindNextFileW,FindClose,FindClose,
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800671B0 FindFirstFileExW,
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800677BC FindFirstFileExW,FindNextFileW,FindClose,FindClose,
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00E8C9F0 FindFirstFileW,FindNextFileW,

                      Networking

                      barindex
                      Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 174.138.33.49 7080
                      Source: TrafficSnort IDS: 2404316 ET CNC Feodo Tracker Reported CnC Server TCP group 9 192.168.2.5:49768 -> 174.138.33.49:7080
                      Source: Malware configuration extractorIPs: 118.98.72.86:443
                      Source: Malware configuration extractorIPs: 85.214.67.203:8080
                      Source: Malware configuration extractorIPs: 103.254.12.236:7080
                      Source: Malware configuration extractorIPs: 43.129.209.178:443
                      Source: Malware configuration extractorIPs: 88.217.172.165:8080
                      Source: Malware configuration extractorIPs: 78.47.204.80:443
                      Source: Malware configuration extractorIPs: 103.41.204.169:8080
                      Source: Malware configuration extractorIPs: 178.238.225.252:8080
                      Source: Malware configuration extractorIPs: 188.165.79.151:443
                      Source: Malware configuration extractorIPs: 104.244.79.94:443
                      Source: Malware configuration extractorIPs: 157.245.111.0:8080
                      Source: Malware configuration extractorIPs: 93.104.209.107:8080
                      Source: Malware configuration extractorIPs: 178.62.112.199:8080
                      Source: Malware configuration extractorIPs: 103.56.149.105:8080
                      Source: Malware configuration extractorIPs: 198.199.70.22:8080
                      Source: Malware configuration extractorIPs: 175.126.176.79:8080
                      Source: Malware configuration extractorIPs: 46.101.98.60:8080
                      Source: Malware configuration extractorIPs: 202.28.34.99:8080
                      Source: Malware configuration extractorIPs: 165.22.254.236:8080
                      Source: Malware configuration extractorIPs: 139.59.80.108:8080
                      Source: Malware configuration extractorIPs: 5.253.30.17:7080
                      Source: Malware configuration extractorIPs: 190.145.8.4:443
                      Source: Malware configuration extractorIPs: 54.37.228.122:443
                      Source: Malware configuration extractorIPs: 54.37.106.167:8080
                      Source: Malware configuration extractorIPs: 188.225.32.231:4143
                      Source: Malware configuration extractorIPs: 103.126.216.86:443
                      Source: Malware configuration extractorIPs: 196.44.98.190:8080
                      Source: Malware configuration extractorIPs: 104.248.225.227:8080
                      Source: Malware configuration extractorIPs: 37.44.244.177:8080
                      Source: Malware configuration extractorIPs: 87.106.97.83:7080
                      Source: Malware configuration extractorIPs: 64.227.55.231:8080
                      Source: Malware configuration extractorIPs: 210.57.209.142:8080
                      Source: Malware configuration extractorIPs: 83.229.80.93:8080
                      Source: Malware configuration extractorIPs: 174.138.33.49:7080
                      Source: Malware configuration extractorIPs: 85.25.120.45:8080
                      Source: Malware configuration extractorIPs: 139.196.72.155:8080
                      Source: Malware configuration extractorIPs: 190.107.19.179:443
                      Source: Malware configuration extractorIPs: 103.85.95.4:8080
                      Source: Malware configuration extractorIPs: 157.230.99.206:8080
                      Source: Malware configuration extractorIPs: 195.77.239.39:8080
                      Source: Malware configuration extractorIPs: 128.199.242.164:8080
                      Source: Joe Sandbox ViewASN Name: DIGITALOCEAN-ASNUS DIGITALOCEAN-ASNUS
                      Source: Joe Sandbox ViewASN Name: DIGITALOCEAN-ASNUS DIGITALOCEAN-ASNUS
                      Source: Joe Sandbox ViewIP Address: 157.245.111.0 157.245.111.0
                      Source: Joe Sandbox ViewIP Address: 157.230.99.206 157.230.99.206
                      Source: global trafficTCP traffic: 192.168.2.4:49758 -> 174.138.33.49:7080
                      Source: unknownNetwork traffic detected: IP country count 20
                      Source: unknownTCP traffic detected without corresponding DNS query: 174.138.33.49
                      Source: unknownTCP traffic detected without corresponding DNS query: 174.138.33.49
                      Source: unknownTCP traffic detected without corresponding DNS query: 174.138.33.49
                      Source: unknownTCP traffic detected without corresponding DNS query: 174.138.33.49
                      Source: unknownTCP traffic detected without corresponding DNS query: 174.138.33.49
                      Source: unknownTCP traffic detected without corresponding DNS query: 174.138.33.49
                      Source: unknownTCP traffic detected without corresponding DNS query: 174.138.33.49
                      Source: unknownTCP traffic detected without corresponding DNS query: 174.138.33.49
                      Source: unknownTCP traffic detected without corresponding DNS query: 174.138.33.49
                      Source: unknownTCP traffic detected without corresponding DNS query: 174.138.33.49
                      Source: unknownTCP traffic detected without corresponding DNS query: 174.138.33.49
                      Source: unknownTCP traffic detected without corresponding DNS query: 174.138.33.49
                      Source: unknownTCP traffic detected without corresponding DNS query: 174.138.33.49
                      Source: regsvr32.exe, 00000005.00000003.542886608.0000000000F40000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000005.00000002.639255153.0000000000F40000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000015.00000003.326942278.0000019CF2EA9000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000015.00000002.603738336.0000019CF2E8B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000019.00000002.428654266.000001A111500000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
                      Source: svchost.exe, 00000015.00000002.603534517.0000019CF2E11000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000019.00000002.428413004.000001A110CEC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.ver)
                      Source: regsvr32.exe, 00000005.00000002.639099518.0000000000F0E000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000005.00000003.543111893.0000000000EE2000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000005.00000003.543343608.0000000000F0D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en#j
                      Source: regsvr32.exe, 00000005.00000003.542807166.0000000000F6C000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000005.00000002.639354379.0000000000F6C000.00000004.00000020.00020000.00000000.sdmp, 77EC63BDA74BD0D0E0426DC8F80085060.5.drString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
                      Source: regsvr32.exe, 00000005.00000003.542807166.0000000000F6C000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000005.00000002.639354379.0000000000F6C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab8
                      Source: svchost.exe, 00000019.00000003.408103656.000001A111599000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://help.disneyplus.com.
                      Source: svchost.exe, 0000000F.00000002.316348056.00000226FA013000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.bingmapsportal.com
                      Source: svchost.exe, 0000000C.00000002.638484661.0000024093E3E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://%s.dnet.xboxlive.com
                      Source: svchost.exe, 0000000C.00000002.638484661.0000024093E3E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://%s.xboxlive.com
                      Source: regsvr32.exe, 00000005.00000003.543111893.0000000000EE2000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000005.00000002.638784137.0000000000EE2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://174.138.33.49/Q
                      Source: regsvr32.exe, 00000005.00000003.543111893.0000000000EE2000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000005.00000002.638784137.0000000000EE2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://174.138.33.49/U
                      Source: regsvr32.exe, 00000005.00000003.543111893.0000000000EE2000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000005.00000002.638413256.0000000000EA8000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000005.00000002.638784137.0000000000EE2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://174.138.33.49:7080/
                      Source: regsvr32.exe, 00000005.00000002.638413256.0000000000EA8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://174.138.33.49:7080/hIn
                      Source: svchost.exe, 0000000C.00000002.638484661.0000024093E3E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://activity.windows.com
                      Source: svchost.exe, 0000000F.00000003.315897201.00000226FA04F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://appexmapsappupdate.blob.core.windows.net
                      Source: svchost.exe, 0000000C.00000002.638484661.0000024093E3E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bn2.notify.windows.com/v2/register/xplatform/device
                      Source: svchost.exe, 0000000C.00000002.638484661.0000024093E3E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://co4-df.notify.windows.com/v2/register/xplatform/device
                      Source: svchost.exe, 0000000F.00000003.315949220.00000226FA04B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.ditu.live.com/REST/v1/Imagery/Copyright/
                      Source: svchost.exe, 0000000F.00000003.315897201.00000226FA04F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.ditu.live.com/REST/v1/Locations
                      Source: svchost.exe, 0000000F.00000002.316427386.00000226FA03D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.ditu.live.com/REST/v1/Routes/
                      Source: svchost.exe, 0000000F.00000003.315897201.00000226FA04F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.ditu.live.com/mapcontrol/logging.ashx
                      Source: svchost.exe, 0000000F.00000003.291933590.00000226FA02F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Imagery/Copyright/
                      Source: svchost.exe, 0000000F.00000003.291933590.00000226FA02F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/JsonFilter/VenueMaps/data/
                      Source: svchost.exe, 0000000F.00000003.315897201.00000226FA04F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.291933590.00000226FA02F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Locations
                      Source: svchost.exe, 0000000F.00000002.316427386.00000226FA03D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Routes/
                      Source: svchost.exe, 0000000F.00000003.315897201.00000226FA04F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Routes/Driving
                      Source: svchost.exe, 0000000F.00000003.315897201.00000226FA04F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Routes/Transit
                      Source: svchost.exe, 0000000F.00000003.315897201.00000226FA04F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Routes/Walking
                      Source: svchost.exe, 0000000F.00000003.291933590.00000226FA02F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Traffic/Incidents/
                      Source: svchost.exe, 0000000F.00000002.316448338.00000226FA042000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.316013437.00000226FA03F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.316054783.00000226FA041000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Transit/Schedules/
                      Source: svchost.exe, 0000000F.00000003.291933590.00000226FA02F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Transit/Stops/
                      Source: svchost.exe, 0000000F.00000002.316448338.00000226FA042000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.316013437.00000226FA03F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.316054783.00000226FA041000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/mapcontrol/HumanScaleServices/GetBubbles.ashx?n=
                      Source: svchost.exe, 0000000F.00000003.315897201.00000226FA04F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/mapcontrol/logging.ashx
                      Source: svchost.exe, 0000000F.00000002.316465691.00000226FA047000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.316013437.00000226FA03F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.316032557.00000226FA046000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/webservices/v1/LoggingService/LoggingService.svc/Log?
                      Source: svchost.exe, 0000000F.00000003.291933590.00000226FA02F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/webservices/v1/LoggingService/LoggingService.svc/Log?entry=
                      Source: svchost.exe, 00000019.00000003.408103656.000001A111599000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://disneyplus.com/legal.
                      Source: svchost.exe, 0000000F.00000003.315949220.00000226FA04B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dynamic.api.tiles.ditu.live.com/odvs/gd?pv=1&r=
                      Source: svchost.exe, 0000000F.00000002.316465691.00000226FA047000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.316013437.00000226FA03F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.316032557.00000226FA046000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dynamic.api.tiles.ditu.live.com/odvs/gdi?pv=1&r=
                      Source: svchost.exe, 0000000F.00000002.316465691.00000226FA047000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.316013437.00000226FA03F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.316032557.00000226FA046000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dynamic.api.tiles.ditu.live.com/odvs/gdv?pv=1&r=
                      Source: svchost.exe, 0000000F.00000003.316013437.00000226FA03F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.316054783.00000226FA041000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.315949220.00000226FA04B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dynamic.t
                      Source: svchost.exe, 0000000F.00000003.315897201.00000226FA04F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dynamic.t0.tiles.ditu.live.com/comp/gen.ashx
                      Source: svchost.exe, 0000000F.00000002.316427386.00000226FA03D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.291933590.00000226FA02F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ecn.dev.virtualearth.net/REST/v1/Imagery/Copyright/
                      Source: svchost.exe, 0000000F.00000003.291933590.00000226FA02F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ecn.dev.virtualearth.net/mapcontrol/mapconfiguration.ashx?name=native&v=
                      Source: svchost.exe, 0000000F.00000003.291933590.00000226FA02F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ecn.dev.virtualearth.net/mapcontrol/roadshield.ashx?bucket=
                      Source: svchost.exe, 00000019.00000003.404927903.000001A111A02000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000019.00000003.404982809.000001A111593000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000019.00000003.405001225.000001A1115A4000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000019.00000003.405032312.000001A111A02000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://support.hotspotshield.com/
                      Source: svchost.exe, 0000000F.00000002.316440979.00000226FA040000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.316013437.00000226FA03F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/comp/gen.ashx
                      Source: svchost.exe, 0000000F.00000002.316427386.00000226FA03D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000002.316348056.00000226FA013000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gd?pv=1&r=
                      Source: svchost.exe, 0000000F.00000003.316049267.00000226FA045000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.316013437.00000226FA03F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdi?pv=1&r=
                      Source: svchost.exe, 0000000F.00000003.316049267.00000226FA045000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.316013437.00000226FA03F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdv?pv=1&r=
                      Source: svchost.exe, 0000000F.00000003.291933590.00000226FA02F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gri?pv=1&r=
                      Source: svchost.exe, 0000000F.00000002.316383374.00000226FA029000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.291933590.00000226FA02F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t0.ssl.ak.tiles.virtualearth.net/tiles/gen
                      Source: svchost.exe, 0000000F.00000002.316383374.00000226FA029000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t0.tiles.ditu.live.com/tiles/gen
                      Source: svchost.exe, 00000019.00000003.408103656.000001A111599000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.disneyplus.com/legal/privacy-policy
                      Source: svchost.exe, 00000019.00000003.408103656.000001A111599000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.disneyplus.com/legal/your-california-privacy-rights
                      Source: svchost.exe, 00000019.00000003.404927903.000001A111A02000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000019.00000003.404982809.000001A111593000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000019.00000003.405001225.000001A1115A4000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000019.00000003.405032312.000001A111A02000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.hotspotshield.com/terms/
                      Source: svchost.exe, 00000019.00000003.404927903.000001A111A02000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000019.00000003.404982809.000001A111593000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000019.00000003.405001225.000001A1115A4000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000019.00000003.405032312.000001A111A02000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.pango.co/privacy
                      Source: svchost.exe, 00000019.00000003.410454678.000001A11159B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000019.00000003.410402002.000001A1115B1000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000019.00000003.410518422.000001A111A02000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000019.00000003.410348749.000001A1115B1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.tiktok.com/legal/report/feedback

                      E-Banking Fraud

                      barindex
                      Source: Yara matchFile source: 00000005.00000002.638413256.0000000000EA8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 2.2.regsvr32.exe.2060000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.rundll32.exe.1f26fd40000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.regsvr32.exe.e40000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.regsvr32.exe.2060000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.regsvr32.exe.e40000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.1c7434e0000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.1c7434e0000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.rundll32.exe.1f26fd40000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000005.00000002.637949653.0000000000E40000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.249040025.000001C7434E0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.248792041.000001F26FD71000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.638139112.0000000000E71000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.248763264.000001F26FD40000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.252638967.0000000002091000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.252607659.0000000002060000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.249084413.000001C743541000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: C:\Windows\System32\regsvr32.exeFile deleted: C:\Windows\System32\MbnmzGnNg\joXcB.dll:Zone.IdentifierJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeFile created: C:\Windows\system32\MbnmzGnNg\Jump to behavior
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180001F87
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180003026
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018005E068
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180036074
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180001D57
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800640D0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018003A148
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180034174
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800019B5
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800361BC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018003E218
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800013F7
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800011D6
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180036304
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018003A3B0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800018B6
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018003442C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800034F9
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180003634
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800464AC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180003459
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180034574
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018006A5B0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800365F4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018003A618
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000427D
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800346BC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018003C6D4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800042AF
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800013F7
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800013F7
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180034808
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018006680C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180002CDE
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180001721
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180002F7C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800039EA
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180046920
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018004E924
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180002C61
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800349B4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180002D1F
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180060A88
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018004CAEC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180034AFC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180003CB0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180060A88
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180036B84
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180002F5E
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180001041
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180036CCC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800026CB
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180034D8C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180003206
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180036E14
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180046E30
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800034EF
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180060F1C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180003297
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180034F34
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180036F5C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180002C11
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180002FCC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800011DB
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180003C83
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180002DE2
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180004142
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018003507C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018003D0B0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800330BC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180037104
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000285B
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180003C33
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180073160
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800671B0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800351C4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800631C4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180033204
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018003724C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180002F72
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180001023
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018003530C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800019E2
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800021C6
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018003334C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180037394
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180001DE3
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180033498
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800394B0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800354B4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800374DC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018003B510
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180002103
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180003477
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018004D588
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180071584
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018003D5C4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800029E1
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180033654
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180037684
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180002829
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180002900
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180039710
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800016AE
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018003379C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800637A4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180001D2F
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180002C93
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800029AA
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180002BE4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800338E4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180037914
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000321A
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180004200
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800043DB
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180001280
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180001AC3
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800012DF
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000322E
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180001302
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180045B0C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000269E
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180001721
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180033BDC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800019D8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180002E00
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800019A6
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180033D24
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018003DD48
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180035D6C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180001721
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180033E6C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180003D8C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180002095
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180035EFC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800013F7
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180002586
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180002AA9
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800025BD
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180033FB8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00670000
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_020AEB08
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_020A8B3C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_020AA804
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_020AC8C0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0209CCC8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_020BB6BC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_020A7414
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_02095B18
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_020A1B88
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_020B7E28
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_020ABD64
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0209E254
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_020BA304
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_020B632C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_020B4330
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_020A4368
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_020B4020
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_020A406C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_02094078
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_020BA088
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_020A6110
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_020AA130
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_020941A8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_020B2638
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_020A0680
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_02096698
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_020A46B4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_02092708
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_020AC720
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_020AE7A4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_020A27A4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_020B07D0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_020AA408
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_020A6418
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0209C458
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_020AE4A8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_020B84DC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_020A24E4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_020B6520
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_020A0578
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_020A4594
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_020A6594
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_020AC5AC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_020925D8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_020B0AC4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_02092AE4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_020B2AFC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_020B8B28
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_020B6B40
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0209CB6C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_020A0B60
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_020AABD8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_02092820
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_02094848
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_020A484C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_020B4918
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_020B093C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_02094948
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_020A6978
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_020B8990
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_020A29BC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_020AC9F0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_020B2E04
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_020AEE5C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_020B8EE8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_020B4EF4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_020B2F3C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_020B6F3C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_02098F5C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_020A2F94
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_020AEFAC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0209EFCC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0209AFE4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_020B2C48
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_020A0C68
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_020B0C68
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_02094C64
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_020AACEC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_02098CE0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0209ED84
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_020B0DBC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_02092DC0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_020A3210
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_020AF238
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_020AD254
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0209F290
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0209B2BC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_020972E0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_020B12FC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0209D300
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_020B3304
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_02091368
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_020993AC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_020A93E0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0209B3E4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_020B13FC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_02091014
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_020AB028
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_020930BC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_020990D4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_020BB0EC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0209B0F8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_020A7144
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_02095198
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0209B1A8
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000001F26FD30000
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000001C741C20000
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00E30000
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00E77CAC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00E9B6BC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00E93894
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00E97E28
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00E8A804
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00E87FEC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00E8C9F0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00E741A8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00E84368
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00E8BD64
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00E71368
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00E88B3C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00E92F3C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00E9A304
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00E75B18
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00E98EE8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00E72AE4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00E8ACEC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00E9B0EC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00E736E0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00E772E0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00E78CE0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00E91AE0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00E824E4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00E73CE8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00E912FC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00E92AFC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00E94EF4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00E7B0F8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00E8C8C0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00E89EC0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00E878C4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00E90AC4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00E7CCC8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00E790D4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00E984DC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00E7FAD0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00E8D4D0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00E8E4A8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00E916A8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00E814A0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00E976A4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00E730BC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00E7B2BC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00E846B4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00E9A088
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00E75484
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00E80680
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00E9369C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00E7F290
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00E9BE90
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00E73A9C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00E76698
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00E7B698
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00E80C68
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00E90C68
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00E74C64
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00E8406C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00E8FC70
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00E74078
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00E92C48
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00E8484C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00E9344C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00E99A40
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00E74848
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00E7E254
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00E8EE5C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00E7F850
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00E85C50
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00E8D254
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00E7FE58
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00E7C458
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00E8B028
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00E8762C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00E72820
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00E8D620
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00E94020
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00E8F238
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00E92638
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00E87C30
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00E95E30
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00E8A408
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00E92E04
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00E7BC08
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00E86418
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00E83E18
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00E71014
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00E8F61C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00E83210
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00E83610
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00E87414
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00E7AFE4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00E7B3E4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00E893E0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00E913FC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00E731F0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00E899F4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00E72DC0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00E7DFCC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00E7EFCC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00E8D9C4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00E8ABD8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00E907D0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00E93DD4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00E725D8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00E99DA8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00E8C5AC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00E8EFAC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00E793AC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00E8E7A4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00E827A4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00E7B1A8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00E77BB4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00E829BC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00E90DBC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00E87DB0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00E83BB4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00E81B88
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00E7ED84
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00E7F580
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00E98990
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00E82F94
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00E84594
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00E86594
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00E75198
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00E9796C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00E80B60
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00E7CB6C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00E8F764
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00E86978
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00E80578
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00E7DB74
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00E9B570
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00E73F40
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00E96B40
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00E87144
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00E74948
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00E8B558
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00E89D5C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00E9155C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00E78F5C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00E98B28
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00E7BD24
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00E91D2C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00E9632C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00E8C720
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00E89720
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00E9BD20
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00E96520
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00E7D92C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00E83724
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00E87B24
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00E9093C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00E96F3C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00E8A130
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00E94330
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00E8EB08
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00E7D300
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00E93304
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00E72708
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00E94918
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00E83D1C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00E86110
                      Source: C:\Windows\System32\regsvr32.exeCode function: String function: 000000018006BC48 appears 58 times
                      Source: C:\Windows\System32\regsvr32.exeCode function: String function: 00000001800019CE appears 79 times
                      Source: C:\Windows\System32\regsvr32.exeSection loaded: sfc.dll
                      Source: C:\Windows\System32\regsvr32.exeSection loaded: sfc.dll
                      Source: C:\Windows\System32\svchost.exeSection loaded: xboxlivetitleid.dll
                      Source: C:\Windows\System32\svchost.exeSection loaded: cdpsgshims.dll
                      Source: 548IrCt4hj.dllVirustotal: Detection: 70%
                      Source: 548IrCt4hj.dllMetadefender: Detection: 45%
                      Source: 548IrCt4hj.dllReversingLabs: Detection: 88%
                      Source: 548IrCt4hj.dllStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      Source: C:\Windows\System32\loaddll64.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                      Source: unknownProcess created: C:\Windows\System32\loaddll64.exe loaddll64.exe "C:\Users\user\Desktop\548IrCt4hj.dll"
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\548IrCt4hj.dll",#1
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\548IrCt4hj.dll
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\548IrCt4hj.dll",#1
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\548IrCt4hj.dll,DllCanUnloadNow
                      Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\System32\regsvr32.exe C:\Windows\system32\regsvr32.exe "C:\Windows\system32\MbnmzGnNg\joXcB.dll"
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\548IrCt4hj.dll,DllGetClassObject
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\548IrCt4hj.dll,DllRegisterServer
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe c:\windows\system32\svchost.exe -k localservice -p -s CDPSvc
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe c:\windows\system32\svchost.exe -k networkservice -p -s DoSvc
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k NetworkService -p
                      Source: unknownProcess created: C:\Windows\System32\SgrmBroker.exe C:\Windows\system32\SgrmBroker.exe
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe c:\windows\system32\svchost.exe -k localservicenetworkrestricted -p -s wscsvc
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe c:\windows\system32\svchost.exe -k unistacksvcgroup
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p
                      Source: C:\Windows\System32\svchost.exeProcess created: C:\Program Files\Windows Defender\MpCmdRun.exe "C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable
                      Source: C:\Program Files\Windows Defender\MpCmdRun.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\548IrCt4hj.dll",#1
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\548IrCt4hj.dll
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\548IrCt4hj.dll,DllCanUnloadNow
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\548IrCt4hj.dll,DllGetClassObject
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\548IrCt4hj.dll,DllRegisterServer
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\548IrCt4hj.dll",#1
                      Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\System32\regsvr32.exe C:\Windows\system32\regsvr32.exe "C:\Windows\system32\MbnmzGnNg\joXcB.dll"
                      Source: C:\Windows\System32\svchost.exeProcess created: C:\Program Files\Windows Defender\MpCmdRun.exe "C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable
                      Source: C:\Windows\System32\regsvr32.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{D105A4D4-344C-48EB-9866-EE378D90658B}\InProcServer32
                      Source: C:\Windows\System32\svchost.exeFile created: C:\Users\user\AppData\Local\packages\ActiveSync\LocalState\DiagOutputDir\UnistackCritical.etlJump to behavior
                      Source: classification engineClassification label: mal100.troj.evad.winDLL@31/8@0/43
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800013F7 GetModuleFileNameW,CharNextW,LoadTypeLib,LoadTypeLib,SysAllocString,CoCreateInstance,StringFromGUID2,RegOpenKeyExW,RegQueryInfoKeyW,RegCloseKey,RegDeleteKeyW,RegOpenKeyExW,RegCloseKey,RegQueryInfoKeyW,RegCloseKey,RegDeleteKeyW,RegCloseKey,RegCloseKey,GetModuleHandleW,GetProcAddress,UnRegisterTypeLib,UnRegisterTypeLib,SysFreeString,
                      Source: C:\Windows\System32\regsvr32.exeFile read: C:\Users\desktop.iniJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_020AA804 Process32FirstW,CreateToolhelp32Snapshot,FindCloseChangeNotification,
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\548IrCt4hj.dll",#1
                      Source: C:\Windows\System32\conhost.exeMutant created: \BaseNamedObjects\Local\SM0:5948:120:WilError_01
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180001721 LoadLibraryExW,LoadLibraryExW,FindResourceW,LoadResource,SizeofResource,MultiByteToWideChar,FreeLibrary,lstrcmpiW,lstrcmpiW,CharNextW,lstrcmpiW,lstrcmpiW,lstrcmpiW,RegOpenKeyExW,RegDeleteValueW,RegCloseKey,CharNextW,RegOpenKeyExW,RegCloseKey,RegOpenKeyExW,RegCloseKey,RegCreateKeyExW,RegCloseKey,RegCloseKey,RegOpenKeyExW,RegCloseKey,RegQueryInfoKeyW,lstrcmpiW,RegQueryInfoKeyW,RegCloseKey,RegDeleteKeyW,RegCloseKey,RegSetValueExW,
                      Source: C:\Windows\System32\regsvr32.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Windows\System32\rundll32.exeAutomated click: OK
                      Source: C:\Windows\System32\rundll32.exeAutomated click: OK
                      Source: 548IrCt4hj.dllStatic PE information: Image base 0x180000000 > 0x60000000
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_02098C72 push ebp; ret
                      Source: 548IrCt4hj.dllStatic PE information: section name: .00cfg
                      Source: 548IrCt4hj.dllStatic PE information: section name: _RDATA
                      Source: 548IrCt4hj.dllStatic PE information: real checksum: 0xf69e3 should be: 0xf8045
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\548IrCt4hj.dll
                      Source: C:\Windows\System32\regsvr32.exePE file moved: C:\Windows\System32\MbnmzGnNg\joXcB.dllJump to behavior

                      Hooking and other Techniques for Hiding and Protection

                      barindex
                      Source: C:\Windows\System32\regsvr32.exeFile opened: C:\Windows\system32\MbnmzGnNg\joXcB.dll:Zone.Identifier read attributes | delete
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\svchost.exe TID: 6308Thread sleep time: -30000s >= -30000s
                      Source: C:\Windows\System32\svchost.exe TID: 6304Thread sleep time: -30000s >= -30000s
                      Source: C:\Windows\System32\svchost.exe TID: 6784Thread sleep time: -30000s >= -30000s
                      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                      Source: C:\Windows\System32\svchost.exeFile opened: PhysicalDrive0
                      Source: C:\Windows\System32\regsvr32.exeAPI coverage: 3.4 %
                      Source: C:\Windows\System32\regsvr32.exeProcess information queried: ProcessInformation
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018006680C FindFirstFileExW,FindNextFileW,FindClose,FindClose,
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800671B0 FindFirstFileExW,
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800677BC FindFirstFileExW,FindNextFileW,FindClose,FindClose,
                      Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00E8C9F0 FindFirstFileW,FindNextFileW,
                      Source: C:\Windows\System32\regsvr32.exeFile Volume queried: C:\ FullSizeInformation
                      Source: svchost.exe, 00000019.00000002.428439293.000001A110CF4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: "@Hyper-V RAW
                      Source: svchost.exe, 00000015.00000002.603630722.0000019CF2E4B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: @Hyper-V RAW
                      Source: regsvr32.exe, 00000005.00000002.639099518.0000000000F0E000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000005.00000003.543111893.0000000000EE2000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000005.00000003.543343608.0000000000F0D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000015.00000002.603173316.0000019CED629000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000015.00000002.603630722.0000019CF2E4B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000019.00000002.428413004.000001A110CEC000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000019.00000002.428169475.000001A110C88000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                      Source: svchost.exe, 0000000B.00000002.638070495.000001E16CA02000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: HvHostWdiSystemHostScDeviceEnumWiaRpctrkwksAudioEndpointBuilderhidservdot3svcDsSvcfhsvcWPDBusEnumsvsvcwlansvcEmbeddedModeirmonSensorServicevmicvssNgcSvcsysmainDevQueryBrokerStorSvcvmickvpexchangevmicshutdownvmicguestinterfacevmicvmsessionNcbServiceNetmanDeviceAssociationServiceTabletInputServicePcaSvcIPxlatCfgSvcCscServiceUmRdpService
                      Source: regsvr32.exe, 00000005.00000003.543111893.0000000000EE2000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000005.00000003.543364688.0000000000EF7000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000005.00000002.638935248.0000000000EF8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                      Source: regsvr32.exe, 00000005.00000002.639099518.0000000000F0E000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000005.00000003.543111893.0000000000EE2000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000005.00000003.543343608.0000000000F0D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW:VH
                      Source: svchost.exe, 0000000B.00000002.638410575.000001E16CA42000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000C.00000002.638762672.0000024093E79000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000E.00000002.638340118.00000176A9E29000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800016F9 IsDebuggerPresent,
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800041E7 GetLastError,IsDebuggerPresent,OutputDebugStringW,
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180002CD9 GetProcessHeap,
                      Source: C:\Windows\System32\loaddll64.exeProcess queried: DebugPort
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018002BAEC RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180003841 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,

                      HIPS / PFW / Operating System Protection Evasion

                      barindex
                      Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 174.138.33.49 7080
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\548IrCt4hj.dll",#1
                      Source: C:\Windows\System32\regsvr32.exeQueries volume information: C:\ VolumeInformation
                      Source: C:\Windows\System32\regsvr32.exeQueries volume information: C:\ VolumeInformation
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformation
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformation
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm VolumeInformation
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformation
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformation
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformation
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformation
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformation
                      Source: C:\Windows\System32\regsvr32.exeCode function: EnumSystemLocalesW,
                      Source: C:\Windows\System32\regsvr32.exeCode function: EnumSystemLocalesW,
                      Source: C:\Windows\System32\regsvr32.exeCode function: EnumSystemLocalesW,
                      Source: C:\Windows\System32\regsvr32.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,
                      Source: C:\Windows\System32\regsvr32.exeCode function: GetLocaleInfoW,
                      Source: C:\Windows\System32\regsvr32.exeCode function: GetLocaleInfoW,
                      Source: C:\Windows\System32\regsvr32.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,
                      Source: C:\Windows\System32\regsvr32.exeCode function: GetLocaleInfoW,
                      Source: C:\Windows\System32\regsvr32.exeCode function: EnumSystemLocalesW,GetUserDefaultLCID,ProcessCodePage,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,
                      Source: C:\Windows\System32\regsvr32.exeCode function: EnumSystemLocalesW,
                      Source: C:\Windows\System32\regsvr32.exeCode function: EnumSystemLocalesW,
                      Source: C:\Windows\System32\regsvr32.exeCode function: EnumSystemLocalesW,
                      Source: C:\Windows\System32\regsvr32.exeCode function: TranslateName,TranslateName,GetACP,IsValidCodePage,GetLocaleInfoW,
                      Source: C:\Windows\System32\regsvr32.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800031CA __security_init_cookie,GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,

                      Lowering of HIPS / PFW / Operating System Security Settings

                      barindex
                      Source: C:\Windows\System32\svchost.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center cvalJump to behavior
                      Source: C:\Windows\System32\svchost.exeWMI Queries: IWbemServices::ExecNotificationQuery - ROOT\SecurityCenter : SELECT * FROM __InstanceOperationEvent WHERE TargetInstance ISA 'AntiVirusProduct' OR TargetInstance ISA 'FirewallProduct' OR TargetInstance ISA 'AntiSpywareProduct'
                      Source: C:\Windows\System32\svchost.exeWMI Queries: IWbemServices::CreateInstanceEnum - ROOT\SecurityCenter2 : FirewallProduct
                      Source: C:\Windows\System32\svchost.exeWMI Queries: IWbemServices::CreateInstanceEnum - ROOT\SecurityCenter2 : AntiVirusProduct
                      Source: C:\Windows\System32\svchost.exeWMI Queries: IWbemServices::CreateInstanceEnum - ROOT\SecurityCenter2 : AntiSpywareProduct
                      Source: svchost.exe, 00000011.00000002.638678517.000001689CF02000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Files%\Windows Defender\MsMpeng.exe
                      Source: svchost.exe, 00000011.00000002.638678517.000001689CF02000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe

                      Stealing of Sensitive Information

                      barindex
                      Source: Yara matchFile source: 00000005.00000002.638413256.0000000000EA8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 2.2.regsvr32.exe.2060000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.rundll32.exe.1f26fd40000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.regsvr32.exe.e40000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.regsvr32.exe.2060000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.regsvr32.exe.e40000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.1c7434e0000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.1c7434e0000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.rundll32.exe.1f26fd40000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000005.00000002.637949653.0000000000E40000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.249040025.000001C7434E0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.248792041.000001F26FD71000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.638139112.0000000000E71000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.248763264.000001F26FD40000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.252638967.0000000002091000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.252607659.0000000002060000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.249084413.000001C743541000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                      Valid Accounts1
                      Windows Management Instrumentation
                      1
                      DLL Side-Loading
                      111
                      Process Injection
                      21
                      Masquerading
                      OS Credential Dumping1
                      System Time Discovery
                      Remote Services1
                      Archive Collected Data
                      Exfiltration Over Other Network Medium1
                      Encrypted Channel
                      Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                      Default AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
                      DLL Side-Loading
                      1
                      Disable or Modify Tools
                      LSASS Memory71
                      Security Software Discovery
                      Remote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth1
                      Non-Standard Port
                      Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                      Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)3
                      Virtualization/Sandbox Evasion
                      Security Account Manager3
                      Virtualization/Sandbox Evasion
                      SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration1
                      Application Layer Protocol
                      Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                      Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)111
                      Process Injection
                      NTDS2
                      Process Discovery
                      Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
                      Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
                      Deobfuscate/Decode Files or Information
                      LSA Secrets1
                      Remote System Discovery
                      SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                      Replication Through Removable MediaLaunchdRc.commonRc.common1
                      Hidden Files and Directories
                      Cached Domain Credentials2
                      File and Directory Discovery
                      VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                      External Remote ServicesScheduled TaskStartup ItemsStartup Items2
                      Obfuscated Files or Information
                      DCSync34
                      System Information Discovery
                      Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                      Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job1
                      Regsvr32
                      Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
                      Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)1
                      Rundll32
                      /etc/passwd and /etc/shadowSystem Network Connections DiscoverySoftware Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
                      Supply Chain CompromiseAppleScriptAt (Windows)At (Windows)1
                      DLL Side-Loading
                      Network SniffingProcess DiscoveryTaint Shared ContentLocal Data StagingExfiltration Over Unencrypted/Obfuscated Non-C2 ProtocolFile Transfer ProtocolsData Encrypted for Impact
                      Compromise Software Dependencies and Development ToolsWindows Command ShellCronCron1
                      File Deletion
                      Input CapturePermission Groups DiscoveryReplication Through Removable MediaRemote Data StagingExfiltration Over Physical MediumMail ProtocolsService Stop
                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet
                      behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 672062 Sample: 548IrCt4hj.dll Startdate: 23/07/2022 Architecture: WINDOWS Score: 100 37 210.57.209.142 UNAIR-AS-IDUniversitasAirlanggaID Indonesia 2->37 39 190.145.8.4 TelmexColombiaSACO Colombia 2->39 41 38 other IPs or domains 2->41 51 Snort IDS alert for network traffic 2->51 53 Antivirus detection for URL or domain 2->53 55 Multi AV Scanner detection for submitted file 2->55 57 3 other signatures 2->57 8 loaddll64.exe 1 2->8         started        10 svchost.exe 2->10         started        13 svchost.exe 1 1 2->13         started        16 11 other processes 2->16 signatures3 process4 dnsIp5 18 regsvr32.exe 5 8->18         started        21 cmd.exe 1 8->21         started        23 rundll32.exe 8->23         started        27 2 other processes 8->27 59 Changes security center settings (notifications, updates, antivirus, firewall) 10->59 25 MpCmdRun.exe 1 10->25         started        43 127.0.0.1 unknown unknown 13->43 45 192.168.2.1 unknown unknown 16->45 signatures6 process7 signatures8 49 Hides that the sample has been downloaded from the Internet (zone.identifier) 18->49 29 regsvr32.exe 18->29         started        33 rundll32.exe 21->33         started        35 conhost.exe 25->35         started        process9 dnsIp10 47 174.138.33.49, 49758, 7080 DIGITALOCEAN-ASNUS United States 29->47 61 System process connects to network (likely due to code injection or exploit) 29->61 signatures11

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                      windows-stand
                      SourceDetectionScannerLabelLink
                      548IrCt4hj.dll70%VirustotalBrowse
                      548IrCt4hj.dll46%MetadefenderBrowse
                      548IrCt4hj.dll88%ReversingLabsWin64.Trojan.Emotet
                      No Antivirus matches
                      SourceDetectionScannerLabelLinkDownload
                      4.2.rundll32.exe.1c7434e0000.0.unpack100%AviraHEUR/AGEN.1215461Download File
                      3.2.rundll32.exe.1f26fd40000.0.unpack100%AviraHEUR/AGEN.1215461Download File
                      5.2.regsvr32.exe.e40000.0.unpack100%AviraHEUR/AGEN.1215461Download File
                      2.2.regsvr32.exe.2060000.0.unpack100%AviraHEUR/AGEN.1215461Download File
                      No Antivirus matches
                      SourceDetectionScannerLabelLink
                      https://174.138.33.49:7080/0%URL Reputationsafe
                      https://www.pango.co/privacy0%URL Reputationsafe
                      https://www.disneyplus.com/legal/your-california-privacy-rights0%URL Reputationsafe
                      https://174.138.33.49/U100%Avira URL Cloudmalware
                      http://crl.ver)0%Avira URL Cloudsafe
                      https://www.tiktok.com/legal/report/feedback0%URL Reputationsafe
                      https://174.138.33.49:7080/hIn100%Avira URL Cloudmalware
                      https://%s.xboxlive.com0%URL Reputationsafe
                      https://174.138.33.49/Q100%Avira URL Cloudmalware
                      https://www.disneyplus.com/legal/privacy-policy0%URL Reputationsafe
                      https://dynamic.t0%URL Reputationsafe
                      https://disneyplus.com/legal.0%URL Reputationsafe
                      http://help.disneyplus.com.0%URL Reputationsafe
                      https://%s.dnet.xboxlive.com0%URL Reputationsafe
                      No contacted domains info
                      NameSourceMaliciousAntivirus DetectionReputation
                      https://dev.ditu.live.com/REST/v1/Routes/svchost.exe, 0000000F.00000002.316427386.00000226FA03D000.00000004.00000020.00020000.00000000.sdmpfalse
                        high
                        https://dev.virtualearth.net/REST/v1/Routes/Drivingsvchost.exe, 0000000F.00000003.315897201.00000226FA04F000.00000004.00000020.00020000.00000000.sdmpfalse
                          high
                          https://t0.ssl.ak.dynamic.tiles.virtualearth.net/comp/gen.ashxsvchost.exe, 0000000F.00000002.316440979.00000226FA040000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.316013437.00000226FA03F000.00000004.00000020.00020000.00000000.sdmpfalse
                            high
                            https://t0.tiles.ditu.live.com/tiles/gensvchost.exe, 0000000F.00000002.316383374.00000226FA029000.00000004.00000020.00020000.00000000.sdmpfalse
                              high
                              https://dev.virtualearth.net/REST/v1/Routes/Walkingsvchost.exe, 0000000F.00000003.315897201.00000226FA04F000.00000004.00000020.00020000.00000000.sdmpfalse
                                high
                                https://dev.virtualearth.net/mapcontrol/HumanScaleServices/GetBubbles.ashx?n=svchost.exe, 0000000F.00000002.316448338.00000226FA042000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.316013437.00000226FA03F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.316054783.00000226FA041000.00000004.00000020.00020000.00000000.sdmpfalse
                                  high
                                  https://dev.ditu.live.com/mapcontrol/logging.ashxsvchost.exe, 0000000F.00000003.315897201.00000226FA04F000.00000004.00000020.00020000.00000000.sdmpfalse
                                    high
                                    https://dev.ditu.live.com/REST/v1/Imagery/Copyright/svchost.exe, 0000000F.00000003.315949220.00000226FA04B000.00000004.00000020.00020000.00000000.sdmpfalse
                                      high
                                      https://dev.virtualearth.net/webservices/v1/LoggingService/LoggingService.svc/Log?entry=svchost.exe, 0000000F.00000003.291933590.00000226FA02F000.00000004.00000020.00020000.00000000.sdmpfalse
                                        high
                                        https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gri?pv=1&r=svchost.exe, 0000000F.00000003.291933590.00000226FA02F000.00000004.00000020.00020000.00000000.sdmpfalse
                                          high
                                          https://dev.virtualearth.net/REST/v1/Transit/Schedules/svchost.exe, 0000000F.00000002.316448338.00000226FA042000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.316013437.00000226FA03F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.316054783.00000226FA041000.00000004.00000020.00020000.00000000.sdmpfalse
                                            high
                                            https://174.138.33.49:7080/regsvr32.exe, 00000005.00000003.543111893.0000000000EE2000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000005.00000002.638413256.0000000000EA8000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000005.00000002.638784137.0000000000EE2000.00000004.00000020.00020000.00000000.sdmpfalse
                                            • URL Reputation: safe
                                            unknown
                                            https://www.hotspotshield.com/terms/svchost.exe, 00000019.00000003.404927903.000001A111A02000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000019.00000003.404982809.000001A111593000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000019.00000003.405001225.000001A1115A4000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000019.00000003.405032312.000001A111A02000.00000004.00000020.00020000.00000000.sdmpfalse
                                              high
                                              https://www.pango.co/privacysvchost.exe, 00000019.00000003.404927903.000001A111A02000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000019.00000003.404982809.000001A111593000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000019.00000003.405001225.000001A1115A4000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000019.00000003.405032312.000001A111A02000.00000004.00000020.00020000.00000000.sdmpfalse
                                              • URL Reputation: safe
                                              unknown
                                              https://ecn.dev.virtualearth.net/mapcontrol/roadshield.ashx?bucket=svchost.exe, 0000000F.00000003.291933590.00000226FA02F000.00000004.00000020.00020000.00000000.sdmpfalse
                                                high
                                                http://www.bingmapsportal.comsvchost.exe, 0000000F.00000002.316348056.00000226FA013000.00000004.00000020.00020000.00000000.sdmpfalse
                                                  high
                                                  https://dev.virtualearth.net/REST/v1/Imagery/Copyright/svchost.exe, 0000000F.00000003.291933590.00000226FA02F000.00000004.00000020.00020000.00000000.sdmpfalse
                                                    high
                                                    https://ecn.dev.virtualearth.net/REST/v1/Imagery/Copyright/svchost.exe, 0000000F.00000002.316427386.00000226FA03D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.291933590.00000226FA02F000.00000004.00000020.00020000.00000000.sdmpfalse
                                                      high
                                                      https://dynamic.t0.tiles.ditu.live.com/comp/gen.ashxsvchost.exe, 0000000F.00000003.315897201.00000226FA04F000.00000004.00000020.00020000.00000000.sdmpfalse
                                                        high
                                                        https://www.disneyplus.com/legal/your-california-privacy-rightssvchost.exe, 00000019.00000003.408103656.000001A111599000.00000004.00000020.00020000.00000000.sdmpfalse
                                                        • URL Reputation: safe
                                                        unknown
                                                        https://174.138.33.49/Uregsvr32.exe, 00000005.00000003.543111893.0000000000EE2000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000005.00000002.638784137.0000000000EE2000.00000004.00000020.00020000.00000000.sdmptrue
                                                        • Avira URL Cloud: malware
                                                        unknown
                                                        https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdv?pv=1&r=svchost.exe, 0000000F.00000003.316049267.00000226FA045000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.316013437.00000226FA03F000.00000004.00000020.00020000.00000000.sdmpfalse
                                                          high
                                                          https://dev.virtualearth.net/REST/v1/Routes/svchost.exe, 0000000F.00000002.316427386.00000226FA03D000.00000004.00000020.00020000.00000000.sdmpfalse
                                                            high
                                                            https://dev.virtualearth.net/REST/v1/Traffic/Incidents/svchost.exe, 0000000F.00000003.291933590.00000226FA02F000.00000004.00000020.00020000.00000000.sdmpfalse
                                                              high
                                                              https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdi?pv=1&r=svchost.exe, 0000000F.00000003.316049267.00000226FA045000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.316013437.00000226FA03F000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                high
                                                                https://dev.virtualearth.net/REST/v1/Transit/Stops/svchost.exe, 0000000F.00000003.291933590.00000226FA02F000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                  high
                                                                  http://crl.ver)svchost.exe, 00000015.00000002.603534517.0000019CF2E11000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000019.00000002.428413004.000001A110CEC000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                  • Avira URL Cloud: safe
                                                                  low
                                                                  https://dev.virtualearth.net/webservices/v1/LoggingService/LoggingService.svc/Log?svchost.exe, 0000000F.00000002.316465691.00000226FA047000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.316013437.00000226FA03F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.316032557.00000226FA046000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                    high
                                                                    https://www.tiktok.com/legal/report/feedbacksvchost.exe, 00000019.00000003.410454678.000001A11159B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000019.00000003.410402002.000001A1115B1000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000019.00000003.410518422.000001A111A02000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000019.00000003.410348749.000001A1115B1000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                    • URL Reputation: safe
                                                                    unknown
                                                                    https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gd?pv=1&r=svchost.exe, 0000000F.00000002.316427386.00000226FA03D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000002.316348056.00000226FA013000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                      high
                                                                      https://174.138.33.49:7080/hInregsvr32.exe, 00000005.00000002.638413256.0000000000EA8000.00000004.00000020.00020000.00000000.sdmptrue
                                                                      • Avira URL Cloud: malware
                                                                      unknown
                                                                      https://%s.xboxlive.comsvchost.exe, 0000000C.00000002.638484661.0000024093E3E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                      • URL Reputation: safe
                                                                      low
                                                                      https://dev.virtualearth.net/REST/v1/Locationssvchost.exe, 0000000F.00000003.315897201.00000226FA04F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.291933590.00000226FA02F000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                        high
                                                                        https://174.138.33.49/Qregsvr32.exe, 00000005.00000003.543111893.0000000000EE2000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000005.00000002.638784137.0000000000EE2000.00000004.00000020.00020000.00000000.sdmptrue
                                                                        • Avira URL Cloud: malware
                                                                        unknown
                                                                        https://ecn.dev.virtualearth.net/mapcontrol/mapconfiguration.ashx?name=native&v=svchost.exe, 0000000F.00000003.291933590.00000226FA02F000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                          high
                                                                          https://dev.virtualearth.net/mapcontrol/logging.ashxsvchost.exe, 0000000F.00000003.315897201.00000226FA04F000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                            high
                                                                            https://support.hotspotshield.com/svchost.exe, 00000019.00000003.404927903.000001A111A02000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000019.00000003.404982809.000001A111593000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000019.00000003.405001225.000001A1115A4000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000019.00000003.405032312.000001A111A02000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                              high
                                                                              https://dynamic.api.tiles.ditu.live.com/odvs/gdi?pv=1&r=svchost.exe, 0000000F.00000002.316465691.00000226FA047000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.316013437.00000226FA03F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.316032557.00000226FA046000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                high
                                                                                https://www.disneyplus.com/legal/privacy-policysvchost.exe, 00000019.00000003.408103656.000001A111599000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                • URL Reputation: safe
                                                                                unknown
                                                                                https://dev.virtualearth.net/REST/v1/JsonFilter/VenueMaps/data/svchost.exe, 0000000F.00000003.291933590.00000226FA02F000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                  high
                                                                                  https://dynamic.tsvchost.exe, 0000000F.00000003.316013437.00000226FA03F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.316054783.00000226FA041000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.315949220.00000226FA04B000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                  • URL Reputation: safe
                                                                                  unknown
                                                                                  https://dev.virtualearth.net/REST/v1/Routes/Transitsvchost.exe, 0000000F.00000003.315897201.00000226FA04F000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                    high
                                                                                    https://disneyplus.com/legal.svchost.exe, 00000019.00000003.408103656.000001A111599000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                    • URL Reputation: safe
                                                                                    unknown
                                                                                    https://t0.ssl.ak.tiles.virtualearth.net/tiles/gensvchost.exe, 0000000F.00000002.316383374.00000226FA029000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.291933590.00000226FA02F000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                      high
                                                                                      https://dynamic.api.tiles.ditu.live.com/odvs/gdv?pv=1&r=svchost.exe, 0000000F.00000002.316465691.00000226FA047000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.316013437.00000226FA03F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000F.00000003.316032557.00000226FA046000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                        high
                                                                                        https://activity.windows.comsvchost.exe, 0000000C.00000002.638484661.0000024093E3E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                          high
                                                                                          https://dev.ditu.live.com/REST/v1/Locationssvchost.exe, 0000000F.00000003.315897201.00000226FA04F000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                            high
                                                                                            http://help.disneyplus.com.svchost.exe, 00000019.00000003.408103656.000001A111599000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                            • URL Reputation: safe
                                                                                            unknown
                                                                                            https://%s.dnet.xboxlive.comsvchost.exe, 0000000C.00000002.638484661.0000024093E3E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                            • URL Reputation: safe
                                                                                            low
                                                                                            https://dynamic.api.tiles.ditu.live.com/odvs/gd?pv=1&r=svchost.exe, 0000000F.00000003.315949220.00000226FA04B000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                              high
                                                                                              • No. of IPs < 25%
                                                                                              • 25% < No. of IPs < 50%
                                                                                              • 50% < No. of IPs < 75%
                                                                                              • 75% < No. of IPs
                                                                                              IPDomainCountryFlagASNASN NameMalicious
                                                                                              157.245.111.0
                                                                                              unknownUnited States
                                                                                              14061DIGITALOCEAN-ASNUStrue
                                                                                              157.230.99.206
                                                                                              unknownUnited States
                                                                                              14061DIGITALOCEAN-ASNUStrue
                                                                                              54.37.106.167
                                                                                              unknownFrance
                                                                                              16276OVHFRtrue
                                                                                              188.165.79.151
                                                                                              unknownFrance
                                                                                              16276OVHFRtrue
                                                                                              196.44.98.190
                                                                                              unknownGhana
                                                                                              327814EcobandGHtrue
                                                                                              174.138.33.49
                                                                                              unknownUnited States
                                                                                              14061DIGITALOCEAN-ASNUStrue
                                                                                              43.129.209.178
                                                                                              unknownJapan4249LILLY-ASUStrue
                                                                                              103.41.204.169
                                                                                              unknownIndonesia
                                                                                              58397INFINYS-AS-IDPTInfinysSystemIndonesiaIDtrue
                                                                                              5.253.30.17
                                                                                              unknownLatvia
                                                                                              18978ENZUINC-UStrue
                                                                                              85.214.67.203
                                                                                              unknownGermany
                                                                                              6724STRATOSTRATOAGDEtrue
                                                                                              103.56.149.105
                                                                                              unknownIndonesia
                                                                                              55688BEON-AS-IDPTBeonIntermediaIDtrue
                                                                                              83.229.80.93
                                                                                              unknownUnited Kingdom
                                                                                              8513SKYVISIONGBtrue
                                                                                              85.25.120.45
                                                                                              unknownGermany
                                                                                              8972GD-EMEA-DC-SXB1DEtrue
                                                                                              198.199.70.22
                                                                                              unknownUnited States
                                                                                              14061DIGITALOCEAN-ASNUStrue
                                                                                              93.104.209.107
                                                                                              unknownGermany
                                                                                              8767MNET-ASGermanyDEtrue
                                                                                              188.225.32.231
                                                                                              unknownRussian Federation
                                                                                              9123TIMEWEB-ASRUtrue
                                                                                              175.126.176.79
                                                                                              unknownKorea Republic of
                                                                                              9523MOKWON-AS-KRMokwonUniversityKRtrue
                                                                                              139.196.72.155
                                                                                              unknownChina
                                                                                              37963CNNIC-ALIBABA-CN-NET-APHangzhouAlibabaAdvertisingCoLtdtrue
                                                                                              128.199.242.164
                                                                                              unknownUnited Kingdom
                                                                                              14061DIGITALOCEAN-ASNUStrue
                                                                                              103.126.216.86
                                                                                              unknownBangladesh
                                                                                              138482SKYVIEW-AS-APSKYVIEWONLINELTDBDtrue
                                                                                              104.248.225.227
                                                                                              unknownUnited States
                                                                                              14061DIGITALOCEAN-ASNUStrue
                                                                                              178.238.225.252
                                                                                              unknownGermany
                                                                                              51167CONTABODEtrue
                                                                                              46.101.98.60
                                                                                              unknownNetherlands
                                                                                              14061DIGITALOCEAN-ASNUStrue
                                                                                              190.145.8.4
                                                                                              unknownColombia
                                                                                              14080TelmexColombiaSACOtrue
                                                                                              210.57.209.142
                                                                                              unknownIndonesia
                                                                                              38142UNAIR-AS-IDUniversitasAirlanggaIDtrue
                                                                                              190.107.19.179
                                                                                              unknownColombia
                                                                                              27951MediaCommercePartnersSACOtrue
                                                                                              202.28.34.99
                                                                                              unknownThailand
                                                                                              9562MSU-TH-APMahasarakhamUniversityTHtrue
                                                                                              87.106.97.83
                                                                                              unknownGermany
                                                                                              8560ONEANDONE-ASBrauerstrasse48DEtrue
                                                                                              103.254.12.236
                                                                                              unknownViet Nam
                                                                                              56151DIGISTAR-VNDigiStarCompanyLimitedVNtrue
                                                                                              103.85.95.4
                                                                                              unknownIndonesia
                                                                                              136077IDNIC-UNSRAT-AS-IDUniversitasIslamNegeriMataramIDtrue
                                                                                              54.37.228.122
                                                                                              unknownFrance
                                                                                              16276OVHFRtrue
                                                                                              88.217.172.165
                                                                                              unknownGermany
                                                                                              8767MNET-ASGermanyDEtrue
                                                                                              165.22.254.236
                                                                                              unknownUnited States
                                                                                              14061DIGITALOCEAN-ASNUStrue
                                                                                              195.77.239.39
                                                                                              unknownSpain
                                                                                              60493FICOSA-ASEStrue
                                                                                              78.47.204.80
                                                                                              unknownGermany
                                                                                              24940HETZNER-ASDEtrue
                                                                                              118.98.72.86
                                                                                              unknownIndonesia
                                                                                              7713TELKOMNET-AS-APPTTelekomunikasiIndonesiaIDtrue
                                                                                              139.59.80.108
                                                                                              unknownSingapore
                                                                                              14061DIGITALOCEAN-ASNUStrue
                                                                                              104.244.79.94
                                                                                              unknownUnited States
                                                                                              53667PONYNETUStrue
                                                                                              178.62.112.199
                                                                                              unknownEuropean Union
                                                                                              14061DIGITALOCEAN-ASNUStrue
                                                                                              37.44.244.177
                                                                                              unknownGermany
                                                                                              47583AS-HOSTINGERLTtrue
                                                                                              64.227.55.231
                                                                                              unknownUnited States
                                                                                              14061DIGITALOCEAN-ASNUStrue
                                                                                              IP
                                                                                              192.168.2.1
                                                                                              127.0.0.1
                                                                                              Joe Sandbox Version:35.0.0 Citrine
                                                                                              Analysis ID:672062
                                                                                              Start date and time: 23/07/202205:06:032022-07-23 05:06:03 +02:00
                                                                                              Joe Sandbox Product:CloudBasic
                                                                                              Overall analysis duration:0h 9m 41s
                                                                                              Hypervisor based Inspection enabled:false
                                                                                              Report type:light
                                                                                              Sample file name:548IrCt4hj.dll
                                                                                              Cookbook file name:default.jbs
                                                                                              Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                                                                              Run name:Run with higher sleep bypass
                                                                                              Number of analysed new started processes analysed:35
                                                                                              Number of new started drivers analysed:0
                                                                                              Number of existing processes analysed:0
                                                                                              Number of existing drivers analysed:0
                                                                                              Number of injected processes analysed:0
                                                                                              Technologies:
                                                                                              • HCA enabled
                                                                                              • EGA enabled
                                                                                              • HDC enabled
                                                                                              • AMSI enabled
                                                                                              Analysis Mode:default
                                                                                              Analysis stop reason:Timeout
                                                                                              Detection:MAL
                                                                                              Classification:mal100.troj.evad.winDLL@31/8@0/43
                                                                                              EGA Information:
                                                                                              • Successful, ratio: 100%
                                                                                              HDC Information:Failed
                                                                                              HCA Information:
                                                                                              • Successful, ratio: 98%
                                                                                              • Number of executed functions: 0
                                                                                              • Number of non-executed functions: 0
                                                                                              Cookbook Comments:
                                                                                              • Found application associated with file extension: .dll
                                                                                              • Adjust boot time
                                                                                              • Enable AMSI
                                                                                              • Sleeps bigger than 300000ms are automatically reduced to 1000ms
                                                                                              • Exclude process from analysis (whitelisted): audiodg.exe, BackgroundTransferHost.exe, WMIADAP.exe, backgroundTaskHost.exe, wuapihost.exe
                                                                                              • Excluded IPs from analysis (whitelisted): 23.211.6.115, 93.184.221.240, 23.211.4.86, 20.223.24.244
                                                                                              • Excluded domains from analysis (whitelisted): store-images.s-microsoft.com-c.edgekey.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, arc.msn.com, wu.azureedge.net, e12564.dspb.akamaiedge.net, rp-consumer-prod-displaycatalog-geomap.trafficmanager.net, login.live.com, bg.apr-52dd2-0503.edgecastdns.net, cs11.wpc.v0cdn.net, sls.update.microsoft.com, hlb.apr-52dd2-0.edgecastdns.net, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, prod.fs.microsoft.com.akadns.net, www.bing.com, fs.microsoft.com, wu.ec.azureedge.net, neu-displaycatalogrp.frontdoor.bigcatalog.commerce.microsoft.com, ctldl.windowsupdate.com, e1723.g.akamaiedge.net, wu-bg-shim.trafficmanager.net, ris.api.iris.microsoft.com, store-images.s-microsoft.com, displaycatalog-rp.md.mp.microsoft.com.akadns.net
                                                                                              • Not all processes where analyzed, report is missing behavior information
                                                                                              • Report size exceeded maximum capacity and may have missing behavior information.
                                                                                              • Report size exceeded maximum capacity and may have missing disassembly code.
                                                                                              • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                                              • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                                                              • Report size getting too big, too many NtQueryValueKey calls found.
                                                                                              No simulations
                                                                                              No context
                                                                                              No context
                                                                                              No context
                                                                                              No context
                                                                                              No context
                                                                                              Process:C:\Windows\System32\svchost.exe
                                                                                              File Type:data
                                                                                              Category:dropped
                                                                                              Size (bytes):8192
                                                                                              Entropy (8bit):0.3593198815979092
                                                                                              Encrypted:false
                                                                                              SSDEEP:12:SnaaD0JcaaD0JwQQU2naaD0JcaaD0JwQQU:4tgJctgJw/tgJctgJw
                                                                                              MD5:BF1DC7D5D8DAD7478F426DF8B3F8BAA6
                                                                                              SHA1:C6B0BDE788F553F865D65F773D8F6A3546887E42
                                                                                              SHA-256:BE47C764C38CA7A90A345BE183F5261E89B98743B5E35989E9A8BE0DA498C0F2
                                                                                              SHA-512:00F2412AA04E09EA19A8315D80BE66D2727C713FC0F5AE6A9334BABA539817F568A98CA3A45B2673282BDD325B8B0E2840A393A4DCFADCB16473F5EAF2AF3180
                                                                                              Malicious:false
                                                                                              Preview:.............*..........3...w..................C:\ProgramData\Microsoft\Network\Downloader\.........................................................................................................................................................................................................................C:\ProgramData\Microsoft\Network\Downloader\..........................................................................................................................................................................................................................0u..................@...@......................................................*.............................................................................................................................................................................................................................................................................................................................................................
                                                                                              Process:C:\Windows\System32\svchost.exe
                                                                                              File Type:MPEG-4 LOAS
                                                                                              Category:dropped
                                                                                              Size (bytes):1310720
                                                                                              Entropy (8bit):0.24946602151942124
                                                                                              Encrypted:false
                                                                                              SSDEEP:1536:BJiRdfVzkZm3lyf49uyc0ga04PdHS9LrM/oVMUdSRU4F:BJiRdwfu2SRU4F
                                                                                              MD5:C6415F458A864CEDDB363410A92D8D55
                                                                                              SHA1:7FAC7104DAE76F30E1C2D7251634F0B3E94DE7D2
                                                                                              SHA-256:FE8A2F90EA9F564593FA5CE40785FF4B7290A616C04419105935BA5AA2AA0DA0
                                                                                              SHA-512:FCDA8CBF3F18589B92197F0DD336D5A08278E8B5433C7055C8F3FE4A136B86A9CB31D9941F53A492CD16ECFC4921AF4031A513B86051618D76693B4B8058CAE9
                                                                                              Malicious:false
                                                                                              Preview:V.d.........@..@.3...w...........................3...w..................C:\ProgramData\Microsoft\Network\Downloader\.........................................................................................................................................................................................................................C:\ProgramData\Microsoft\Network\Downloader\..........................................................................................................................................................................................................................0u..................@...@.........................................d#.................................................................................................................................................................................................................................................................................................................................................
                                                                                              Process:C:\Windows\System32\svchost.exe
                                                                                              File Type:Extensible storage engine DataBase, version 0x620, checksum 0xd83bc39c, page size 16384, Windows version 10.0
                                                                                              Category:dropped
                                                                                              Size (bytes):786432
                                                                                              Entropy (8bit):0.2506456520125299
                                                                                              Encrypted:false
                                                                                              SSDEEP:384:h7O+W0StseCJ48EApW0StseCJ48E2rTSjlK/ebmLerYSRSY1J2:h7hSB2nSB2RSjlK/+mLesOj1J2
                                                                                              MD5:5A9C0B5046F21CA3203E4C7CA991BC85
                                                                                              SHA1:82DA25512FE649527023E0FD56208FE354FAEE69
                                                                                              SHA-256:2FA2DD6B161A541D4723B392BE5501EA6C0F435FD3C2DB3572449E71E8EBEA1A
                                                                                              SHA-512:9FFB384C4259C2173440C0AD29342CE7940E7C01C50D060CEC6B380A516820E6B774C15B96A047DE9B087AA4B620693E9EAF1FABA674F7BF52F6E486FBA6018A
                                                                                              Malicious:false
                                                                                              Preview:.;.... ................e.f.3...w........................).....8....zC......z..h.(.....8....zC...)..............3...w...........................................................................................................B...........@...................................................................................................... ...................................................................................................................................................................................................................................................i.e%8....zC...................0q8....zC.........................................................................................................................................................................................................................................................................................................................................................................................
                                                                                              Process:C:\Windows\System32\svchost.exe
                                                                                              File Type:data
                                                                                              Category:dropped
                                                                                              Size (bytes):16384
                                                                                              Entropy (8bit):0.07614715333539902
                                                                                              Encrypted:false
                                                                                              SSDEEP:3:flltJ7vLInHYZlZy3WbydHZmtFS3ZlAll3Vkttlmlnl:f1Jrkn4baWbOHW4bA3
                                                                                              MD5:EC975F51AC789503AD0B2BE6FA5651B7
                                                                                              SHA1:4D216416428EDF7EB6330B88E653F48291942021
                                                                                              SHA-256:D203AB6EDC934A92C5A43B9DB3BCCA113E60600FD39B6570933C3E647BCAB278
                                                                                              SHA-512:BD2FF982509FB909FA82BBC0747F591888EBC344420A06038DCF09741C29642A18F846990A4AF721990C42804E6C9AE00A4D1D2D97A5A057E75A07EDC5A84364
                                                                                              Malicious:false
                                                                                              Preview:N'.......................................3...w.......z..8....zC.........8....zC.8....zC.+@..8....z....................0q8....zC.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                              Process:C:\Windows\System32\regsvr32.exe
                                                                                              File Type:Microsoft Cabinet archive data, 61712 bytes, 1 file
                                                                                              Category:dropped
                                                                                              Size (bytes):61712
                                                                                              Entropy (8bit):7.995044632446497
                                                                                              Encrypted:true
                                                                                              SSDEEP:1536:gzjJiDImMsrjCtGLaexX/zL09mX/lZHIxs:gPJiDI/sr0Hexv/0S/zx
                                                                                              MD5:589C442FC7A0C70DCA927115A700D41E
                                                                                              SHA1:66A07DACE3AFBFD1AA07A47E6875BEAB62C4BB31
                                                                                              SHA-256:2E5CB72E9EB43BAAFB6C6BFCC573AAC92F49A8064C483F9D378A9E8E781A526A
                                                                                              SHA-512:1B5FA79E52BE495C42CF49618441FB7012E28C02E7A08A91DA9213DB3AB810F0E83485BC1DD5F625A47D0BA7CFCDD5EA50ACC9A8DCEBB39F048C40F01E94155B
                                                                                              Malicious:false
                                                                                              Preview:MSCF............,...................I........y.........Tf. .authroot.stl..W.`.4..CK..8U[...q.yL'sf!d.D..."2.2g.<dVI.!.....$).\...!2s..(...[.T7..{}...g....g.....w.km$.&|..qe.n.8+..&...O...`...+..C......`h!0.I.(C..1Q*L.p..".s..B.....H......fUP@..5...(X#.t.2lX.>.y|D.0Z0...M....I(.#.-... ...(.J....2..`.hO..{l+.bd7y.j..u.....3....<......3....s.T...._.'...%{v...s..............KgV.0..X=.A.9w9.Ea.x..........\.=.e.C2......9.......`.o... .......@pm.. a.....-M.....{...s.mW.....;.+...A......0.g..L9#.v.&O>./xSH.S.....GH.6.j...`2.(0g..... Lt........h4.iQ?....[.K.....uI......}.....d....M.....6q.Q~.0.\.'U^)`..u.....-........d..7...2.-.2+3.....A./.%Q...k...Q.,...H.B.%..O..x..5\...Hk.......B.';"Ym.'....X.l.E.6..a8.6..nq..x.r4..1t.....,..u.O..O.L...Uf...X.u.F .(.(.....".q...n{%U.-u....l6!....Z....~o0.}Q'.s.i....7...>4x...A.h.Mk].O.z.].6...53...b^;..>e..x.'1..\p.O.k..B1w..|..K.R.....2.e0..X.^...I...w..!.v5B]x..z.6.G^uF..].b.W...'..I.;..p..@L{.E..@W..3.&...
                                                                                              Process:C:\Windows\System32\regsvr32.exe
                                                                                              File Type:data
                                                                                              Category:modified
                                                                                              Size (bytes):326
                                                                                              Entropy (8bit):3.1358915940078624
                                                                                              Encrypted:false
                                                                                              SSDEEP:6:kKvKd+N+SkQlPlEGYRMY9z+4KlDA3RUeWlEZ21:nKdNkPlE99SNxAhUeE1
                                                                                              MD5:D3EA7BE178C2678C7617C7A602F7FE1C
                                                                                              SHA1:416D50C68F46B1F492707337BFE8A319C4F33C84
                                                                                              SHA-256:40D60CE3DC1CD35532CA36A49B555318C03B0510ADEED9F62FC14F44817067AB
                                                                                              SHA-512:5696EA73B8CB20E9C6C528FE506EE808B8D6618B0C83CA7CD4DE349BEE08A522DE183CA7BBE93E8070FCA74783B182AC94FDCCB40D6A5E8F0147FDA6457132CD
                                                                                              Malicious:false
                                                                                              Preview:p...... ..........._A...(....................................................... .........L.........$...............h.t.t.p.:././.c.t.l.d.l...w.i.n.d.o.w.s.u.p.d.a.t.e...c.o.m./.m.s.d.o.w.n.l.o.a.d./.u.p.d.a.t.e./.v.3./.s.t.a.t.i.c./.t.r.u.s.t.e.d.r./.e.n./.a.u.t.h.r.o.o.t.s.t.l...c.a.b...".0.9.f.4.c.9.6.9.8.b.d.8.1.:.0."...
                                                                                              Process:C:\Windows\System32\svchost.exe
                                                                                              File Type:ASCII text, with no line terminators
                                                                                              Category:dropped
                                                                                              Size (bytes):55
                                                                                              Entropy (8bit):4.306461250274409
                                                                                              Encrypted:false
                                                                                              SSDEEP:3:YDQRWu83XfAw2fHbY:YMRl83Xt2f7Y
                                                                                              MD5:DCA83F08D448911A14C22EBCACC5AD57
                                                                                              SHA1:91270525521B7FE0D986DB19747F47D34B6318AD
                                                                                              SHA-256:2B4B2D4A06044AD0BD2AE3287CFCBECD90B959FEB2F503AC258D7C0A235D6FE9
                                                                                              SHA-512:96F3A02DC4AE302A30A376FC7082002065C7A35ECB74573DE66254EFD701E8FD9E9D867A2C8ABEB4C482738291B715D4965A0D2412663FDF1EE6CBC0BA9FBACA
                                                                                              Malicious:false
                                                                                              Preview:{"fontSetUri":"fontset-2017-04.json","baseUri":"fonts"}
                                                                                              Process:C:\Program Files\Windows Defender\MpCmdRun.exe
                                                                                              File Type:Little-endian UTF-16 Unicode text, with CRLF, CR line terminators
                                                                                              Category:modified
                                                                                              Size (bytes):10844
                                                                                              Entropy (8bit):3.162183525338945
                                                                                              Encrypted:false
                                                                                              SSDEEP:192:cY+38+DJM+i2Jt+iDQ+yw+f0+rU+0Jtk+EOtF+E7tC+EwF3+et:j+s+i+Z+z+B+c+Y+0g+J+j+p3+et
                                                                                              MD5:D39A3BDD050BA8CF9774D1E1A6F7A651
                                                                                              SHA1:47003AC294BE61B57D2AB37C7F4AB314CB967C1F
                                                                                              SHA-256:312A42E0C253625E4FC102E21E7761D1F718E195A7E1A7588B9AEF2E27B5CD09
                                                                                              SHA-512:948B948AFD7D2A83B18ED51E800FB3E4601DC989FA406B39A52FFA4207DDF26A09C571B2AC31ED39DD044C32A43A5CB58043DD613CA0AA3B40D71A9414240971
                                                                                              Malicious:false
                                                                                              Preview:..........-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.....M.p.C.m.d.R.u.n.:. .C.o.m.m.a.n.d. .L.i.n.e.:. .".C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.W.i.n.d.o.w.s. .D.e.f.e.n.d.e.r.\.m.p.c.m.d.r.u.n...e.x.e.". .-.w.d.e.n.a.b.l.e..... .S.t.a.r.t. .T.i.m.e.:. .. T.h.u. .. J.u.n. .. 2.7. .. 2.0.1.9. .0.1.:.2.9.:.4.9.........M.p.E.n.s.u.r.e.P.r.o.c.e.s.s.M.i.t.i.g.a.t.i.o.n.P.o.l.i.c.y.:. .h.r. .=. .0.x.1.....W.D.E.n.a.b.l.e.....E.R.R.O.R.:. .M.p.W.D.E.n.a.b.l.e.(.T.R.U.E.). .f.a.i.l.e.d. .(.8.0.0.7.0.4.E.C.).....M.p.C.m.d.R.u.n.:. .E.n.d. .T.i.m.e.:. .. T.h.u. .. J.u.n. .. 2.7. .. 2.0.1.9. .0.1.:.2.9.:.4.9.....-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.............-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.
                                                                                              File type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                              Entropy (8bit):6.301831913358297
                                                                                              TrID:
                                                                                              • Win64 Dynamic Link Library (generic) (102004/3) 86.43%
                                                                                              • Win64 Executable (generic) (12005/4) 10.17%
                                                                                              • Generic Win/DOS Executable (2004/3) 1.70%
                                                                                              • DOS Executable Generic (2002/1) 1.70%
                                                                                              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.01%
                                                                                              File name:548IrCt4hj.dll
                                                                                              File size:962048
                                                                                              MD5:7301880b88f87cd3a593f7106d5743cc
                                                                                              SHA1:c8a2b0ae061b612f4d4a4cfc4ee3e1f7079b4240
                                                                                              SHA256:c409ad4f64a1ad925ffbfdb88f57dd9177123364a1875caf6cbb6f5ba3970cc3
                                                                                              SHA512:3abf4d6b0725cae5fd05edccdac75e5061ebcc033e24fbd73482fabe53bd1f914490f3bfda638bd623e642200e8499539b0541bb95d5c7040410d2ff209a640a
                                                                                              SSDEEP:12288:kvyPTUfrN+lSDLV9dRCYFdVlv6jVBv4w8N6zTlvdEywUshhxmIssuqvY/J9ujv7X:k6Ufgl15qhxm1qvY2leXA
                                                                                              TLSH:0515BF6677E81291D0B7D13F8AA78B49EAF2BC041734A7CB0184525D2F23BD85A3F725
                                                                                              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........71x.V_+.V_+.V_+p$\*.V_+p$Z*&V_+.#[*.V_+.#\*.V_+.#Z*.V_+p$[*.V_+p$^*.V_+.V^+ V_+b#Z*.V_+b#_*.V_+b#.+.V_+.V.+.V_+b#]*.V_+Rich.V_
                                                                                              Icon Hash:74f0e4ecccdce0e4
                                                                                              Entrypoint:0x18000110e
                                                                                              Entrypoint Section:.text
                                                                                              Digitally signed:false
                                                                                              Imagebase:0x180000000
                                                                                              Subsystem:windows gui
                                                                                              Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, DLL
                                                                                              DLL Characteristics:HIGH_ENTROPY_VA, NX_COMPAT
                                                                                              Time Stamp:0x62C329A8 [Mon Jul 4 17:55:52 2022 UTC]
                                                                                              TLS Callbacks:
                                                                                              CLR (.Net) Version:
                                                                                              OS Version Major:6
                                                                                              OS Version Minor:0
                                                                                              File Version Major:6
                                                                                              File Version Minor:0
                                                                                              Subsystem Version Major:6
                                                                                              Subsystem Version Minor:0
                                                                                              Import Hash:c8e804de36681c3fb89b2f7688123f2b
                                                                                              Instruction
                                                                                              jmp 00007FCE50787EDEh
                                                                                              jmp 00007FCE507DECC5h
                                                                                              jmp 00007FCE5079C6ECh
                                                                                              jmp 00007FCE507C7DABh
                                                                                              jmp 00007FCE507BB822h
                                                                                              jmp 00007FCE5079FBE1h
                                                                                              jmp 00007FCE50786570h
                                                                                              jmp 00007FCE5079AC33h
                                                                                              jmp 00007FCE5077B0EAh
                                                                                              jmp 00007FCE507A8431h
                                                                                              jmp 00007FCE507A626Ch
                                                                                              jmp 00007FCE507A850Bh
                                                                                              jmp 00007FCE507CA986h
                                                                                              jmp 00007FCE507807E1h
                                                                                              jmp 00007FCE50788594h
                                                                                              jmp 00007FCE5079AC37h
                                                                                              jmp 00007FCE507E96DEh
                                                                                              jmp 00007FCE507A1A81h
                                                                                              jmp 00007FCE507C5E98h
                                                                                              jmp 00007FCE507B9013h
                                                                                              jmp 00007FCE507D9E16h
                                                                                              jmp 00007FCE507D36B5h
                                                                                              jmp 00007FCE507B3144h
                                                                                              jmp 00007FCE507C50C3h
                                                                                              jmp 00007FCE507C54A6h
                                                                                              jmp 00007FCE507E9785h
                                                                                              jmp 00007FCE507D30E0h
                                                                                              jmp 00007FCE5078B5FFh
                                                                                              jmp 00007FCE5078A116h
                                                                                              jmp 00007FCE507C6D9Dh
                                                                                              jmp 00007FCE5078BAA4h
                                                                                              jmp 00007FCE507D09C3h
                                                                                              jmp 00007FCE507CEEE6h
                                                                                              jmp 00007FCE5079B9FDh
                                                                                              jmp 00007FCE50790128h
                                                                                              jmp 00007FCE507C9133h
                                                                                              jmp 00007FCE5079BC02h
                                                                                              jmp 00007FCE507DC949h
                                                                                              jmp 00007FCE507B8F9Ch
                                                                                              jmp 00007FCE5079AD3Fh
                                                                                              NameVirtual AddressVirtual Size Is in Section
                                                                                              IMAGE_DIRECTORY_ENTRY_EXPORT0xb07c00x1c9.rdata
                                                                                              IMAGE_DIRECTORY_ENTRY_IMPORT0xbb6e80x8c.idata
                                                                                              IMAGE_DIRECTORY_ENTRY_RESOURCE0xbf0000x30ebd.rsrc
                                                                                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0xb50000x4ea8.pdata
                                                                                              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                              IMAGE_DIRECTORY_ENTRY_BASERELOC0xf00000xd78.reloc
                                                                                              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xa63200x138.rdata
                                                                                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                              IMAGE_DIRECTORY_ENTRY_IAT0xbb0000x6e8.idata
                                                                                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                              NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                              .text0x10000x8a5ca0x8a600False0.3069634993224932data5.641927945052085IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                              .rdata0x8c0000x249890x24a00False0.2668981975255973data4.201809080615527IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                              .data0xb10000x39600x1800False0.13834635416666666data2.2672137141142894IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                              .pdata0xb50000x57a80x5800False0.5007990056818182data5.516669615542349IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                              .idata0xbb0000x18d10x1a00False0.2459435096153846data3.49134963905175IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                              .00cfg0xbd0000x1510x200False0.05859375data0.3458273094223054IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                              _RDATA0xbe0000x2220x400False0.16796875data1.4491445801684228IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                              .rsrc0xbf0000x30ebd0x31000False0.8592952806122449data7.7601261539979545IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                              .reloc0xf00000x194d0x1a00False0.21875data3.637638102515201IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                                              NameRVASizeTypeLanguageCountry
                                                                                              REGISTRY0xbf19c0x1d4ASCII textEnglishUnited States
                                                                                              TYPELIB0xbf3700x3398dataEnglishUnited States
                                                                                              RT_STRING0xc27080x36dataEnglishUnited States
                                                                                              RT_HTML0xc27400x2d600dataEnglishUnited States
                                                                                              RT_MANIFEST0xefd400x17dXML 1.0 document textEnglishUnited States
                                                                                              DLLImport
                                                                                              ODBC32.dll
                                                                                              KERNEL32.dllFlushFileBuffers, SetStdHandle, SetFilePointerEx, EncodePointer, DecodePointer, RaiseException, GetLastError, QueryPerformanceFrequency, EnterCriticalSection, LeaveCriticalSection, InitializeCriticalSectionAndSpinCount, DeleteCriticalSection, VirtualAlloc, DisableThreadLibraryCalls, WriteFile, GetModuleFileNameW, GetModuleHandleW, GetProcAddress, LoadLibraryExW, LoadResource, SizeofResource, FindResourceW, lstrcmpiW, MultiByteToWideChar, GetFileSizeEx, GetStringTypeW, SetConsoleCtrlHandler, GetProcessHeap, EnumSystemLocalesW, GetUserDefaultLCID, GetConsoleOutputCP, GetConsoleMode, ReadFile, ReadConsoleW, CloseHandle, CreateFileW, WriteConsoleW, FreeLibrary, SetUnhandledExceptionFilter, IsValidLocale, GetLocaleInfoW, LCMapStringW, CompareStringW, GetTimeFormatW, GetDateFormatW, FlsFree, FlsSetValue, FlsGetValue, FlsAlloc, SetEnvironmentVariableW, FreeEnvironmentStringsW, GetEnvironmentStringsW, WideCharToMultiByte, IsDebuggerPresent, OutputDebugStringW, RtlCaptureContext, RtlLookupFunctionEntry, RtlVirtualUnwind, UnhandledExceptionFilter, RtlUnwind, GetCurrentProcess, TerminateProcess, IsProcessorFeaturePresent, GetStartupInfoW, QueryPerformanceCounter, GetCurrentProcessId, GetCurrentThreadId, GetSystemTimeAsFileTime, InitializeSListHead, RtlPcToFileHeader, RtlUnwindEx, InterlockedPushEntrySList, InterlockedFlushSList, SetLastError, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, ExitProcess, GetModuleHandleExW, GetCurrentThread, HeapFree, HeapAlloc, HeapSize, HeapReAlloc, GetStdHandle, GetFileType, FindClose, FindFirstFileExW, FindNextFileW, IsValidCodePage, GetACP, GetOEMCP, GetCPInfo, GetCommandLineA, GetCommandLineW
                                                                                              USER32.dllShowWindow, CharNextW, UnregisterClassW, MessageBoxA
                                                                                              ADVAPI32.dllRegQueryInfoKeyW, RegOpenKeyExW, RegEnumKeyExW, RegDeleteValueW, RegDeleteKeyW, RegCreateKeyExW, RegCloseKey, RegSetValueExW
                                                                                              ole32.dllCoCreateInstance, CoCreateFreeThreadedMarshaler, CoTaskMemAlloc, CoTaskMemRealloc, CoTaskMemFree, CoInitialize, StringFromGUID2
                                                                                              OLEAUT32.dllLoadTypeLib, UnRegisterTypeLib, VarUI4FromStr, SysFreeString, SysAllocString
                                                                                              NameOrdinalAddress
                                                                                              DllCanUnloadNow10x180003102
                                                                                              DllGetClassObject20x180003be3
                                                                                              DllRegisterServer30x1800013fc
                                                                                              DllUnregisterServer40x180003521
                                                                                              Language of compilation systemCountry where language is spokenMap
                                                                                              EnglishUnited States
                                                                                              TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                                                                              192.168.2.5174.138.33.494976870802404316 07/23/22-04:56:42.473067TCP2404316ET CNC Feodo Tracker Reported CnC Server TCP group 9497687080192.168.2.5174.138.33.49
                                                                                              TimestampSource PortDest PortSource IPDest IP
                                                                                              Jul 23, 2022 05:07:40.757388115 CEST497587080192.168.2.4174.138.33.49
                                                                                              Jul 23, 2022 05:07:40.859507084 CEST708049758174.138.33.49192.168.2.4
                                                                                              Jul 23, 2022 05:07:40.859658003 CEST497587080192.168.2.4174.138.33.49
                                                                                              Jul 23, 2022 05:07:40.889399052 CEST497587080192.168.2.4174.138.33.49
                                                                                              Jul 23, 2022 05:07:40.994549036 CEST708049758174.138.33.49192.168.2.4
                                                                                              Jul 23, 2022 05:07:41.014581919 CEST708049758174.138.33.49192.168.2.4
                                                                                              Jul 23, 2022 05:07:41.014671087 CEST708049758174.138.33.49192.168.2.4
                                                                                              Jul 23, 2022 05:07:41.014766932 CEST497587080192.168.2.4174.138.33.49
                                                                                              Jul 23, 2022 05:07:41.015188932 CEST497587080192.168.2.4174.138.33.49
                                                                                              Jul 23, 2022 05:07:45.621840000 CEST497587080192.168.2.4174.138.33.49
                                                                                              Jul 23, 2022 05:07:45.726568937 CEST708049758174.138.33.49192.168.2.4
                                                                                              Jul 23, 2022 05:07:45.726685047 CEST497587080192.168.2.4174.138.33.49
                                                                                              Jul 23, 2022 05:07:45.730561018 CEST497587080192.168.2.4174.138.33.49
                                                                                              Jul 23, 2022 05:07:45.872215986 CEST708049758174.138.33.49192.168.2.4
                                                                                              Jul 23, 2022 05:07:46.269582987 CEST708049758174.138.33.49192.168.2.4
                                                                                              Jul 23, 2022 05:07:46.269676924 CEST497587080192.168.2.4174.138.33.49
                                                                                              Jul 23, 2022 05:07:49.276211023 CEST708049758174.138.33.49192.168.2.4
                                                                                              Jul 23, 2022 05:07:49.276302099 CEST497587080192.168.2.4174.138.33.49
                                                                                              Jul 23, 2022 05:07:49.276330948 CEST708049758174.138.33.49192.168.2.4
                                                                                              Jul 23, 2022 05:07:49.276375055 CEST497587080192.168.2.4174.138.33.49
                                                                                              Jul 23, 2022 05:09:31.102890968 CEST497587080192.168.2.4174.138.33.49
                                                                                              Jul 23, 2022 05:09:31.102929115 CEST497587080192.168.2.4174.138.33.49

                                                                                              Click to jump to process

                                                                                              Target ID:0
                                                                                              Start time:05:07:10
                                                                                              Start date:23/07/2022
                                                                                              Path:C:\Windows\System32\loaddll64.exe
                                                                                              Wow64 process (32bit):false
                                                                                              Commandline:loaddll64.exe "C:\Users\user\Desktop\548IrCt4hj.dll"
                                                                                              Imagebase:0x7ff6005f0000
                                                                                              File size:140288 bytes
                                                                                              MD5 hash:4E8A40CAD6CCC047914E3A7830A2D8AA
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:true
                                                                                              Programmed in:C, C++ or other language
                                                                                              Reputation:high

                                                                                              Target ID:1
                                                                                              Start time:05:07:10
                                                                                              Start date:23/07/2022
                                                                                              Path:C:\Windows\System32\cmd.exe
                                                                                              Wow64 process (32bit):false
                                                                                              Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\548IrCt4hj.dll",#1
                                                                                              Imagebase:0x7ff7bb450000
                                                                                              File size:273920 bytes
                                                                                              MD5 hash:4E2ACF4F8A396486AB4268C94A6A245F
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:true
                                                                                              Programmed in:C, C++ or other language
                                                                                              Reputation:high

                                                                                              Target ID:2
                                                                                              Start time:05:07:11
                                                                                              Start date:23/07/2022
                                                                                              Path:C:\Windows\System32\regsvr32.exe
                                                                                              Wow64 process (32bit):false
                                                                                              Commandline:regsvr32.exe /s C:\Users\user\Desktop\548IrCt4hj.dll
                                                                                              Imagebase:0x7ff7f12b0000
                                                                                              File size:24064 bytes
                                                                                              MD5 hash:D78B75FC68247E8A63ACBA846182740E
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:true
                                                                                              Programmed in:C, C++ or other language
                                                                                              Yara matches:
                                                                                              • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000002.00000002.252638967.0000000002091000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                              • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000002.00000002.252607659.0000000002060000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                              Reputation:high

                                                                                              Target ID:3
                                                                                              Start time:05:07:11
                                                                                              Start date:23/07/2022
                                                                                              Path:C:\Windows\System32\rundll32.exe
                                                                                              Wow64 process (32bit):false
                                                                                              Commandline:rundll32.exe "C:\Users\user\Desktop\548IrCt4hj.dll",#1
                                                                                              Imagebase:0x7ff7174b0000
                                                                                              File size:69632 bytes
                                                                                              MD5 hash:73C519F050C20580F8A62C849D49215A
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:true
                                                                                              Programmed in:C, C++ or other language
                                                                                              Yara matches:
                                                                                              • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000003.00000002.248792041.000001F26FD71000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                              • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000003.00000002.248763264.000001F26FD40000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                              Reputation:high

                                                                                              Target ID:4
                                                                                              Start time:05:07:11
                                                                                              Start date:23/07/2022
                                                                                              Path:C:\Windows\System32\rundll32.exe
                                                                                              Wow64 process (32bit):false
                                                                                              Commandline:rundll32.exe C:\Users\user\Desktop\548IrCt4hj.dll,DllCanUnloadNow
                                                                                              Imagebase:0x7ff7174b0000
                                                                                              File size:69632 bytes
                                                                                              MD5 hash:73C519F050C20580F8A62C849D49215A
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:true
                                                                                              Programmed in:C, C++ or other language
                                                                                              Yara matches:
                                                                                              • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000004.00000002.249040025.000001C7434E0000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                              • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000004.00000002.249084413.000001C743541000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                              Reputation:high

                                                                                              Target ID:5
                                                                                              Start time:05:07:14
                                                                                              Start date:23/07/2022
                                                                                              Path:C:\Windows\System32\regsvr32.exe
                                                                                              Wow64 process (32bit):false
                                                                                              Commandline:C:\Windows\system32\regsvr32.exe "C:\Windows\system32\MbnmzGnNg\joXcB.dll"
                                                                                              Imagebase:0x7ff7f12b0000
                                                                                              File size:24064 bytes
                                                                                              MD5 hash:D78B75FC68247E8A63ACBA846182740E
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:true
                                                                                              Programmed in:C, C++ or other language
                                                                                              Yara matches:
                                                                                              • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000005.00000002.637949653.0000000000E40000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                              • Rule: JoeSecurity_Emotet_3, Description: , Source: 00000005.00000002.638413256.0000000000EA8000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                              • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000005.00000002.638139112.0000000000E71000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                              Reputation:high

                                                                                              Target ID:6
                                                                                              Start time:05:07:15
                                                                                              Start date:23/07/2022
                                                                                              Path:C:\Windows\System32\rundll32.exe
                                                                                              Wow64 process (32bit):false
                                                                                              Commandline:rundll32.exe C:\Users\user\Desktop\548IrCt4hj.dll,DllGetClassObject
                                                                                              Imagebase:0x7ff7174b0000
                                                                                              File size:69632 bytes
                                                                                              MD5 hash:73C519F050C20580F8A62C849D49215A
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:true
                                                                                              Programmed in:C, C++ or other language
                                                                                              Reputation:high

                                                                                              Target ID:8
                                                                                              Start time:05:07:18
                                                                                              Start date:23/07/2022
                                                                                              Path:C:\Windows\System32\rundll32.exe
                                                                                              Wow64 process (32bit):false
                                                                                              Commandline:rundll32.exe C:\Users\user\Desktop\548IrCt4hj.dll,DllRegisterServer
                                                                                              Imagebase:0x7ff7174b0000
                                                                                              File size:69632 bytes
                                                                                              MD5 hash:73C519F050C20580F8A62C849D49215A
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:true
                                                                                              Programmed in:C, C++ or other language
                                                                                              Reputation:high

                                                                                              Target ID:11
                                                                                              Start time:05:07:31
                                                                                              Start date:23/07/2022
                                                                                              Path:C:\Windows\System32\svchost.exe
                                                                                              Wow64 process (32bit):false
                                                                                              Commandline:C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
                                                                                              Imagebase:0x7ff7338d0000
                                                                                              File size:51288 bytes
                                                                                              MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:true
                                                                                              Programmed in:C, C++ or other language
                                                                                              Reputation:high

                                                                                              Target ID:12
                                                                                              Start time:05:07:31
                                                                                              Start date:23/07/2022
                                                                                              Path:C:\Windows\System32\svchost.exe
                                                                                              Wow64 process (32bit):false
                                                                                              Commandline:c:\windows\system32\svchost.exe -k localservice -p -s CDPSvc
                                                                                              Imagebase:0x7ff7338d0000
                                                                                              File size:51288 bytes
                                                                                              MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:false
                                                                                              Programmed in:C, C++ or other language

                                                                                              Target ID:13
                                                                                              Start time:05:07:32
                                                                                              Start date:23/07/2022
                                                                                              Path:C:\Windows\System32\svchost.exe
                                                                                              Wow64 process (32bit):false
                                                                                              Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p
                                                                                              Imagebase:0x7ff7338d0000
                                                                                              File size:51288 bytes
                                                                                              MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:true
                                                                                              Programmed in:C, C++ or other language

                                                                                              Target ID:14
                                                                                              Start time:05:07:33
                                                                                              Start date:23/07/2022
                                                                                              Path:C:\Windows\System32\svchost.exe
                                                                                              Wow64 process (32bit):false
                                                                                              Commandline:c:\windows\system32\svchost.exe -k networkservice -p -s DoSvc
                                                                                              Imagebase:0x7ff7338d0000
                                                                                              File size:51288 bytes
                                                                                              MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:false
                                                                                              Programmed in:C, C++ or other language

                                                                                              Target ID:15
                                                                                              Start time:05:07:33
                                                                                              Start date:23/07/2022
                                                                                              Path:C:\Windows\System32\svchost.exe
                                                                                              Wow64 process (32bit):false
                                                                                              Commandline:C:\Windows\System32\svchost.exe -k NetworkService -p
                                                                                              Imagebase:0x7ff7338d0000
                                                                                              File size:51288 bytes
                                                                                              MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:false
                                                                                              Programmed in:C, C++ or other language

                                                                                              Target ID:16
                                                                                              Start time:05:07:34
                                                                                              Start date:23/07/2022
                                                                                              Path:C:\Windows\System32\SgrmBroker.exe
                                                                                              Wow64 process (32bit):false
                                                                                              Commandline:C:\Windows\system32\SgrmBroker.exe
                                                                                              Imagebase:0x7ff7e4e90000
                                                                                              File size:163336 bytes
                                                                                              MD5 hash:D3170A3F3A9626597EEE1888686E3EA6
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:true
                                                                                              Programmed in:C, C++ or other language

                                                                                              Target ID:17
                                                                                              Start time:05:07:35
                                                                                              Start date:23/07/2022
                                                                                              Path:C:\Windows\System32\svchost.exe
                                                                                              Wow64 process (32bit):false
                                                                                              Commandline:c:\windows\system32\svchost.exe -k localservicenetworkrestricted -p -s wscsvc
                                                                                              Imagebase:0x7ff7338d0000
                                                                                              File size:51288 bytes
                                                                                              MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:false
                                                                                              Programmed in:C, C++ or other language

                                                                                              Target ID:18
                                                                                              Start time:05:07:35
                                                                                              Start date:23/07/2022
                                                                                              Path:C:\Windows\System32\svchost.exe
                                                                                              Wow64 process (32bit):false
                                                                                              Commandline:c:\windows\system32\svchost.exe -k unistacksvcgroup
                                                                                              Imagebase:0x7ff7338d0000
                                                                                              File size:51288 bytes
                                                                                              MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:true
                                                                                              Programmed in:C, C++ or other language

                                                                                              Target ID:20
                                                                                              Start time:05:07:39
                                                                                              Start date:23/07/2022
                                                                                              Path:C:\Windows\System32\svchost.exe
                                                                                              Wow64 process (32bit):false
                                                                                              Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p
                                                                                              Imagebase:0x7ff7338d0000
                                                                                              File size:51288 bytes
                                                                                              MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:true
                                                                                              Programmed in:C, C++ or other language

                                                                                              Target ID:21
                                                                                              Start time:05:07:45
                                                                                              Start date:23/07/2022
                                                                                              Path:C:\Windows\System32\svchost.exe
                                                                                              Wow64 process (32bit):false
                                                                                              Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
                                                                                              Imagebase:0x7ff7338d0000
                                                                                              File size:51288 bytes
                                                                                              MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:true
                                                                                              Programmed in:C, C++ or other language

                                                                                              Target ID:22
                                                                                              Start time:05:07:46
                                                                                              Start date:23/07/2022
                                                                                              Path:C:\Windows\System32\svchost.exe
                                                                                              Wow64 process (32bit):false
                                                                                              Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p
                                                                                              Imagebase:0x7ff7338d0000
                                                                                              File size:51288 bytes
                                                                                              MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:true
                                                                                              Programmed in:C, C++ or other language

                                                                                              Target ID:23
                                                                                              Start time:05:08:06
                                                                                              Start date:23/07/2022
                                                                                              Path:C:\Windows\System32\svchost.exe
                                                                                              Wow64 process (32bit):false
                                                                                              Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p
                                                                                              Imagebase:0x7ff7338d0000
                                                                                              File size:51288 bytes
                                                                                              MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:true
                                                                                              Programmed in:C, C++ or other language

                                                                                              Target ID:25
                                                                                              Start time:05:08:18
                                                                                              Start date:23/07/2022
                                                                                              Path:C:\Windows\System32\svchost.exe
                                                                                              Wow64 process (32bit):false
                                                                                              Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p
                                                                                              Imagebase:0x7ff7338d0000
                                                                                              File size:51288 bytes
                                                                                              MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:true
                                                                                              Programmed in:C, C++ or other language

                                                                                              Target ID:29
                                                                                              Start time:05:08:35
                                                                                              Start date:23/07/2022
                                                                                              Path:C:\Program Files\Windows Defender\MpCmdRun.exe
                                                                                              Wow64 process (32bit):false
                                                                                              Commandline:"C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable
                                                                                              Imagebase:0x7ff626d40000
                                                                                              File size:455656 bytes
                                                                                              MD5 hash:A267555174BFA53844371226F482B86B
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:false
                                                                                              Programmed in:C, C++ or other language

                                                                                              Target ID:30
                                                                                              Start time:05:08:36
                                                                                              Start date:23/07/2022
                                                                                              Path:C:\Windows\System32\conhost.exe
                                                                                              Wow64 process (32bit):false
                                                                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                              Imagebase:0x7ff647620000
                                                                                              File size:625664 bytes
                                                                                              MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:false
                                                                                              Programmed in:C, C++ or other language

                                                                                              No disassembly