Edit tour

Windows Analysis Report
task1.exe

Overview

General Information

Sample name:task1.exe
Analysis ID:1645426
MD5:2ba73d2d47cf2d388446b781613b7eff
SHA1:c75c7eb4814835388881d1b4c2db67e64a023e1e
SHA256:06c6442d5bb110140ac1cdbcf1be52388441b9a0750d59b743acc6b52d19582b
Infos:

Detection

Emotet
Score:96
Range:0 - 100
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected Emotet
Changes security center settings (notifications, updates, antivirus, firewall)
Drops executables to the windows directory (C:\Windows) and starts them
Hides that the sample has been downloaded from the Internet (zone.identifier)
Joe Sandbox ML detected suspicious sample
AV process strings found (often used to terminate AV products)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains capabilities to detect virtual machines
Creates files inside the system directory
Deletes files inside the Windows folder
Detected TCP or UDP traffic on non-standard ports
Drops PE files to the windows directory (C:\Windows)
IP address seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries disk information (often used to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Communication To Uncommon Destination Ports
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Yara signature match

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w10x64
  • task1.exe (PID: 7604 cmdline: "C:\Users\user\Desktop\task1.exe" MD5: 2BA73D2D47CF2D388446B781613B7EFF)
    • Phoneutil.exe (PID: 7648 cmdline: "C:\Windows\SysWOW64\mfc110enu\Phoneutil.exe" MD5: 2BA73D2D47CF2D388446B781613B7EFF)
  • svchost.exe (PID: 7744 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
  • svchost.exe (PID: 7932 cmdline: C:\Windows\System32\svchost.exe -k NetworkService -p MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
  • SgrmBroker.exe (PID: 7968 cmdline: C:\Windows\system32\SgrmBroker.exe MD5: 3BA1A18A0DC30A0545E7765CB97D8E63)
  • svchost.exe (PID: 8008 cmdline: C:\Windows\system32\svchost.exe -k UnistackSvcGroup MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
  • svchost.exe (PID: 8044 cmdline: C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
  • svchost.exe (PID: 8080 cmdline: C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s wscsvc MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
    • MpCmdRun.exe (PID: 5324 cmdline: "C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable MD5: B3676839B2EE96983F9ED735CD044159)
      • conhost.exe (PID: 1436 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
EmotetWhile Emotet historically was a banking malware organized in a botnet, nowadays Emotet is mostly seen as infrastructure as a service for content delivery. For example, since mid 2018 it is used by Trickbot for installs, which may also lead to ransomware attacks using Ryuk, a combination observed several times against high-profile targets.It is always stealing information from victims but what the criminal gang behind it did, was to open up another business channel by selling their infrastructure delivering additional malicious software. From malware analysts it has been classified into epochs depending on command and control, payloads, and delivery solutions which change over time.Emotet had been taken down by authorities in January 2021, though it appears to have sprung back to life in November 2021.
  • GOLD CABIN
  • MUMMY SPIDER
  • Mealybug
https://malpedia.caad.fkie.fraunhofer.de/details/win.emotet
No configs have been found
SourceRuleDescriptionAuthorStrings
00000000.00000002.1169317226.0000000002291000.00000020.00001000.00020000.00000000.sdmpWindows_Trojan_Emotet_5528b3b0unknownunknown
  • 0x2d6c:$a: 20 89 44 24 10 83 C2 02 01 74 24 10 01 7C 24 10 29 5C 24 10 66
00000000.00000002.1169283675.0000000002274000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_EmotetYara detected EmotetJoe Security
    00000000.00000002.1169283675.0000000002274000.00000004.00001000.00020000.00000000.sdmpWindows_Trojan_Emotet_5528b3b0unknownunknown
    • 0x31dc:$a: 20 89 44 24 10 83 C2 02 01 74 24 10 01 7C 24 10 29 5C 24 10 66
    00000000.00000002.1169237913.0000000002260000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_EmotetYara detected EmotetJoe Security
      00000000.00000002.1169237913.0000000002260000.00000040.00001000.00020000.00000000.sdmpWindows_Trojan_Emotet_5528b3b0unknownunknown
      • 0x590a:$a: 20 89 44 24 10 83 C2 02 01 74 24 10 01 7C 24 10 29 5C 24 10 66
      Click to see the 6 entries

      System Summary

      barindex
      Source: Network ConnectionAuthor: Florian Roth (Nextron Systems): Data: DestinationIp: 134.209.36.254, DestinationIsIpv6: false, DestinationPort: 8080, EventID: 3, Image: C:\Windows\SysWOW64\mfc110enu\Phoneutil.exe, Initiated: true, ProcessId: 7648, Protocol: tcp, SourceIp: 192.168.2.4, SourceIsIpv6: false, SourcePort: 49729
      Source: Process startedAuthor: vburov: Data: Command: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, CommandLine: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, CommandLine|base64offset|contains: , Image: C:\Windows\System32\svchost.exe, NewProcessName: C:\Windows\System32\svchost.exe, OriginalFileName: C:\Windows\System32\svchost.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 632, ProcessCommandLine: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, ProcessId: 7744, ProcessName: svchost.exe
      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
      2025-03-21T18:38:20.277675+010020308681A Network Trojan was detected192.168.2.449735194.187.133.160443TCP

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: task1.exeAvira: detected
      Source: task1.exeVirustotal: Detection: 93%Perma Link
      Source: task1.exeReversingLabs: Detection: 86%
      Source: Submited SampleIntegrated Neural Analysis Model: Matched 91.3% probability
      Source: task1.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE

      Networking

      barindex
      Source: Network trafficSuricata IDS: 2030868 - Severity 1 - ET MALWARE Win32/Emotet CnC Activity (POST) M10 : 192.168.2.4:49735 -> 194.187.133.160:443
      Source: global trafficTCP traffic: 192.168.2.4:49729 -> 134.209.36.254:8080
      Source: global trafficTCP traffic: 192.168.2.4:49732 -> 104.156.59.7:8080
      Source: global trafficTCP traffic: 192.168.2.4:49734 -> 120.138.30.150:8080
      Source: global trafficTCP traffic: 192.168.2.4:49736 -> 104.236.246.93:8080
      Source: global trafficTCP traffic: 192.168.2.4:49737 -> 74.208.45.104:8080
      Source: Joe Sandbox ViewIP Address: 74.208.45.104 74.208.45.104
      Source: Joe Sandbox ViewIP Address: 104.236.246.93 104.236.246.93
      Source: global trafficHTTP traffic detected: POST /Y1pc/ HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 6.3; Win64; x64; rv:75.0) Gecko/20100101 Firefox/75.0Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateDNT: 1Connection: keep-aliveReferer: 194.187.133.160/Y1pc/Upgrade-Insecure-Requests: 1Content-Type: multipart/form-data; boundary=--------oVoFEuGEHost: 194.187.133.160:443Content-Length: 5988Cache-Control: no-cache
      Source: unknownTCP traffic detected without corresponding DNS query: 74.219.172.26
      Source: unknownTCP traffic detected without corresponding DNS query: 74.219.172.26
      Source: unknownTCP traffic detected without corresponding DNS query: 74.219.172.26
      Source: unknownTCP traffic detected without corresponding DNS query: 74.219.172.26
      Source: unknownTCP traffic detected without corresponding DNS query: 74.219.172.26
      Source: unknownTCP traffic detected without corresponding DNS query: 134.209.36.254
      Source: unknownTCP traffic detected without corresponding DNS query: 134.209.36.254
      Source: unknownTCP traffic detected without corresponding DNS query: 134.209.36.254
      Source: unknownTCP traffic detected without corresponding DNS query: 134.209.36.254
      Source: unknownTCP traffic detected without corresponding DNS query: 134.209.36.254
      Source: unknownTCP traffic detected without corresponding DNS query: 104.156.59.7
      Source: unknownTCP traffic detected without corresponding DNS query: 104.156.59.7
      Source: unknownTCP traffic detected without corresponding DNS query: 104.156.59.7
      Source: unknownTCP traffic detected without corresponding DNS query: 104.156.59.7
      Source: unknownTCP traffic detected without corresponding DNS query: 104.156.59.7
      Source: unknownTCP traffic detected without corresponding DNS query: 120.138.30.150
      Source: unknownTCP traffic detected without corresponding DNS query: 120.138.30.150
      Source: unknownTCP traffic detected without corresponding DNS query: 120.138.30.150
      Source: unknownTCP traffic detected without corresponding DNS query: 120.138.30.150
      Source: unknownTCP traffic detected without corresponding DNS query: 120.138.30.150
      Source: unknownTCP traffic detected without corresponding DNS query: 194.187.133.160
      Source: unknownTCP traffic detected without corresponding DNS query: 194.187.133.160
      Source: unknownTCP traffic detected without corresponding DNS query: 194.187.133.160
      Source: unknownTCP traffic detected without corresponding DNS query: 194.187.133.160
      Source: unknownTCP traffic detected without corresponding DNS query: 104.236.246.93
      Source: unknownTCP traffic detected without corresponding DNS query: 104.236.246.93
      Source: unknownTCP traffic detected without corresponding DNS query: 104.236.246.93
      Source: unknownTCP traffic detected without corresponding DNS query: 104.236.246.93
      Source: unknownTCP traffic detected without corresponding DNS query: 104.236.246.93
      Source: unknownTCP traffic detected without corresponding DNS query: 74.208.45.104
      Source: unknownTCP traffic detected without corresponding DNS query: 74.208.45.104
      Source: unknownTCP traffic detected without corresponding DNS query: 74.208.45.104
      Source: unknownTCP traffic detected without corresponding DNS query: 74.208.45.104
      Source: unknownTCP traffic detected without corresponding DNS query: 74.208.45.104
      Source: unknownTCP traffic detected without corresponding DNS query: 78.187.156.31
      Source: unknownTCP traffic detected without corresponding DNS query: 78.187.156.31
      Source: unknownTCP traffic detected without corresponding DNS query: 78.187.156.31
      Source: unknownTCP traffic detected without corresponding DNS query: 78.187.156.31
      Source: unknownTCP traffic detected without corresponding DNS query: 78.187.156.31
      Source: unknownHTTP traffic detected: POST /Y1pc/ HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 6.3; Win64; x64; rv:75.0) Gecko/20100101 Firefox/75.0Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateDNT: 1Connection: keep-aliveReferer: 194.187.133.160/Y1pc/Upgrade-Insecure-Requests: 1Content-Type: multipart/form-data; boundary=--------oVoFEuGEHost: 194.187.133.160:443Content-Length: 5988Cache-Control: no-cache
      Source: Phoneutil.exe, 00000001.00000003.2595481665.0000000002952000.00000004.00000020.00020000.00000000.sdmp, Phoneutil.exe, 00000001.00000002.3037868279.000000000058E000.00000004.00000020.00020000.00000000.sdmp, Phoneutil.exe, 00000001.00000003.2071543930.000000000065F000.00000004.00000020.00020000.00000000.sdmp, Phoneutil.exe, 00000001.00000002.3038358005.0000000002952000.00000004.00000020.00020000.00000000.sdmp, Phoneutil.exe, 00000001.00000003.2595522273.000000000065F000.00000004.00000020.00020000.00000000.sdmp, Phoneutil.exe, 00000001.00000003.2353142170.000000000065F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://104.156.59.7:8080/4MpJIomdFS/AhgpOuUgBy4aHjgupB/eJJ1yfkvN/
      Source: Phoneutil.exe, 00000001.00000003.2071543930.000000000065F000.00000004.00000020.00020000.00000000.sdmp, Phoneutil.exe, 00000001.00000003.2353142170.000000000065F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://104.156.59.7:8080/4MpJIomdFS/AhgpOuUgBy4aHjgupB/eJJ1yfkvN/XfvR
      Source: Phoneutil.exe, 00000001.00000003.2595481665.0000000002952000.00000004.00000020.00020000.00000000.sdmp, Phoneutil.exe, 00000001.00000002.3038358005.0000000002952000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://104.156.59.7:8080/4MpJIomdFS/AhgpOuUgBy4aHjgupB/eJJ1yfkvN/qos.dll.mui2
      Source: Phoneutil.exe, 00000001.00000003.2595481665.0000000002952000.00000004.00000020.00020000.00000000.sdmp, Phoneutil.exe, 00000001.00000002.3037868279.000000000058E000.00000004.00000020.00020000.00000000.sdmp, Phoneutil.exe, 00000001.00000002.3038358005.0000000002952000.00000004.00000020.00020000.00000000.sdmp, Phoneutil.exe, 00000001.00000003.2595522273.000000000065F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://104.236.246.93:8080/NoX8/nA3NbJrYfWeYnk/O7oSRrY5VkVRcwq3/
      Source: Phoneutil.exe, 00000001.00000003.2595481665.0000000002952000.00000004.00000020.00020000.00000000.sdmp, Phoneutil.exe, 00000001.00000002.3038358005.0000000002952000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://104.236.246.93:8080/NoX8/nA3NbJrYfWeYnk/O7oSRrY5VkVRcwq3/3X
      Source: Phoneutil.exe, 00000001.00000003.2595481665.0000000002952000.00000004.00000020.00020000.00000000.sdmp, Phoneutil.exe, 00000001.00000002.3038358005.0000000002952000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://104.236.246.93:8080/NoX8/nA3NbJrYfWeYnk/O7oSRrY5VkVRcwq3/J
      Source: Phoneutil.exe, 00000001.00000002.3037868279.000000000058E000.00000004.00000020.00020000.00000000.sdmp, Phoneutil.exe, 00000001.00000003.2595522273.000000000065F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://104.236.246.93:8080/NoX8/nA3NbJrYfWeYnk/O7oSRrY5VkVRcwq3/L
      Source: Phoneutil.exe, 00000001.00000003.2595522273.000000000065F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://104.236.246.93:8080/NoX8/nA3NbJrYfWeYnk/O7oSRrY5VkVRcwq3/NfdRD
      Source: Phoneutil.exe, 00000001.00000002.3037868279.000000000058E000.00000004.00000020.00020000.00000000.sdmp, Phoneutil.exe, 00000001.00000003.2595522273.000000000065F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://104.236.246.93:8080/NoX8/nA3NbJrYfWeYnk/O7oSRrY5VkVRcwq3/XfvR
      Source: Phoneutil.exe, 00000001.00000003.2595481665.0000000002952000.00000004.00000020.00020000.00000000.sdmp, Phoneutil.exe, 00000001.00000002.3038358005.0000000002952000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://104.236.246.93:8080/NoX8/nA3NbJrYfWeYnk/O7oSRrY5VkVRcwq3/l
      Source: Phoneutil.exe, 00000001.00000002.3038358005.0000000002952000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://120.138.30.150:8080/TtO7iJKw/dmEUHo7CiLr/1HTG6mqcu959EIrb/GBEb45L/fYJUj/
      Source: Phoneutil.exe, 00000001.00000003.1830802025.000000000065F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://134.209.36.254:8080/PSru9ZpnF8/uUf0InRShO48k/IHRU8CZof4tQ4U/3Mr3e/8vRhggsYnHk/
      Source: Phoneutil.exe, 00000001.00000003.2595481665.0000000002952000.00000004.00000020.00020000.00000000.sdmp, Phoneutil.exe, 00000001.00000002.3038358005.0000000002952000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://134.209.36.254:8080/PSru9ZpnF8/uUf0InRShO48k/IHRU8CZof4tQ4U/3Mr3e/8vRhggsYnHk/G
      Source: Phoneutil.exe, 00000001.00000002.3037868279.000000000058E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://134.209.36.254:8080/PSru9ZpnF8/uUf0InRShO48k/IHRU8CZof4tQ4U/3Mr3e/8vRhggsYnHk/rameters
      Source: Phoneutil.exe, 00000001.00000002.3038358005.0000000002952000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://194.187.133.160:443/Y1pc/
      Source: Phoneutil.exe, 00000001.00000003.2595481665.000000000293B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://194.187.133.160:443/Y1pc/50uw0aihGiY/QQLBkeQEGQ5dK5A/
      Source: Phoneutil.exe, 00000001.00000002.3038358005.0000000002930000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://194.187.133.160:443/Y1pc/ad8-9c31255dc46a
      Source: Phoneutil.exe, 00000001.00000003.2595481665.0000000002952000.00000004.00000020.00020000.00000000.sdmp, Phoneutil.exe, 00000001.00000002.3038358005.0000000002952000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://194.187.133.160:443/Y1pc/k
      Source: Phoneutil.exe, 00000001.00000002.3038358005.0000000002952000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://74.208.45.104:8080/1TdWM1Fg1DUOJc/G4zcJgHiN8HgM1c/IsSYYO9RXbHxbgBmWUp/
      Source: Phoneutil.exe, 00000001.00000003.2595481665.0000000002952000.00000004.00000020.00020000.00000000.sdmp, Phoneutil.exe, 00000001.00000002.3038358005.0000000002952000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://74.219.172.26/PraWKy0XfLrY2h3/5eggl4Vw/aGVmFbV50uw0aihGiY/QQLBkeQEGQ5dK5A/
      Source: Phoneutil.exe, 00000001.00000002.3037868279.000000000058E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://74.219.172.26/PraWKy0XfLrY2h3/5eggl4Vw/aGVmFbV50uw0aihGiY/QQLBkeQEGQ5dK5A/3
      Source: Phoneutil.exe, 00000001.00000002.3037868279.000000000058E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://74.219.172.26/PraWKy0XfLrY2h3/5eggl4Vw/aGVmFbV50uw0aihGiY/QQLBkeQEGQ5dK5A/_
      Source: Phoneutil.exe, 00000001.00000002.3037868279.000000000058E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://74.219.172.26/PraWKy0XfLrY2h3/5eggl4Vw/aGVmFbV50uw0aihGiY/QQLBkeQEGQ5dK5A/q
      Source: Phoneutil.exe, 00000001.00000002.3037868279.000000000058E000.00000004.00000020.00020000.00000000.sdmp, Phoneutil.exe, 00000001.00000002.3038358005.0000000002952000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://78.187.156.31/XvqTjPjgHoDJiEfG1x/fqlli/coXWK0DTo2MOHtU/knVHJI50waML6IMly/0cAOm/
      Source: Phoneutil.exe, 00000001.00000002.3038358005.0000000002952000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://78.187.156.31/XvqTjPjgHoDJiEfG1x/fqlli/coXWK0DTo2MOHtU/knVHJI50waML6IMly/0cAOm/?
      Source: Phoneutil.exe, 00000001.00000002.3038358005.0000000002952000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://78.187.156.31/XvqTjPjgHoDJiEfG1x/fqlli/coXWK0DTo2MOHtU/knVHJI50waML6IMly/0cAOm/X
      Source: Phoneutil.exe, 00000001.00000002.3037868279.000000000058E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://78.187.156.31/XvqTjPjgHoDJiEfG1x/fqlli/coXWK0DTo2MOHtU/knVHJI50waML6IMly/0cAOm/f8
      Source: Phoneutil.exe, 00000001.00000002.3038358005.0000000002952000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://78.187.156.31/XvqTjPjgHoDJiEfG1x/fqlli/coXWK0DTo2MOHtU/knVHJI50waML6IMly/0cAOm/k
      Source: svchost.exe, 00000002.00000002.2516522131.000002295B800000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.ver)
      Source: svchost.exe, 00000002.00000003.1203802155.000002295BA18000.00000004.00000800.00020000.00000000.sdmp, edb.log.2.dr, qmgr.db.2.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/chromewebstore/L2Nocm9tZV9leHRlbnNpb24vYmxvYnMvYjFkQUFWdmlaXy12MHFU
      Source: edb.log.2.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome/acosgr5ufcefr7w7nv4v6k4ebdda_117.0.5938.132/117.0.5
      Source: qmgr.db.2.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/acaa5khuklrahrby256zitbxd5wq_1.0.2512.1/n
      Source: qmgr.db.2.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/acaxuysrwzdnwqutaimsxybnjbrq_2023.9.25.0/
      Source: svchost.exe, 00000002.00000003.1203802155.000002295BA18000.00000004.00000800.00020000.00000000.sdmp, edb.log.2.dr, qmgr.db.2.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/adhioj45hzjkfunn7ccrbqyyhu3q_20230916.567
      Source: svchost.exe, 00000002.00000003.1203802155.000002295BA18000.00000004.00000800.00020000.00000000.sdmp, edb.log.2.dr, qmgr.db.2.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/adqyi2uk2bd7epzsrzisajjiqe_9.48.0/gcmjkmg
      Source: svchost.exe, 00000002.00000003.1203802155.000002295BA4D000.00000004.00000800.00020000.00000000.sdmp, edb.log.2.dr, qmgr.db.2.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/dix4vjifjljmfobl3a7lhcpvw4_414/lmelglejhe
      Source: qmgr.db.2.drString found in binary or memory: http://f.c2r.ts.cdn.office.net/pr/492350f6-3a01-4f97-b9c0-c7c6ddf67d60/Office/Data/v32_16.0.16827.20
      Source: svchost.exe, 00000003.00000002.1365020747.000002552DE24000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.bingmapsportal.com
      Source: svchost.exe, 00000003.00000003.1364250688.000002552DE58000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://appexmapsappupdate.blob.core.windows.net
      Source: svchost.exe, 00000003.00000003.1364250688.000002552DE58000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.1365087195.000002552DE59000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.ditu.live.com/REST/V1/MapControlConfiguration/native/
      Source: svchost.exe, 00000003.00000002.1365056058.000002552DE44000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.1364155368.000002552DE62000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.1364031598.000002552DE6E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.1365122844.000002552DE63000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.1364250688.000002552DE58000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.1365158669.000002552DE70000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.1364313558.000002552DE5A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.1364347295.000002552DE43000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.ditu.live.com/REST/v1/Imagery/Copyright/
      Source: svchost.exe, 00000003.00000003.1364250688.000002552DE58000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.ditu.live.com/REST/v1/Locations
      Source: svchost.exe, 00000003.00000002.1365140186.000002552DE68000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.1364113934.000002552DE67000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.ditu.live.com/REST/v1/Routes/
      Source: svchost.exe, 00000003.00000002.1365175140.000002552DE76000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.1363965865.000002552DE74000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.ditu.live.com/REST/v1/Transit/Stops/
      Source: svchost.exe, 00000003.00000003.1364250688.000002552DE58000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.ditu.live.com/mapcontrol/logging.ashx
      Source: svchost.exe, 00000003.00000003.1364155368.000002552DE62000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.1365020747.000002552DE24000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.1365122844.000002552DE63000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.1364250688.000002552DE58000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.1364313558.000002552DE5A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Imagery/Copyright/
      Source: svchost.exe, 00000003.00000003.1364250688.000002552DE58000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Locations
      Source: svchost.exe, 00000003.00000002.1365020747.000002552DE24000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.1365140186.000002552DE68000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.1364113934.000002552DE67000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Routes/
      Source: svchost.exe, 00000003.00000003.1364250688.000002552DE58000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Routes/Driving
      Source: svchost.exe, 00000003.00000003.1364250688.000002552DE58000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Routes/Transit
      Source: svchost.exe, 00000003.00000003.1364250688.000002552DE58000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Routes/Walking
      Source: svchost.exe, 00000003.00000003.1364155368.000002552DE62000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.1365020747.000002552DE24000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.1365122844.000002552DE63000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Traffic/Incidents/
      Source: svchost.exe, 00000003.00000002.1365020747.000002552DE24000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Transit/Schedules/
      Source: svchost.exe, 00000003.00000003.1364250688.000002552DE58000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/mapcontrol/logging.ashx
      Source: svchost.exe, 00000003.00000002.1365056058.000002552DE44000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.1364155368.000002552DE62000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.1365122844.000002552DE63000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.1364347295.000002552DE43000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/webservices/v1/LoggingService/LoggingService.svc/Log?
      Source: svchost.exe, 00000003.00000003.1363948269.000002552DE35000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dynamic.api.tiles.ditu.live.com/odvs/gd?pv=1&r=
      Source: svchost.exe, 00000003.00000002.1365020747.000002552DE24000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dynamic.api.tiles.ditu.live.com/odvs/gdi?pv=1&r=
      Source: svchost.exe, 00000003.00000003.1364155368.000002552DE62000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.1365122844.000002552DE63000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dynamic.api.tiles.ditu.live.com/odvs/gdv?pv=1&r=
      Source: svchost.exe, 00000003.00000002.1365056058.000002552DE44000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.1364347295.000002552DE43000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.1364211336.000002552DE5E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dynamic.api.tiles.ditu.live.com/odvs/gri?pv=1&r=
      Source: svchost.exe, 00000003.00000003.1364379404.000002552DE33000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dynamic.t
      Source: svchost.exe, 00000003.00000003.1364250688.000002552DE58000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dynamic.t0.tiles.ditu.live.com/comp/gen.ashx
      Source: svchost.exe, 00000003.00000003.1363948269.000002552DE35000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ecn.dev.virtualearth.net/REST/V1/MapControlConfiguration/native/
      Source: svchost.exe, 00000003.00000002.1365020747.000002552DE24000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.1365140186.000002552DE68000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.1364113934.000002552DE67000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ecn.dev.virtualearth.net/REST/v1/Imagery/Copyright/
      Source: svchost.exe, 00000002.00000003.1203802155.000002295BAC2000.00000004.00000800.00020000.00000000.sdmp, edb.log.2.dr, qmgr.db.2.drString found in binary or memory: https://g.live.com/1rewlive5skydrive/OneDriveProductionV2?OneDriveUpdate=9c123752e31a927b78dc96231b6
      Source: edb.log.2.dr, qmgr.db.2.drString found in binary or memory: https://g.live.com/odclientsettings/Prod.C:
      Source: edb.log.2.dr, qmgr.db.2.drString found in binary or memory: https://g.live.com/odclientsettings/ProdV2
      Source: edb.log.2.dr, qmgr.db.2.drString found in binary or memory: https://g.live.com/odclientsettings/ProdV2.C:
      Source: svchost.exe, 00000002.00000003.1203802155.000002295BAC2000.00000004.00000800.00020000.00000000.sdmp, edb.log.2.drString found in binary or memory: https://g.live.com/odclientsettings/ProdV2?OneDriveUpdate=f359a5df14f97b6802371976c96
      Source: svchost.exe, 00000002.00000003.1203802155.000002295BAC2000.00000004.00000800.00020000.00000000.sdmp, edb.log.2.dr, qmgr.db.2.drString found in binary or memory: https://oneclient.sfx.ms/Win/Installers/23.194.0917.0001/amd64/OneDriveSetup.exe
      Source: edb.log.2.drString found in binary or memory: https://oneclient.sfx.ms/Win/Prod/21.220.1024.0005/OneDriveSetup.exe.C:
      Source: svchost.exe, 00000003.00000003.1364347295.000002552DE43000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/comp/gen.ashx
      Source: svchost.exe, 00000003.00000003.1364347295.000002552DE43000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gd?pv=1&r=
      Source: svchost.exe, 00000003.00000003.1364347295.000002552DE43000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdi?pv=1&r=
      Source: svchost.exe, 00000003.00000003.1364233034.000002552DE5D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdv?pv=1&r=
      Source: svchost.exe, 00000003.00000002.1365020747.000002552DE24000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gri?pv=1&r=
      Source: svchost.exe, 00000003.00000003.1364250688.000002552DE58000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t0.ssl.ak.tiles.virtualearth.net/tiles/gen
      Source: svchost.exe, 00000003.00000003.1364250688.000002552DE58000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.1365087195.000002552DE59000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://tiles.virtualearth.net/tiles/cmd/StreetSideBubbleMetaData?north=
      Source: unknownNetwork traffic detected: HTTP traffic on port 49735 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49735

      E-Banking Fraud

      barindex
      Source: Yara matchFile source: 00000000.00000002.1169283675.0000000002274000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.1169237913.0000000002260000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000001.00000002.3037538833.0000000000520000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000001.00000002.3037797456.0000000000561000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000001.00000002.3037700653.0000000000544000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY

      System Summary

      barindex
      Source: 00000000.00000002.1169317226.0000000002291000.00000020.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Emotet_5528b3b0 Author: unknown
      Source: 00000000.00000002.1169283675.0000000002274000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Emotet_5528b3b0 Author: unknown
      Source: 00000000.00000002.1169237913.0000000002260000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Emotet_5528b3b0 Author: unknown
      Source: 00000001.00000002.3037538833.0000000000520000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Emotet_5528b3b0 Author: unknown
      Source: 00000001.00000002.3037797456.0000000000561000.00000020.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Emotet_5528b3b0 Author: unknown
      Source: 00000001.00000002.3037700653.0000000000544000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Emotet_5528b3b0 Author: unknown
      Source: C:\Users\user\Desktop\task1.exeFile created: C:\Windows\SysWOW64\mfc110enu\Jump to behavior
      Source: C:\Windows\System32\svchost.exeFile created: C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmpJump to behavior
      Source: C:\Users\user\Desktop\task1.exeFile deleted: C:\Windows\SysWOW64\mfc110enu\Phoneutil.exe:Zone.IdentifierJump to behavior
      Source: task1.exe, 00000000.00000000.1165258041.000000000041C000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameDialupwatch.EXEP vs task1.exe
      Source: task1.exeBinary or memory string: OriginalFilenameDialupwatch.EXEP vs task1.exe
      Source: task1.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
      Source: 00000000.00000002.1169317226.0000000002291000.00000020.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Emotet_5528b3b0 reference_sample = eeb13cd51faa7c23d9a40241d03beb239626fbf3efe1dbbfa3994fc10dea0827, os = windows, severity = x86, creation_date = 2021-11-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Emotet, fingerprint = 717ed656d1bd4ba0e4dae8e47268e2c068dad3e3e883ff6da2f951d61f1be642, id = 5528b3b0-d4cb-485e-bc0c-96415ec3a795, last_modified = 2022-01-13
      Source: 00000000.00000002.1169283675.0000000002274000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Emotet_5528b3b0 reference_sample = eeb13cd51faa7c23d9a40241d03beb239626fbf3efe1dbbfa3994fc10dea0827, os = windows, severity = x86, creation_date = 2021-11-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Emotet, fingerprint = 717ed656d1bd4ba0e4dae8e47268e2c068dad3e3e883ff6da2f951d61f1be642, id = 5528b3b0-d4cb-485e-bc0c-96415ec3a795, last_modified = 2022-01-13
      Source: 00000000.00000002.1169237913.0000000002260000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Emotet_5528b3b0 reference_sample = eeb13cd51faa7c23d9a40241d03beb239626fbf3efe1dbbfa3994fc10dea0827, os = windows, severity = x86, creation_date = 2021-11-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Emotet, fingerprint = 717ed656d1bd4ba0e4dae8e47268e2c068dad3e3e883ff6da2f951d61f1be642, id = 5528b3b0-d4cb-485e-bc0c-96415ec3a795, last_modified = 2022-01-13
      Source: 00000001.00000002.3037538833.0000000000520000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Emotet_5528b3b0 reference_sample = eeb13cd51faa7c23d9a40241d03beb239626fbf3efe1dbbfa3994fc10dea0827, os = windows, severity = x86, creation_date = 2021-11-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Emotet, fingerprint = 717ed656d1bd4ba0e4dae8e47268e2c068dad3e3e883ff6da2f951d61f1be642, id = 5528b3b0-d4cb-485e-bc0c-96415ec3a795, last_modified = 2022-01-13
      Source: 00000001.00000002.3037797456.0000000000561000.00000020.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Emotet_5528b3b0 reference_sample = eeb13cd51faa7c23d9a40241d03beb239626fbf3efe1dbbfa3994fc10dea0827, os = windows, severity = x86, creation_date = 2021-11-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Emotet, fingerprint = 717ed656d1bd4ba0e4dae8e47268e2c068dad3e3e883ff6da2f951d61f1be642, id = 5528b3b0-d4cb-485e-bc0c-96415ec3a795, last_modified = 2022-01-13
      Source: 00000001.00000002.3037700653.0000000000544000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Emotet_5528b3b0 reference_sample = eeb13cd51faa7c23d9a40241d03beb239626fbf3efe1dbbfa3994fc10dea0827, os = windows, severity = x86, creation_date = 2021-11-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Emotet, fingerprint = 717ed656d1bd4ba0e4dae8e47268e2c068dad3e3e883ff6da2f951d61f1be642, id = 5528b3b0-d4cb-485e-bc0c-96415ec3a795, last_modified = 2022-01-13
      Source: classification engineClassification label: mal96.troj.evad.winEXE@12/6@0/9
      Source: C:\Windows\System32\conhost.exeMutant created: \BaseNamedObjects\Local\SM0:1436:120:WilError_03
      Source: task1.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      Source: C:\Users\user\Desktop\task1.exeFile read: C:\Users\desktop.iniJump to behavior
      Source: C:\Users\user\Desktop\task1.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
      Source: task1.exeVirustotal: Detection: 93%
      Source: task1.exeReversingLabs: Detection: 86%
      Source: unknownProcess created: C:\Users\user\Desktop\task1.exe "C:\Users\user\Desktop\task1.exe"
      Source: C:\Users\user\Desktop\task1.exeProcess created: C:\Windows\SysWOW64\mfc110enu\Phoneutil.exe "C:\Windows\SysWOW64\mfc110enu\Phoneutil.exe"
      Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
      Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k NetworkService -p
      Source: unknownProcess created: C:\Windows\System32\SgrmBroker.exe C:\Windows\system32\SgrmBroker.exe
      Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k UnistackSvcGroup
      Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc
      Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s wscsvc
      Source: C:\Windows\System32\svchost.exeProcess created: C:\Program Files\Windows Defender\MpCmdRun.exe "C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable
      Source: C:\Program Files\Windows Defender\MpCmdRun.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\task1.exeProcess created: C:\Windows\SysWOW64\mfc110enu\Phoneutil.exe "C:\Windows\SysWOW64\mfc110enu\Phoneutil.exe"Jump to behavior
      Source: C:\Windows\System32\svchost.exeProcess created: C:\Program Files\Windows Defender\MpCmdRun.exe "C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenableJump to behavior
      Source: C:\Users\user\Desktop\task1.exeSection loaded: apphelp.dllJump to behavior
      Source: C:\Users\user\Desktop\task1.exeSection loaded: odbc32.dllJump to behavior
      Source: C:\Users\user\Desktop\task1.exeSection loaded: mfc42.dllJump to behavior
      Source: C:\Users\user\Desktop\task1.exeSection loaded: msvcp60.dllJump to behavior
      Source: C:\Users\user\Desktop\task1.exeSection loaded: msimg32.dllJump to behavior
      Source: C:\Users\user\Desktop\task1.exeSection loaded: dpapi.dllJump to behavior
      Source: C:\Users\user\Desktop\task1.exeSection loaded: uxtheme.dllJump to behavior
      Source: C:\Users\user\Desktop\task1.exeSection loaded: cryptsp.dllJump to behavior
      Source: C:\Users\user\Desktop\task1.exeSection loaded: rsaenh.dllJump to behavior
      Source: C:\Users\user\Desktop\task1.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Users\user\Desktop\task1.exeSection loaded: userenv.dllJump to behavior
      Source: C:\Users\user\Desktop\task1.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Users\user\Desktop\task1.exeSection loaded: urlmon.dllJump to behavior
      Source: C:\Users\user\Desktop\task1.exeSection loaded: iertutil.dllJump to behavior
      Source: C:\Users\user\Desktop\task1.exeSection loaded: srvcli.dllJump to behavior
      Source: C:\Users\user\Desktop\task1.exeSection loaded: netutils.dllJump to behavior
      Source: C:\Users\user\Desktop\task1.exeSection loaded: wininet.dllJump to behavior
      Source: C:\Users\user\Desktop\task1.exeSection loaded: wtsapi32.dllJump to behavior
      Source: C:\Users\user\Desktop\task1.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Users\user\Desktop\task1.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Users\user\Desktop\task1.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Users\user\Desktop\task1.exeSection loaded: propsys.dllJump to behavior
      Source: C:\Users\user\Desktop\task1.exeSection loaded: windows.staterepositoryps.dllJump to behavior
      Source: C:\Users\user\Desktop\task1.exeSection loaded: windows.fileexplorer.common.dllJump to behavior
      Source: C:\Users\user\Desktop\task1.exeSection loaded: ntmarta.dllJump to behavior
      Source: C:\Windows\SysWOW64\mfc110enu\Phoneutil.exeSection loaded: apphelp.dllJump to behavior
      Source: C:\Windows\SysWOW64\mfc110enu\Phoneutil.exeSection loaded: odbc32.dllJump to behavior
      Source: C:\Windows\SysWOW64\mfc110enu\Phoneutil.exeSection loaded: mfc42.dllJump to behavior
      Source: C:\Windows\SysWOW64\mfc110enu\Phoneutil.exeSection loaded: msvcp60.dllJump to behavior
      Source: C:\Windows\SysWOW64\mfc110enu\Phoneutil.exeSection loaded: msimg32.dllJump to behavior
      Source: C:\Windows\SysWOW64\mfc110enu\Phoneutil.exeSection loaded: dpapi.dllJump to behavior
      Source: C:\Windows\SysWOW64\mfc110enu\Phoneutil.exeSection loaded: uxtheme.dllJump to behavior
      Source: C:\Windows\SysWOW64\mfc110enu\Phoneutil.exeSection loaded: cryptsp.dllJump to behavior
      Source: C:\Windows\SysWOW64\mfc110enu\Phoneutil.exeSection loaded: rsaenh.dllJump to behavior
      Source: C:\Windows\SysWOW64\mfc110enu\Phoneutil.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Windows\SysWOW64\mfc110enu\Phoneutil.exeSection loaded: userenv.dllJump to behavior
      Source: C:\Windows\SysWOW64\mfc110enu\Phoneutil.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Windows\SysWOW64\mfc110enu\Phoneutil.exeSection loaded: urlmon.dllJump to behavior
      Source: C:\Windows\SysWOW64\mfc110enu\Phoneutil.exeSection loaded: iertutil.dllJump to behavior
      Source: C:\Windows\SysWOW64\mfc110enu\Phoneutil.exeSection loaded: srvcli.dllJump to behavior
      Source: C:\Windows\SysWOW64\mfc110enu\Phoneutil.exeSection loaded: netutils.dllJump to behavior
      Source: C:\Windows\SysWOW64\mfc110enu\Phoneutil.exeSection loaded: wininet.dllJump to behavior
      Source: C:\Windows\SysWOW64\mfc110enu\Phoneutil.exeSection loaded: wtsapi32.dllJump to behavior
      Source: C:\Windows\SysWOW64\mfc110enu\Phoneutil.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Windows\SysWOW64\mfc110enu\Phoneutil.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Windows\SysWOW64\mfc110enu\Phoneutil.exeSection loaded: cryptbase.dllJump to behavior
      Source: C:\Windows\SysWOW64\mfc110enu\Phoneutil.exeSection loaded: msasn1.dllJump to behavior
      Source: C:\Windows\SysWOW64\mfc110enu\Phoneutil.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Windows\SysWOW64\mfc110enu\Phoneutil.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
      Source: C:\Windows\SysWOW64\mfc110enu\Phoneutil.exeSection loaded: winhttp.dllJump to behavior
      Source: C:\Windows\SysWOW64\mfc110enu\Phoneutil.exeSection loaded: mswsock.dllJump to behavior
      Source: C:\Windows\SysWOW64\mfc110enu\Phoneutil.exeSection loaded: iphlpapi.dllJump to behavior
      Source: C:\Windows\SysWOW64\mfc110enu\Phoneutil.exeSection loaded: winnsi.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: qmgr.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: bitsperf.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: powrprof.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: xmllite.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: firewallapi.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: esent.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: umpdc.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: dnsapi.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: iphlpapi.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: fwbase.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: ntmarta.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: flightsettings.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: netprofm.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: npmproxy.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: bitsigd.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: upnp.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: winhttp.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: ssdpapi.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: urlmon.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: iertutil.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: srvcli.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: netutils.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: appxdeploymentclient.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: cryptbase.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: wsmauto.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: miutils.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: wsmsvc.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: dsrole.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: pcwum.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: mi.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: userenv.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: gpapi.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: wkscli.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: msv1_0.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: ntlmshared.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: cryptdll.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: webio.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: mswsock.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: winnsi.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: rasadhlp.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: fwpuclnt.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: rmclient.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: usermgrcli.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: execmodelclient.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: propsys.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: coremessaging.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: twinapi.appcore.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: onecorecommonproxystub.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: execmodelproxy.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: resourcepolicyclient.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: vssapi.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: vsstrace.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: samcli.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: samlib.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: es.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: bitsproxy.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: dhcpcsvc6.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: dhcpcsvc.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: schannel.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: mskeyprotect.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: ntasn1.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: ncrypt.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: ncryptsslp.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: msasn1.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: cryptsp.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: rsaenh.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: dpapi.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: mpr.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: moshost.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: mapsbtsvc.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: mosstorage.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: ztrace_maps.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: ztrace_maps.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: ztrace_maps.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: bcp47langs.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: mapconfiguration.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: winhttp.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: aphostservice.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: networkhelper.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: userdataplatformhelperutil.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: mccspal.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: syncutil.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: umpdc.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: syncutil.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: vaultcli.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: dmcfgutils.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: dmcmnutils.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: dmxmlhelputils.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: cryptsp.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: xmllite.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: inproclogger.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: flightsettings.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: windows.networking.connectivity.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: npmproxy.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: iertutil.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: msv1_0.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: ntlmshared.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: cryptdll.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: synccontroller.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: pimstore.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: aphostclient.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: accountaccessor.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: dsclient.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: powrprof.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: powrprof.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: systemeventsbrokerclient.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: userdatalanguageutil.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: mccsengineshared.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: ntmarta.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: cemapi.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: userdatatypehelperutil.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: phoneutil.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: onecorecommonproxystub.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: execmodelproxy.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: rmclient.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: storsvc.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: devobj.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: fltlib.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: ntmarta.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: bcd.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: wer.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: winhttp.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: cabinet.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: appxdeploymentclient.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: storageusage.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: userenv.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Windows\System32\svchost.exeSection loaded: propsys.dllJump to behavior
      Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: mpclient.dllJump to behavior
      Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: secur32.dllJump to behavior
      Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: version.dllJump to behavior
      Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: msasn1.dllJump to behavior
      Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: userenv.dllJump to behavior
      Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: gpapi.dllJump to behavior
      Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: wbemcomn.dllJump to behavior
      Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: amsi.dllJump to behavior
      Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: wscapi.dllJump to behavior
      Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: urlmon.dllJump to behavior
      Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: iertutil.dllJump to behavior
      Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: srvcli.dllJump to behavior
      Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: netutils.dllJump to behavior
      Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: slc.dllJump to behavior
      Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: sppc.dllJump to behavior
      Source: C:\Users\user\Desktop\task1.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32Jump to behavior

      Persistence and Installation Behavior

      barindex
      Source: C:\Users\user\Desktop\task1.exeExecutable created and started: C:\Windows\SysWOW64\mfc110enu\Phoneutil.exeJump to behavior
      Source: C:\Users\user\Desktop\task1.exePE file moved: C:\Windows\SysWOW64\mfc110enu\Phoneutil.exeJump to behavior

      Hooking and other Techniques for Hiding and Protection

      barindex
      Source: C:\Users\user\Desktop\task1.exeFile opened: C:\Windows\SysWOW64\mfc110enu\Phoneutil.exe:Zone.Identifier read attributes | deleteJump to behavior
      Source: C:\Users\user\Desktop\task1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\task1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\task1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\task1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\task1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\mfc110enu\Phoneutil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\mfc110enu\Phoneutil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\mfc110enu\Phoneutil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\mfc110enu\Phoneutil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\mfc110enu\Phoneutil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\mfc110enu\Phoneutil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\mfc110enu\Phoneutil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files\Windows Defender\MpCmdRun.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files\Windows Defender\MpCmdRun.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files\Windows Defender\MpCmdRun.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files\Windows Defender\MpCmdRun.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files\Windows Defender\MpCmdRun.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files\Windows Defender\MpCmdRun.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\svchost.exeFile opened / queried: SCSI#Disk&Ven_VMware&Prod_Virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}Jump to behavior
      Source: C:\Windows\System32\svchost.exe TID: 7808Thread sleep time: -30000s >= -30000sJump to behavior
      Source: C:\Windows\System32\svchost.exe TID: 7872Thread sleep time: -30000s >= -30000sJump to behavior
      Source: C:\Windows\System32\svchost.exeFile opened: PhysicalDrive0Jump to behavior
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Users\user\Desktop\task1.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
      Source: C:\Windows\System32\svchost.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
      Source: C:\Windows\System32\svchost.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
      Source: C:\Windows\System32\svchost.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
      Source: C:\Windows\System32\svchost.exeFile Volume queried: C:\Windows\System32 FullSizeInformationJump to behavior
      Source: svchost.exe, 00000006.00000002.3037254575.0000019EA0A00000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\4&1656f219&0&000000
      Source: svchost.exe, 00000006.00000002.3037446356.0000019EA0A55000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}
      Source: svchost.exe, 00000002.00000002.2516098945.000002295622B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWP
      Source: svchost.exe, 00000006.00000002.3037572360.0000019EA0A7E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: dules;%$@\??\SCSI#Disk&Ven_VMware&Prod_Virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}
      Source: svchost.exe, 00000006.00000002.3037572360.0000019EA0A7E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: (@\\?\SCSI#Disk&Ven_VMware&Prod_Virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}h
      Source: svchost.exe, 00000006.00000002.3037380145.0000019EA0A29000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: *@\??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
      Source: Phoneutil.exe, 00000001.00000003.2595481665.0000000002952000.00000004.00000020.00020000.00000000.sdmp, Phoneutil.exe, 00000001.00000003.1830653440.0000000002966000.00000004.00000020.00020000.00000000.sdmp, Phoneutil.exe, 00000001.00000002.3037868279.000000000058E000.00000004.00000020.00020000.00000000.sdmp, Phoneutil.exe, 00000001.00000003.2595481665.000000000293B000.00000004.00000020.00020000.00000000.sdmp, Phoneutil.exe, 00000001.00000002.3038358005.0000000002930000.00000004.00000020.00020000.00000000.sdmp, Phoneutil.exe, 00000001.00000002.3038358005.0000000002952000.00000004.00000020.00020000.00000000.sdmp, Phoneutil.exe, 00000001.00000003.1590867066.000000000295A000.00000004.00000020.00020000.00000000.sdmp, Phoneutil.exe, 00000001.00000003.1590893121.0000000002965000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.2516590266.000002295B85B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
      Source: svchost.exe, 00000006.00000002.3037254575.0000019EA0A00000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: HvHostWdiSystemHostScDeviceEnumWiaRpctrkwksAudioEndpointBuilderhidservdot3svcUmRdpServiceDsSvcfhsvcvmickvpexchangevmicshutdownvmicguestinterfacevmicvmsessionsvsvcStorSvcWwanSvcvmicvssDevQueryBrokerNgcSvcsysmainNetmanTabletInputServicePcaSvcDisplayEnhancementServiceIPxlatCfgSvcDeviceAssociationServiceNcbServiceEmbeddedModeSensorServicewlansvcCscServiceWPDBusEnumMixedRealityOpenXRSvc
      Source: svchost.exe, 00000006.00000002.3037540120.0000019EA0A64000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: (@SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000e1}
      Source: svchost.exe, 00000006.00000002.3037671589.0000019EA0B02000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#Disk&Ven_VMware&Prod_Virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}
      Source: svchost.exe, 00000006.00000002.3037572360.0000019EA0A7E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: @\\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}er
      Source: C:\Windows\SysWOW64\mfc110enu\Phoneutil.exeProcess information queried: ProcessInformationJump to behavior
      Source: C:\Windows\SysWOW64\mfc110enu\Phoneutil.exeQueries volume information: C:\ VolumeInformationJump to behavior
      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformationJump to behavior
      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm VolumeInformationJump to behavior
      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformationJump to behavior
      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformationJump to behavior
      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
      Source: C:\Windows\System32\svchost.exeQueries volume information: C: VolumeInformationJump to behavior
      Source: C:\Windows\System32\svchost.exeQueries volume information: C: VolumeInformationJump to behavior
      Source: C:\Windows\System32\svchost.exeQueries volume information: C: VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\task1.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

      Lowering of HIPS / PFW / Operating System Security Settings

      barindex
      Source: C:\Windows\System32\svchost.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center cvalJump to behavior
      Source: svchost.exe, 00000007.00000002.3038018799.00000154E0102000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: gramFiles%\Windows Defender\MsMpeng.exe
      Source: svchost.exe, 00000007.00000002.3038018799.00000154E0102000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
      Source: C:\Windows\System32\svchost.exeWMI Queries: IWbemServices::ExecNotificationQuery - ROOT\SecurityCenter : SELECT * FROM __InstanceOperationEvent WHERE TargetInstance ISA 'AntiVirusProduct' OR TargetInstance ISA 'FirewallProduct' OR TargetInstance ISA 'AntiSpywareProduct'
      Source: C:\Program Files\Windows Defender\MpCmdRun.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\SecurityCenter2 : AntiVirusProduct
      Source: C:\Program Files\Windows Defender\MpCmdRun.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\SecurityCenter2 : AntiVirusProduct

      Stealing of Sensitive Information

      barindex
      Source: Yara matchFile source: 00000000.00000002.1169283675.0000000002274000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.1169237913.0000000002260000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000001.00000002.3037538833.0000000000520000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000001.00000002.3037797456.0000000000561000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000001.00000002.3037700653.0000000000544000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
      Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
      Windows Management Instrumentation
      1
      DLL Side-Loading
      1
      Process Injection
      12
      Masquerading
      OS Credential Dumping41
      Security Software Discovery
      Remote ServicesData from Local System2
      Encrypted Channel
      Exfiltration Over Other Network MediumAbuse Accessibility Features
      CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
      DLL Side-Loading
      1
      Disable or Modify Tools
      LSASS Memory3
      Virtualization/Sandbox Evasion
      Remote Desktop ProtocolData from Removable Media1
      Non-Standard Port
      Exfiltration Over BluetoothNetwork Denial of Service
      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)3
      Virtualization/Sandbox Evasion
      Security Account Manager1
      Process Discovery
      SMB/Windows Admin SharesData from Network Shared Drive1
      Non-Application Layer Protocol
      Automated ExfiltrationData Encrypted for Impact
      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
      Process Injection
      NTDS1
      File and Directory Discovery
      Distributed Component Object ModelInput Capture12
      Application Layer Protocol
      Traffic DuplicationData Destruction
      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
      Hidden Files and Directories
      LSA Secrets23
      System Information Discovery
      SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
      DLL Side-Loading
      Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
      DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
      File Deletion
      DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet
      behaviorgraph top1 signatures2 2 Behavior Graph ID: 1645426 Sample: task1.exe Startdate: 21/03/2025 Architecture: WINDOWS Score: 96 32 Suricata IDS alerts for network traffic 2->32 34 Malicious sample detected (through community Yara rule) 2->34 36 Antivirus / Scanner detection for submitted sample 2->36 38 3 other signatures 2->38 7 task1.exe 6 2->7         started        10 svchost.exe 2->10         started        12 svchost.exe 1 1 2->12         started        15 4 other processes 2->15 process3 dnsIp4 40 Drops executables to the windows directory (C:\Windows) and starts them 7->40 42 Hides that the sample has been downloaded from the Internet (zone.identifier) 7->42 17 Phoneutil.exe 16 7->17         started        44 Changes security center settings (notifications, updates, antivirus, firewall) 10->44 20 MpCmdRun.exe 1 10->20         started        30 127.0.0.1 unknown unknown 12->30 signatures5 process6 dnsIp7 24 194.187.133.160, 443, 49735 IBGCBG Bulgaria 17->24 26 78.187.156.31, 80 TTNETTR Turkey 17->26 28 6 other IPs or domains 17->28 22 conhost.exe 20->22         started        process8

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      SourceDetectionScannerLabelLink
      task1.exe93%VirustotalBrowse
      task1.exe87%ReversingLabsWin32.Trojan.Emotet
      task1.exe100%AviraHEUR/AGEN.1344145
      No Antivirus matches
      No Antivirus matches
      No Antivirus matches
      SourceDetectionScannerLabelLink
      http://120.138.30.150:8080/TtO7iJKw/dmEUHo7CiLr/1HTG6mqcu959EIrb/GBEb45L/fYJUj/0%Avira URL Cloudsafe
      http://104.236.246.93:8080/NoX8/nA3NbJrYfWeYnk/O7oSRrY5VkVRcwq3/NfdRD0%Avira URL Cloudsafe
      http://104.236.246.93:8080/NoX8/nA3NbJrYfWeYnk/O7oSRrY5VkVRcwq3/XfvR0%Avira URL Cloudsafe
      http://74.219.172.26/PraWKy0XfLrY2h3/5eggl4Vw/aGVmFbV50uw0aihGiY/QQLBkeQEGQ5dK5A/_0%Avira URL Cloudsafe
      http://104.156.59.7:8080/4MpJIomdFS/AhgpOuUgBy4aHjgupB/eJJ1yfkvN/0%Avira URL Cloudsafe
      http://104.236.246.93:8080/NoX8/nA3NbJrYfWeYnk/O7oSRrY5VkVRcwq3/L0%Avira URL Cloudsafe
      http://104.236.246.93:8080/NoX8/nA3NbJrYfWeYnk/O7oSRrY5VkVRcwq3/0%Avira URL Cloudsafe
      http://104.236.246.93:8080/NoX8/nA3NbJrYfWeYnk/O7oSRrY5VkVRcwq3/J0%Avira URL Cloudsafe
      http://194.187.133.160:443/Y1pc/k0%Avira URL Cloudsafe
      http://104.156.59.7:8080/4MpJIomdFS/AhgpOuUgBy4aHjgupB/eJJ1yfkvN/qos.dll.mui20%Avira URL Cloudsafe
      http://134.209.36.254:8080/PSru9ZpnF8/uUf0InRShO48k/IHRU8CZof4tQ4U/3Mr3e/8vRhggsYnHk/G0%Avira URL Cloudsafe
      http://78.187.156.31/XvqTjPjgHoDJiEfG1x/fqlli/coXWK0DTo2MOHtU/knVHJI50waML6IMly/0cAOm/f80%Avira URL Cloudsafe
      http://194.187.133.160:443/Y1pc/ad8-9c31255dc46a0%Avira URL Cloudsafe
      https://194.187.133.160:443/Y1pc/0%Avira URL Cloudsafe
      http://104.156.59.7:8080/4MpJIomdFS/AhgpOuUgBy4aHjgupB/eJJ1yfkvN/XfvR0%Avira URL Cloudsafe
      http://78.187.156.31/XvqTjPjgHoDJiEfG1x/fqlli/coXWK0DTo2MOHtU/knVHJI50waML6IMly/0cAOm/X0%Avira URL Cloudsafe
      http://78.187.156.31/XvqTjPjgHoDJiEfG1x/fqlli/coXWK0DTo2MOHtU/knVHJI50waML6IMly/0cAOm/?0%Avira URL Cloudsafe
      http://74.219.172.26/PraWKy0XfLrY2h3/5eggl4Vw/aGVmFbV50uw0aihGiY/QQLBkeQEGQ5dK5A/30%Avira URL Cloudsafe
      http://194.187.133.160:443/Y1pc/0%Avira URL Cloudsafe
      http://74.219.172.26/PraWKy0XfLrY2h3/5eggl4Vw/aGVmFbV50uw0aihGiY/QQLBkeQEGQ5dK5A/0%Avira URL Cloudsafe
      http://134.209.36.254:8080/PSru9ZpnF8/uUf0InRShO48k/IHRU8CZof4tQ4U/3Mr3e/8vRhggsYnHk/rameters0%Avira URL Cloudsafe
      http://74.208.45.104:8080/1TdWM1Fg1DUOJc/G4zcJgHiN8HgM1c/IsSYYO9RXbHxbgBmWUp/0%Avira URL Cloudsafe
      http://74.219.172.26/PraWKy0XfLrY2h3/5eggl4Vw/aGVmFbV50uw0aihGiY/QQLBkeQEGQ5dK5A/q0%Avira URL Cloudsafe
      http://78.187.156.31/XvqTjPjgHoDJiEfG1x/fqlli/coXWK0DTo2MOHtU/knVHJI50waML6IMly/0cAOm/0%Avira URL Cloudsafe
      http://78.187.156.31/XvqTjPjgHoDJiEfG1x/fqlli/coXWK0DTo2MOHtU/knVHJI50waML6IMly/0cAOm/k0%Avira URL Cloudsafe
      http://104.236.246.93:8080/NoX8/nA3NbJrYfWeYnk/O7oSRrY5VkVRcwq3/3X0%Avira URL Cloudsafe
      http://134.209.36.254:8080/PSru9ZpnF8/uUf0InRShO48k/IHRU8CZof4tQ4U/3Mr3e/8vRhggsYnHk/0%Avira URL Cloudsafe
      http://194.187.133.160:443/Y1pc/50uw0aihGiY/QQLBkeQEGQ5dK5A/0%Avira URL Cloudsafe

      Download Network PCAP: filteredfull

      No contacted domains info
      NameMaliciousAntivirus DetectionReputation
      https://194.187.133.160:443/Y1pc/true
      • Avira URL Cloud: safe
      unknown
      NameSourceMaliciousAntivirus DetectionReputation
      http://120.138.30.150:8080/TtO7iJKw/dmEUHo7CiLr/1HTG6mqcu959EIrb/GBEb45L/fYJUj/Phoneutil.exe, 00000001.00000002.3038358005.0000000002952000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      https://dev.ditu.live.com/REST/v1/Routes/svchost.exe, 00000003.00000002.1365140186.000002552DE68000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.1364113934.000002552DE67000.00000004.00000020.00020000.00000000.sdmpfalse
        high
        http://104.236.246.93:8080/NoX8/nA3NbJrYfWeYnk/O7oSRrY5VkVRcwq3/NfdRDPhoneutil.exe, 00000001.00000003.2595522273.000000000065F000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        https://dev.virtualearth.net/REST/v1/Routes/Drivingsvchost.exe, 00000003.00000003.1364250688.000002552DE58000.00000004.00000020.00020000.00000000.sdmpfalse
          high
          https://t0.ssl.ak.dynamic.tiles.virtualearth.net/comp/gen.ashxsvchost.exe, 00000003.00000003.1364347295.000002552DE43000.00000004.00000020.00020000.00000000.sdmpfalse
            high
            http://104.236.246.93:8080/NoX8/nA3NbJrYfWeYnk/O7oSRrY5VkVRcwq3/XfvRPhoneutil.exe, 00000001.00000002.3037868279.000000000058E000.00000004.00000020.00020000.00000000.sdmp, Phoneutil.exe, 00000001.00000003.2595522273.000000000065F000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://74.219.172.26/PraWKy0XfLrY2h3/5eggl4Vw/aGVmFbV50uw0aihGiY/QQLBkeQEGQ5dK5A/_Phoneutil.exe, 00000001.00000002.3037868279.000000000058E000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://104.156.59.7:8080/4MpJIomdFS/AhgpOuUgBy4aHjgupB/eJJ1yfkvN/Phoneutil.exe, 00000001.00000003.2595481665.0000000002952000.00000004.00000020.00020000.00000000.sdmp, Phoneutil.exe, 00000001.00000002.3037868279.000000000058E000.00000004.00000020.00020000.00000000.sdmp, Phoneutil.exe, 00000001.00000003.2071543930.000000000065F000.00000004.00000020.00020000.00000000.sdmp, Phoneutil.exe, 00000001.00000002.3038358005.0000000002952000.00000004.00000020.00020000.00000000.sdmp, Phoneutil.exe, 00000001.00000003.2595522273.000000000065F000.00000004.00000020.00020000.00000000.sdmp, Phoneutil.exe, 00000001.00000003.2353142170.000000000065F000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://dev.virtualearth.net/REST/v1/Routes/Walkingsvchost.exe, 00000003.00000003.1364250688.000002552DE58000.00000004.00000020.00020000.00000000.sdmpfalse
              high
              https://g.live.com/odclientsettings/ProdV2.C:edb.log.2.dr, qmgr.db.2.drfalse
                high
                http://104.236.246.93:8080/NoX8/nA3NbJrYfWeYnk/O7oSRrY5VkVRcwq3/JPhoneutil.exe, 00000001.00000003.2595481665.0000000002952000.00000004.00000020.00020000.00000000.sdmp, Phoneutil.exe, 00000001.00000002.3038358005.0000000002952000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://194.187.133.160:443/Y1pc/kPhoneutil.exe, 00000001.00000003.2595481665.0000000002952000.00000004.00000020.00020000.00000000.sdmp, Phoneutil.exe, 00000001.00000002.3038358005.0000000002952000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://104.236.246.93:8080/NoX8/nA3NbJrYfWeYnk/O7oSRrY5VkVRcwq3/LPhoneutil.exe, 00000001.00000002.3037868279.000000000058E000.00000004.00000020.00020000.00000000.sdmp, Phoneutil.exe, 00000001.00000003.2595522273.000000000065F000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://104.236.246.93:8080/NoX8/nA3NbJrYfWeYnk/O7oSRrY5VkVRcwq3/Phoneutil.exe, 00000001.00000003.2595481665.0000000002952000.00000004.00000020.00020000.00000000.sdmp, Phoneutil.exe, 00000001.00000002.3037868279.000000000058E000.00000004.00000020.00020000.00000000.sdmp, Phoneutil.exe, 00000001.00000002.3038358005.0000000002952000.00000004.00000020.00020000.00000000.sdmp, Phoneutil.exe, 00000001.00000003.2595522273.000000000065F000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://104.156.59.7:8080/4MpJIomdFS/AhgpOuUgBy4aHjgupB/eJJ1yfkvN/qos.dll.mui2Phoneutil.exe, 00000001.00000003.2595481665.0000000002952000.00000004.00000020.00020000.00000000.sdmp, Phoneutil.exe, 00000001.00000002.3038358005.0000000002952000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://dev.ditu.live.com/mapcontrol/logging.ashxsvchost.exe, 00000003.00000003.1364250688.000002552DE58000.00000004.00000020.00020000.00000000.sdmpfalse
                  high
                  https://dev.ditu.live.com/REST/v1/Imagery/Copyright/svchost.exe, 00000003.00000002.1365056058.000002552DE44000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.1364155368.000002552DE62000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.1364031598.000002552DE6E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.1365122844.000002552DE63000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.1364250688.000002552DE58000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.1365158669.000002552DE70000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.1364313558.000002552DE5A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.1364347295.000002552DE43000.00000004.00000020.00020000.00000000.sdmpfalse
                    high
                    http://134.209.36.254:8080/PSru9ZpnF8/uUf0InRShO48k/IHRU8CZof4tQ4U/3Mr3e/8vRhggsYnHk/GPhoneutil.exe, 00000001.00000003.2595481665.0000000002952000.00000004.00000020.00020000.00000000.sdmp, Phoneutil.exe, 00000001.00000002.3038358005.0000000002952000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://g.live.com/odclientsettings/Prod.C:edb.log.2.dr, qmgr.db.2.drfalse
                      high
                      https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gri?pv=1&r=svchost.exe, 00000003.00000002.1365020747.000002552DE24000.00000004.00000020.00020000.00000000.sdmpfalse
                        high
                        https://g.live.com/odclientsettings/ProdV2edb.log.2.dr, qmgr.db.2.drfalse
                          high
                          https://dev.virtualearth.net/REST/v1/Transit/Schedules/svchost.exe, 00000003.00000002.1365020747.000002552DE24000.00000004.00000020.00020000.00000000.sdmpfalse
                            high
                            http://78.187.156.31/XvqTjPjgHoDJiEfG1x/fqlli/coXWK0DTo2MOHtU/knVHJI50waML6IMly/0cAOm/XPhoneutil.exe, 00000001.00000002.3038358005.0000000002952000.00000004.00000020.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://194.187.133.160:443/Y1pc/Phoneutil.exe, 00000001.00000002.3038358005.0000000002952000.00000004.00000020.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://78.187.156.31/XvqTjPjgHoDJiEfG1x/fqlli/coXWK0DTo2MOHtU/knVHJI50waML6IMly/0cAOm/?Phoneutil.exe, 00000001.00000002.3038358005.0000000002952000.00000004.00000020.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://104.156.59.7:8080/4MpJIomdFS/AhgpOuUgBy4aHjgupB/eJJ1yfkvN/XfvRPhoneutil.exe, 00000001.00000003.2071543930.000000000065F000.00000004.00000020.00020000.00000000.sdmp, Phoneutil.exe, 00000001.00000003.2353142170.000000000065F000.00000004.00000020.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://194.187.133.160:443/Y1pc/ad8-9c31255dc46aPhoneutil.exe, 00000001.00000002.3038358005.0000000002930000.00000004.00000020.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://78.187.156.31/XvqTjPjgHoDJiEfG1x/fqlli/coXWK0DTo2MOHtU/knVHJI50waML6IMly/0cAOm/f8Phoneutil.exe, 00000001.00000002.3037868279.000000000058E000.00000004.00000020.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://www.bingmapsportal.comsvchost.exe, 00000003.00000002.1365020747.000002552DE24000.00000004.00000020.00020000.00000000.sdmpfalse
                              high
                              https://dev.virtualearth.net/REST/v1/Imagery/Copyright/svchost.exe, 00000003.00000003.1364155368.000002552DE62000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.1365020747.000002552DE24000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.1365122844.000002552DE63000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.1364250688.000002552DE58000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.1364313558.000002552DE5A000.00000004.00000020.00020000.00000000.sdmpfalse
                                high
                                http://74.219.172.26/PraWKy0XfLrY2h3/5eggl4Vw/aGVmFbV50uw0aihGiY/QQLBkeQEGQ5dK5A/3Phoneutil.exe, 00000001.00000002.3037868279.000000000058E000.00000004.00000020.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                https://g.live.com/1rewlive5skydrive/OneDriveProductionV2?OneDriveUpdate=9c123752e31a927b78dc96231b6svchost.exe, 00000002.00000003.1203802155.000002295BAC2000.00000004.00000800.00020000.00000000.sdmp, edb.log.2.dr, qmgr.db.2.drfalse
                                  high
                                  https://ecn.dev.virtualearth.net/REST/v1/Imagery/Copyright/svchost.exe, 00000003.00000002.1365020747.000002552DE24000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.1365140186.000002552DE68000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.1364113934.000002552DE67000.00000004.00000020.00020000.00000000.sdmpfalse
                                    high
                                    https://dynamic.t0.tiles.ditu.live.com/comp/gen.ashxsvchost.exe, 00000003.00000003.1364250688.000002552DE58000.00000004.00000020.00020000.00000000.sdmpfalse
                                      high
                                      https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdv?pv=1&r=svchost.exe, 00000003.00000003.1364233034.000002552DE5D000.00000004.00000020.00020000.00000000.sdmpfalse
                                        high
                                        https://dev.ditu.live.com/REST/v1/Transit/Stops/svchost.exe, 00000003.00000002.1365175140.000002552DE76000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.1363965865.000002552DE74000.00000004.00000020.00020000.00000000.sdmpfalse
                                          high
                                          http://74.219.172.26/PraWKy0XfLrY2h3/5eggl4Vw/aGVmFbV50uw0aihGiY/QQLBkeQEGQ5dK5A/Phoneutil.exe, 00000001.00000003.2595481665.0000000002952000.00000004.00000020.00020000.00000000.sdmp, Phoneutil.exe, 00000001.00000002.3038358005.0000000002952000.00000004.00000020.00020000.00000000.sdmpfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          https://dev.virtualearth.net/REST/v1/Routes/svchost.exe, 00000003.00000002.1365020747.000002552DE24000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.1365140186.000002552DE68000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.1364113934.000002552DE67000.00000004.00000020.00020000.00000000.sdmpfalse
                                            high
                                            https://dev.virtualearth.net/REST/v1/Traffic/Incidents/svchost.exe, 00000003.00000003.1364155368.000002552DE62000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.1365020747.000002552DE24000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.1365122844.000002552DE63000.00000004.00000020.00020000.00000000.sdmpfalse
                                              high
                                              http://134.209.36.254:8080/PSru9ZpnF8/uUf0InRShO48k/IHRU8CZof4tQ4U/3Mr3e/8vRhggsYnHk/rametersPhoneutil.exe, 00000001.00000002.3037868279.000000000058E000.00000004.00000020.00020000.00000000.sdmpfalse
                                              • Avira URL Cloud: safe
                                              unknown
                                              https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdi?pv=1&r=svchost.exe, 00000003.00000003.1364347295.000002552DE43000.00000004.00000020.00020000.00000000.sdmpfalse
                                                high
                                                https://dynamic.api.tiles.ditu.live.com/odvs/gri?pv=1&r=svchost.exe, 00000003.00000002.1365056058.000002552DE44000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.1364347295.000002552DE43000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.1364211336.000002552DE5E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                  high
                                                  http://crl.ver)svchost.exe, 00000002.00000002.2516522131.000002295B800000.00000004.00000020.00020000.00000000.sdmpfalse
                                                    high
                                                    https://dev.virtualearth.net/webservices/v1/LoggingService/LoggingService.svc/Log?svchost.exe, 00000003.00000002.1365056058.000002552DE44000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.1364155368.000002552DE62000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.1365122844.000002552DE63000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.1364347295.000002552DE43000.00000004.00000020.00020000.00000000.sdmpfalse
                                                      high
                                                      https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gd?pv=1&r=svchost.exe, 00000003.00000003.1364347295.000002552DE43000.00000004.00000020.00020000.00000000.sdmpfalse
                                                        high
                                                        https://ecn.dev.virtualearth.net/REST/V1/MapControlConfiguration/native/svchost.exe, 00000003.00000003.1363948269.000002552DE35000.00000004.00000020.00020000.00000000.sdmpfalse
                                                          high
                                                          https://dev.virtualearth.net/REST/v1/Locationssvchost.exe, 00000003.00000003.1364250688.000002552DE58000.00000004.00000020.00020000.00000000.sdmpfalse
                                                            high
                                                            http://104.236.246.93:8080/NoX8/nA3NbJrYfWeYnk/O7oSRrY5VkVRcwq3/3XPhoneutil.exe, 00000001.00000003.2595481665.0000000002952000.00000004.00000020.00020000.00000000.sdmp, Phoneutil.exe, 00000001.00000002.3038358005.0000000002952000.00000004.00000020.00020000.00000000.sdmpfalse
                                                            • Avira URL Cloud: safe
                                                            unknown
                                                            https://dev.ditu.live.com/REST/V1/MapControlConfiguration/native/svchost.exe, 00000003.00000003.1364250688.000002552DE58000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.1365087195.000002552DE59000.00000004.00000020.00020000.00000000.sdmpfalse
                                                              high
                                                              https://dev.virtualearth.net/mapcontrol/logging.ashxsvchost.exe, 00000003.00000003.1364250688.000002552DE58000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                high
                                                                http://74.208.45.104:8080/1TdWM1Fg1DUOJc/G4zcJgHiN8HgM1c/IsSYYO9RXbHxbgBmWUp/Phoneutil.exe, 00000001.00000002.3038358005.0000000002952000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                • Avira URL Cloud: safe
                                                                unknown
                                                                http://78.187.156.31/XvqTjPjgHoDJiEfG1x/fqlli/coXWK0DTo2MOHtU/knVHJI50waML6IMly/0cAOm/kPhoneutil.exe, 00000001.00000002.3038358005.0000000002952000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                • Avira URL Cloud: safe
                                                                unknown
                                                                http://134.209.36.254:8080/PSru9ZpnF8/uUf0InRShO48k/IHRU8CZof4tQ4U/3Mr3e/8vRhggsYnHk/Phoneutil.exe, 00000001.00000003.1830802025.000000000065F000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                • Avira URL Cloud: safe
                                                                unknown
                                                                http://78.187.156.31/XvqTjPjgHoDJiEfG1x/fqlli/coXWK0DTo2MOHtU/knVHJI50waML6IMly/0cAOm/Phoneutil.exe, 00000001.00000002.3037868279.000000000058E000.00000004.00000020.00020000.00000000.sdmp, Phoneutil.exe, 00000001.00000002.3038358005.0000000002952000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                • Avira URL Cloud: safe
                                                                unknown
                                                                https://dynamic.api.tiles.ditu.live.com/odvs/gdi?pv=1&r=svchost.exe, 00000003.00000002.1365020747.000002552DE24000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                  high
                                                                  https://dynamic.tsvchost.exe, 00000003.00000003.1364379404.000002552DE33000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                    high
                                                                    https://g.live.com/odclientsettings/ProdV2?OneDriveUpdate=f359a5df14f97b6802371976c96svchost.exe, 00000002.00000003.1203802155.000002295BAC2000.00000004.00000800.00020000.00000000.sdmp, edb.log.2.drfalse
                                                                      high
                                                                      https://dev.virtualearth.net/REST/v1/Routes/Transitsvchost.exe, 00000003.00000003.1364250688.000002552DE58000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                        high
                                                                        https://t0.ssl.ak.tiles.virtualearth.net/tiles/gensvchost.exe, 00000003.00000003.1364250688.000002552DE58000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                          high
                                                                          http://194.187.133.160:443/Y1pc/50uw0aihGiY/QQLBkeQEGQ5dK5A/Phoneutil.exe, 00000001.00000003.2595481665.000000000293B000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                          • Avira URL Cloud: safe
                                                                          unknown
                                                                          https://tiles.virtualearth.net/tiles/cmd/StreetSideBubbleMetaData?north=svchost.exe, 00000003.00000003.1364250688.000002552DE58000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.1365087195.000002552DE59000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                            high
                                                                            https://dynamic.api.tiles.ditu.live.com/odvs/gdv?pv=1&r=svchost.exe, 00000003.00000003.1364155368.000002552DE62000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.1365122844.000002552DE63000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                              high
                                                                              http://104.236.246.93:8080/NoX8/nA3NbJrYfWeYnk/O7oSRrY5VkVRcwq3/lPhoneutil.exe, 00000001.00000003.2595481665.0000000002952000.00000004.00000020.00020000.00000000.sdmp, Phoneutil.exe, 00000001.00000002.3038358005.0000000002952000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                unknown
                                                                                http://74.219.172.26/PraWKy0XfLrY2h3/5eggl4Vw/aGVmFbV50uw0aihGiY/QQLBkeQEGQ5dK5A/qPhoneutil.exe, 00000001.00000002.3037868279.000000000058E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                • Avira URL Cloud: safe
                                                                                unknown
                                                                                https://dev.ditu.live.com/REST/v1/Locationssvchost.exe, 00000003.00000003.1364250688.000002552DE58000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                  high
                                                                                  https://dynamic.api.tiles.ditu.live.com/odvs/gd?pv=1&r=svchost.exe, 00000003.00000003.1363948269.000002552DE35000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                    high
                                                                                    • No. of IPs < 25%
                                                                                    • 25% < No. of IPs < 50%
                                                                                    • 50% < No. of IPs < 75%
                                                                                    • 75% < No. of IPs
                                                                                    IPDomainCountryFlagASNASN NameMalicious
                                                                                    74.208.45.104
                                                                                    unknownUnited States
                                                                                    8560ONEANDONE-ASBrauerstrasse48DEfalse
                                                                                    104.156.59.7
                                                                                    unknownUnited States
                                                                                    29802HVC-ASUSfalse
                                                                                    104.236.246.93
                                                                                    unknownUnited States
                                                                                    14061DIGITALOCEAN-ASNUSfalse
                                                                                    120.138.30.150
                                                                                    unknownNew Zealand
                                                                                    45179SITEHOST-AS-APSiteHostNewZealandNZfalse
                                                                                    78.187.156.31
                                                                                    unknownTurkey
                                                                                    9121TTNETTRfalse
                                                                                    74.219.172.26
                                                                                    unknownUnited States
                                                                                    5787SNAPONSBSUSfalse
                                                                                    194.187.133.160
                                                                                    unknownBulgaria
                                                                                    13124IBGCBGtrue
                                                                                    134.209.36.254
                                                                                    unknownUnited States
                                                                                    14061DIGITALOCEAN-ASNUSfalse
                                                                                    IP
                                                                                    127.0.0.1
                                                                                    Joe Sandbox version:42.0.0 Malachite
                                                                                    Analysis ID:1645426
                                                                                    Start date and time:2025-03-21 18:37:29 +01:00
                                                                                    Joe Sandbox product:CloudBasic
                                                                                    Overall analysis duration:0h 5m 25s
                                                                                    Hypervisor based Inspection enabled:false
                                                                                    Report type:full
                                                                                    Cookbook file name:default.jbs
                                                                                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 134, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                                    Run name:Run with higher sleep bypass
                                                                                    Number of analysed new started processes analysed:12
                                                                                    Number of new started drivers analysed:0
                                                                                    Number of existing processes analysed:0
                                                                                    Number of existing drivers analysed:0
                                                                                    Number of injected processes analysed:0
                                                                                    Technologies:
                                                                                    • EGA enabled
                                                                                    • AMSI enabled
                                                                                    Analysis Mode:default
                                                                                    Analysis stop reason:Timeout
                                                                                    Sample name:task1.exe
                                                                                    Detection:MAL
                                                                                    Classification:mal96.troj.evad.winEXE@12/6@0/9
                                                                                    Cookbook Comments:
                                                                                    • Found application associated with file extension: .exe
                                                                                    • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
                                                                                    • Sleep loops longer than 100000000ms are bypassed. Single calls with delay of 100000000ms and higher are ignored
                                                                                    • Exclude process from analysis (whitelisted): WMIADAP.exe, SIHClient.exe
                                                                                    • Excluded IPs from analysis (whitelisted): 184.31.69.3, 4.245.163.56
                                                                                    • Excluded domains from analysis (whitelisted): fs.microsoft.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, prod.fs.microsoft.com.akadns.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, e16604.dscf.akamaiedge.net, fe3cr.delivery.mp.microsoft.com
                                                                                    • Not all processes where analyzed, report is missing behavior information
                                                                                    • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                                    • Report size getting too big, too many NtQueryValueKey calls found.
                                                                                    No simulations
                                                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                    74.208.45.104ExeFile (360).exeGet hashmaliciousEmotetBrowse
                                                                                    • 74.208.45.104:8080/ejCfJvV1/kxVOd5S1eQMg5w/THuO0hNhX41BMsZAJU/
                                                                                    ExeFile (171).exeGet hashmaliciousEmotetBrowse
                                                                                    • 74.208.45.104:8080/ALHMRa7xicKFbwhA/HWuLqz/cMnHtcll/bM8JHrn3ZedwY/2TCs/
                                                                                    LisectAVT_2403002B_302.exeGet hashmaliciousBdaejec, EmotetBrowse
                                                                                    • 74.208.45.104:8080/jVE55GR1H8h6Yyd/p9OBh8mJyrX3QNpHWY/
                                                                                    104.156.59.7ExeFile (360).exeGet hashmaliciousEmotetBrowse
                                                                                    • 104.156.59.7:8080/FLhkn5FxBNj/8yJJGMkkOjbevD3VkJc/chiAEdV6SWHfxYU9F5L/ueCJ8/
                                                                                    104.236.246.93ExeFile (360).exeGet hashmaliciousEmotetBrowse
                                                                                    • 104.236.246.93:8080/k8c81KX7QFFfrFTdR/7RU5TsLAyuI8jjWiQtR/
                                                                                    ExeFile (226).exeGet hashmaliciousEmotetBrowse
                                                                                    • 104.236.246.93:8080/9FGnVHN1/
                                                                                    ExeFile (106).exeGet hashmaliciousEmotetBrowse
                                                                                    • 104.236.246.93:8080/i8R0R9KvvlHBj/k4b2PKkjbuti0/
                                                                                    No context
                                                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                    ONEANDONE-ASBrauerstrasse48DEwjfOfXh.exe1.exeGet hashmaliciousUnknownBrowse
                                                                                    • 212.227.64.208
                                                                                    Payment-Advice-0003003998e009-PDF.exeGet hashmaliciousFormBookBrowse
                                                                                    • 217.160.0.135
                                                                                    RFQ - MAWARIS-025.jsGet hashmaliciousFormBookBrowse
                                                                                    • 74.208.236.36
                                                                                    FG_ShippingNotice_20250310_XDGF.exeGet hashmaliciousFormBookBrowse
                                                                                    • 217.160.0.135
                                                                                    nabm68k.elfGet hashmaliciousUnknownBrowse
                                                                                    • 217.174.240.153
                                                                                    Open-Bonida Unterlagen Schweiz.pdf.lnkGet hashmaliciousGuLoaderBrowse
                                                                                    • 217.160.0.213
                                                                                    ICSCertifikat153609921.exeGet hashmaliciousFormBookBrowse
                                                                                    • 217.160.0.250
                                                                                    Certifikat_153600814.exeGet hashmaliciousFormBookBrowse
                                                                                    • 217.160.0.250
                                                                                    https://www.villanaxamena.comGet hashmaliciousUnknownBrowse
                                                                                    • 217.160.0.211
                                                                                    HVC-ASUSwjfOfXh.exe1.exeGet hashmaliciousUnknownBrowse
                                                                                    • 194.126.173.158
                                                                                    awb_dhl_Express_documents_delivery_20_03_2025_0000000-pdf.batGet hashmaliciousBatch InjectorBrowse
                                                                                    • 206.123.152.100
                                                                                    resgod.arm7.elfGet hashmaliciousMiraiBrowse
                                                                                    • 46.21.151.161
                                                                                    z93awb_DHL_Expr.batGet hashmaliciousBatch Injector, XWormBrowse
                                                                                    • 206.123.152.104
                                                                                    https://customervoice.microsoft.com/Pages/ResponsePage.aspx?id=r3yI_dSxOEiPJ_sFtWv0u-et2ubyS_1IvjO44TlrG4RUNU4xQUtYREpWQVhXSzJWUVMxMkwySkhRUS4uGet hashmaliciousHTMLPhisherBrowse
                                                                                    • 23.227.199.49
                                                                                    ProctorU.1.30.win.07.exeGet hashmaliciousUnknownBrowse
                                                                                    • 66.165.234.62
                                                                                    ProctorU.1.30.win.07.exeGet hashmaliciousUnknownBrowse
                                                                                    • 66.165.234.62
                                                                                    DIGITALOCEAN-ASNUSwjfOfXh.exe1.exeGet hashmaliciousUnknownBrowse
                                                                                    • 134.209.224.96
                                                                                    ht-jupit.elfGet hashmaliciousPoseidonBrowse
                                                                                    • 142.93.165.203
                                                                                    ulinux-logs.elfGet hashmaliciousPoseidonBrowse
                                                                                    • 161.35.85.95
                                                                                    http://t.dripemail2.com/c/eyJhbGciOiJIUzI1NiJ9.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.nJ9tzd3-jhbWgSNwRLHamHKYwZXuNcZIG2E1QBFM5fgGet hashmaliciousHTMLPhisherBrowse
                                                                                    • 162.243.170.173
                                                                                    resgod.arm.elfGet hashmaliciousMiraiBrowse
                                                                                    • 46.101.242.253
                                                                                    resgod.mips.elfGet hashmaliciousMiraiBrowse
                                                                                    • 134.209.166.100
                                                                                    message_v2.zipGet hashmaliciousUnknownBrowse
                                                                                    • 157.245.72.142
                                                                                    i686.elfGet hashmaliciousMiraiBrowse
                                                                                    • 157.230.180.187
                                                                                    i486.elfGet hashmaliciousMiraiBrowse
                                                                                    • 165.227.55.112
                                                                                    TTNETTRPayment Confirmation pdf.pif.exeGet hashmaliciousXWormBrowse
                                                                                    • 88.255.216.16
                                                                                    resgod.m68k.elfGet hashmaliciousMiraiBrowse
                                                                                    • 78.166.117.141
                                                                                    hoho.m68k.elfGet hashmaliciousUnknownBrowse
                                                                                    • 81.213.113.140
                                                                                    hoho.sh4.elfGet hashmaliciousUnknownBrowse
                                                                                    • 85.108.147.91
                                                                                    Nyx4r.ppc.elfGet hashmaliciousOkiruBrowse
                                                                                    • 88.242.96.225
                                                                                    yarn.elfGet hashmaliciousUnknownBrowse
                                                                                    • 78.178.77.147
                                                                                    sshdGet hashmaliciousUnknownBrowse
                                                                                    • 78.166.135.183
                                                                                    jkse.arm.elfGet hashmaliciousUnknownBrowse
                                                                                    • 78.172.128.125
                                                                                    jkse.mips.elfGet hashmaliciousUnknownBrowse
                                                                                    • 88.255.23.158
                                                                                    SITEHOST-AS-APSiteHostNewZealandNZhttp://novacola.co.nz/Get hashmaliciousUnknownBrowse
                                                                                    • 103.250.232.121
                                                                                    la.bot.arm5.elfGet hashmaliciousMiraiBrowse
                                                                                    • 103.197.54.248
                                                                                    ExeFile (317).exeGet hashmaliciousEmotetBrowse
                                                                                    • 120.138.30.150
                                                                                    ExeFile (360).exeGet hashmaliciousEmotetBrowse
                                                                                    • 120.138.30.150
                                                                                    ExeFile (356).exeGet hashmaliciousEmotetBrowse
                                                                                    • 120.138.30.150
                                                                                    ExeFile (196).exeGet hashmaliciousEmotetBrowse
                                                                                    • 120.138.30.150
                                                                                    7j5Y0VWRZH.elfGet hashmaliciousMiraiBrowse
                                                                                    • 223.165.64.29
                                                                                    No context
                                                                                    No context
                                                                                    Process:C:\Windows\System32\svchost.exe
                                                                                    File Type:data
                                                                                    Category:dropped
                                                                                    Size (bytes):8192
                                                                                    Entropy (8bit):0.363788168458258
                                                                                    Encrypted:false
                                                                                    SSDEEP:6:6xPoaaD0JOCEfMuaaD0JOCEfMKQmDNOxPoaaD0JOCEfMuaaD0JOCEfMKQmDN:1aaD0JcaaD0JwQQbaaD0JcaaD0JwQQ
                                                                                    MD5:0E72F896C84F1457C62C0E20338FAC0D
                                                                                    SHA1:9C071CC3D15E5BD8BF603391AE447202BD9F8537
                                                                                    SHA-256:686DC879EA8690C42D3D5D10D0148AE7110FA4D8DCCBF957FB8E41EE3D4A42B3
                                                                                    SHA-512:AAA5BE088708DABC2EC9A7A6632BDF5700BE719D3F72B732BD2DFD1A3CFDD5C8884BFA4951DB0C499AF423EC30B14A49A30FBB831D1B0A880FE10053043A4251
                                                                                    Malicious:false
                                                                                    Reputation:moderate, very likely benign file
                                                                                    Preview:*.>...........&.....D./..;...{..................C:\ProgramData\Microsoft\Network\Downloader\.........................................................................................................................................................................................................................C:\ProgramData\Microsoft\Network\Downloader\..........................................................................................................................................................................................................................0u..................@...@......................................................&.............................................................................................................................................................................................................................................................................................................................................................
                                                                                    Process:C:\Windows\System32\svchost.exe
                                                                                    File Type:data
                                                                                    Category:dropped
                                                                                    Size (bytes):1310720
                                                                                    Entropy (8bit):1.3108010974877788
                                                                                    Encrypted:false
                                                                                    SSDEEP:3072:5JCnRjDxImmaooCEYhlOe2Pp4mH45l6MFXDaFXpVv1L0Inc4lfEnogVsiJKrvrb:KooCEYhgYEL0In
                                                                                    MD5:38AB81BA5F250686ABD1F5EF6D62C761
                                                                                    SHA1:572C24B55135257284021551389DAD9582FA0FA1
                                                                                    SHA-256:38F7210CCA6CE3D7C063849F9CF9DF36681EB211D8B21BCA448A6D1DA477E0EA
                                                                                    SHA-512:008EAE656738E2DB46FB52636569C5A48D5623E464FE921C7A36491167C340C39B1900E28250470C2DA67C4D68AB8F8FE142AF376B47134CF0EFCC21C30155ED
                                                                                    Malicious:false
                                                                                    Preview:z3..........@..@.;...{..................<...D./..;...{..................C:\ProgramData\Microsoft\Network\Downloader\.........................................................................................................................................................................................................................C:\ProgramData\Microsoft\Network\Downloader\..........................................................................................................................................................................................................................0u..................@...@..........................................#.................................................................................................................................................................................................................................................................................................................................................
                                                                                    Process:C:\Windows\System32\svchost.exe
                                                                                    File Type:Extensible storage engine DataBase, version 0x620, checksum 0x5c342e25, page size 16384, Windows version 10.0
                                                                                    Category:dropped
                                                                                    Size (bytes):1310720
                                                                                    Entropy (8bit):0.42221816916691596
                                                                                    Encrypted:false
                                                                                    SSDEEP:1536:3SB2ESB2SSjlK/uedMrSU0OrsJzvqYkr3g16f2UPkLk+ku4/Iw4KKazAkUk1k2DO:3azag03A2UrzJDO
                                                                                    MD5:B69FF28EAA750526543C4E559ECEB993
                                                                                    SHA1:BACEBF6F2C14571840B4525C7EE1BEB4C2FD363C
                                                                                    SHA-256:E34D2765E38E5C56F2AB0F1B72A3EDD284F5C912333239126CBD8771FFD6786C
                                                                                    SHA-512:F170DF8D0E04F5E08F1A948A2DFD6A47C3A6DB7867B0CE446498F095B8A8E2E15842789E5A412DB9FA2EBFF4C7E201C53B2D493D663CE757202E4214896AB5BE
                                                                                    Malicious:false
                                                                                    Preview:\4.%... .......Y.......X\...;...{......................n.%.....'(...}...&...}..h.#.....'(...}..n.%.........D./..;...{..........................................................................................................eJ......n....@...................................................................................................... ............................................................................................................................................................................................................2...{......................................'(...}..................g.W'(...}...........................#......n.%.....................................................................................................................................................................................................................................................................................................................................................
                                                                                    Process:C:\Windows\System32\svchost.exe
                                                                                    File Type:data
                                                                                    Category:dropped
                                                                                    Size (bytes):16384
                                                                                    Entropy (8bit):0.07973565865984586
                                                                                    Encrypted:false
                                                                                    SSDEEP:3:WzPmlltOetYeOtmTwmRl//WJoYSjVZbT/Z/l/UOJIl//ollOE/tlnl+/rTc:Wjm1rzaI+JoxZbLBlDYApMP
                                                                                    MD5:04D21411F2C7F924FD37A9FA7271D3C6
                                                                                    SHA1:C06C5936B86D6BA5D1B5630C1C083CB2021EFB0C
                                                                                    SHA-256:A914EB156013FB766A517DA4A476E7212FFD69A3F04D00A71F96553EFD45DA99
                                                                                    SHA-512:D9073DEF0461C656E616468AB44874FC5CDEC3F0D46733CFEACAC4A1CF1E28F23C76FAC75704FC6765FDBC1E685D0F04AE54295DA8F9B2716A50C156076264AD
                                                                                    Malicious:false
                                                                                    Preview:.........................................;...{...&...}..'(...}..........'(...}..'(...}..:..<'(...}...................g.W'(...}..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                    Process:C:\Windows\System32\svchost.exe
                                                                                    File Type:JSON data
                                                                                    Category:dropped
                                                                                    Size (bytes):55
                                                                                    Entropy (8bit):4.306461250274409
                                                                                    Encrypted:false
                                                                                    SSDEEP:3:YDQRWu83XfAw2fHbY:YMRl83Xt2f7Y
                                                                                    MD5:DCA83F08D448911A14C22EBCACC5AD57
                                                                                    SHA1:91270525521B7FE0D986DB19747F47D34B6318AD
                                                                                    SHA-256:2B4B2D4A06044AD0BD2AE3287CFCBECD90B959FEB2F503AC258D7C0A235D6FE9
                                                                                    SHA-512:96F3A02DC4AE302A30A376FC7082002065C7A35ECB74573DE66254EFD701E8FD9E9D867A2C8ABEB4C482738291B715D4965A0D2412663FDF1EE6CBC0BA9FBACA
                                                                                    Malicious:false
                                                                                    Preview:{"fontSetUri":"fontset-2017-04.json","baseUri":"fonts"}
                                                                                    Process:C:\Program Files\Windows Defender\MpCmdRun.exe
                                                                                    File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                                    Category:modified
                                                                                    Size (bytes):7388
                                                                                    Entropy (8bit):3.241685106263244
                                                                                    Encrypted:false
                                                                                    SSDEEP:96:cEi+AAsoJjykzEJ+AAsoJjykHEz+AAsoJjykJ:cN+SoJbO+SoJvo+SoJB
                                                                                    MD5:B8692765CEAEC2D313ADA3C3BF526249
                                                                                    SHA1:725651D048A77B09E59444A4EAD746E23E8CBCD0
                                                                                    SHA-256:CF21137069F03E61E202666665C4A20E13CA2C9FD2B6BD32F8CA93A5E97FC094
                                                                                    SHA-512:1C5E4FC34D3EF0BCFF579D19A36E2B29DD9309C2E7005044BA9374D976D6D1CD637E389659359224E9645C9B1D7CCE6D5B12A0BF12273C4D70C6CB43768D21CB
                                                                                    Malicious:false
                                                                                    Preview:..........-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.....M.p.C.m.d.R.u.n.:. .C.o.m.m.a.n.d. .L.i.n.e.:. .".C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.W.i.n.d.o.w.s. .D.e.f.e.n.d.e.r.\.m.p.c.m.d.r.u.n...e.x.e.". .-.w.d.e.n.a.b.l.e..... .S.t.a.r.t. .T.i.m.e.:. .. W.e.d. .. O.c.t. .. 0.4. .. 2.0.2.3. .1.2.:.0.3.:.4.2.........M.p.E.n.s.u.r.e.P.r.o.c.e.s.s.M.i.t.i.g.a.t.i.o.n.P.o.l.i.c.y.:. .h.r. .=. .0.x.1.....W.D.E.n.a.b.l.e.....*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*. .W.S.C. .S.t.a.t.e. .I.n.f.o. .*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.....*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*. .A.n.t.i.V.i.r.u.s.P.r.o.d.u.c.t. .*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.....d.i.s.p.l.a.y.N.a.m.e. .=. .[.W.i.n.d.o.w.s. .D.e.f.e.n.d.e.r.].....p.a.t.h.T.o.S.i.g.n.e.d.P.r.o.d.u.c.t.E.x.e. .=. .[.w.i.n.d.o.w.s.d.
                                                                                    File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                    Entropy (8bit):6.618160178953395
                                                                                    TrID:
                                                                                    • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                                    • Generic Win/DOS Executable (2004/3) 0.02%
                                                                                    • DOS Executable Generic (2002/1) 0.02%
                                                                                    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                                    File name:task1.exe
                                                                                    File size:192'512 bytes
                                                                                    MD5:2ba73d2d47cf2d388446b781613b7eff
                                                                                    SHA1:c75c7eb4814835388881d1b4c2db67e64a023e1e
                                                                                    SHA256:06c6442d5bb110140ac1cdbcf1be52388441b9a0750d59b743acc6b52d19582b
                                                                                    SHA512:667ddc16765d8c3c3596bb734174862db1f2ac24037c361a2e37ec9824c35a8926728400025d62c62c361b1b1e1a9d1e3b4c38c2c5989eee832e083481e50caa
                                                                                    SSDEEP:3072:0O7Mn+0UNzRqN7GZDA62KrcNaQV/7T9kSjkltZJmHcPz6HEJE:kUGJeD8HVOSqBmHbk
                                                                                    TLSH:9F14AE85F9D641F5D63A223204AF77729635ED7A4F21C7D7A394EE2D183608098333AE
                                                                                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........N..P/m.P/m.P/m.20~.^/m..3c.Q/m..0g.[/m.P/l.7-m..3o.A/m.P/m._/m..0f.D/m..)k.Q/m..0i.W/m.RichP/m.........................PE..L..
                                                                                    Icon Hash:0715150763697373
                                                                                    Entrypoint:0x412496
                                                                                    Entrypoint Section:.text
                                                                                    Digitally signed:false
                                                                                    Imagebase:0x400000
                                                                                    Subsystem:windows gui
                                                                                    Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                                                                                    DLL Characteristics:
                                                                                    Time Stamp:0x5F61EF7F [Wed Sep 16 10:57:03 2020 UTC]
                                                                                    TLS Callbacks:
                                                                                    CLR (.Net) Version:
                                                                                    OS Version Major:4
                                                                                    OS Version Minor:0
                                                                                    File Version Major:4
                                                                                    File Version Minor:0
                                                                                    Subsystem Version Major:4
                                                                                    Subsystem Version Minor:0
                                                                                    Import Hash:83979e8c69e0e822b76e7d828bc42612
                                                                                    Instruction
                                                                                    push ebp
                                                                                    mov ebp, esp
                                                                                    push FFFFFFFFh
                                                                                    push 00416028h
                                                                                    push 00412628h
                                                                                    mov eax, dword ptr fs:[00000000h]
                                                                                    push eax
                                                                                    mov dword ptr fs:[00000000h], esp
                                                                                    sub esp, 68h
                                                                                    push ebx
                                                                                    push esi
                                                                                    push edi
                                                                                    mov dword ptr [ebp-18h], esp
                                                                                    xor ebx, ebx
                                                                                    mov dword ptr [ebp-04h], ebx
                                                                                    push 00000002h
                                                                                    call dword ptr [004147BCh]
                                                                                    pop ecx
                                                                                    or dword ptr [0041BF48h], FFFFFFFFh
                                                                                    or dword ptr [0041BF4Ch], FFFFFFFFh
                                                                                    call dword ptr [004147B8h]
                                                                                    mov ecx, dword ptr [0041BF3Ch]
                                                                                    mov dword ptr [eax], ecx
                                                                                    call dword ptr [004147B4h]
                                                                                    mov ecx, dword ptr [0041BF38h]
                                                                                    mov dword ptr [eax], ecx
                                                                                    mov eax, dword ptr [004147B0h]
                                                                                    mov eax, dword ptr [eax]
                                                                                    mov dword ptr [0041BF44h], eax
                                                                                    call 00007F00107C4E07h
                                                                                    cmp dword ptr [0041AD18h], ebx
                                                                                    jne 00007F00107C4CEEh
                                                                                    push 00412624h
                                                                                    call dword ptr [004147ACh]
                                                                                    pop ecx
                                                                                    call 00007F00107C4DD9h
                                                                                    push 0041A070h
                                                                                    push 0041A06Ch
                                                                                    call 00007F00107C4DC4h
                                                                                    mov eax, dword ptr [0041BF34h]
                                                                                    mov dword ptr [ebp-6Ch], eax
                                                                                    lea eax, dword ptr [ebp-6Ch]
                                                                                    push eax
                                                                                    push dword ptr [0041BF30h]
                                                                                    lea eax, dword ptr [ebp-64h]
                                                                                    push eax
                                                                                    lea eax, dword ptr [ebp-70h]
                                                                                    push eax
                                                                                    lea eax, dword ptr [ebp-60h]
                                                                                    push eax
                                                                                    call dword ptr [004147A4h]
                                                                                    push 0041A068h
                                                                                    push 0041A000h
                                                                                    call 00007F00107C4D91h
                                                                                    Programming Language:
                                                                                    • [ C ] VS98 (6.0) build 8168
                                                                                    • [IMP] VS97 (5.0) SP3 link 5.10.7303
                                                                                    • [C++] VS98 (6.0) build 8168
                                                                                    • [RES] VS98 (6.0) cvtres build 1720
                                                                                    • [LNK] VS98 (6.0) imp/exp build 8168
                                                                                    NameVirtual AddressVirtual Size Is in Section
                                                                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x192b00x66.rdata
                                                                                    IMAGE_DIRECTORY_ENTRY_IMPORT0x179900x104.rdata
                                                                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x1c0000x13468.rsrc
                                                                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                                                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                    IMAGE_DIRECTORY_ENTRY_IAT0x140000x97c.rdata
                                                                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                    .text0x10000x1296e0x13000a73251b14c77d36acc984f7722d13962False0.4713584498355263data6.12418782292168IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                    .rdata0x140000x53160x600008df296ba9360e6b1157f62ebf300dfeFalse0.2734375data4.480454858815612IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                    .data0x1a0000x1f500x100034551e1bb3e87ed33fbb0e8be9c11f26False0.43798828125data4.799428408814517IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                    .rsrc0x1c0000x134680x140004b417cb278888c776d192562038260aeFalse0.81585693359375data7.263495041839065IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                    NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                    RT_BITMAP0x2ca780x1d0Device independent bitmap graphic, 48 x 15 x 4, image size 360EnglishUnited States0.44612068965517243
                                                                                    RT_ICON0x1c8d00x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 6400.31989247311827956
                                                                                    RT_ICON0x1cbd00x568Device independent bitmap graphic, 16 x 32 x 8, image size 3200.3208092485549133
                                                                                    RT_ICON0x1d1500x568Device independent bitmap graphic, 16 x 32 x 8, image size 3200.3872832369942196
                                                                                    RT_ICON0x2c2080x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 640EnglishUnited States0.31989247311827956
                                                                                    RT_ICON0x2c4f00x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishUnited States0.5135135135135135
                                                                                    RT_ICON0x2c6400x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 640EnglishUnited States0.2540322580645161
                                                                                    RT_ICON0x2c9280x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishUnited States0.4560810810810811
                                                                                    RT_ICON0x2d1f00x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 640FrenchFrance0.5295698924731183
                                                                                    RT_ICON0x2d8000x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1152ItalianItaly0.3312274368231047
                                                                                    RT_MENU0x2cc580xd0dataEnglishUnited States0.6826923076923077
                                                                                    RT_MENU0x2d4f00x4edataFrenchFrance0.9230769230769231
                                                                                    RT_DIALOG0x2cd980x13edataEnglishUnited States0.6194968553459119
                                                                                    RT_DIALOG0x2d5400x2bcdataFrenchFrance0.48857142857142855
                                                                                    RT_STRING0x2e1d80x34dataEnglishUnited States0.5769230769230769
                                                                                    RT_STRING0x2e0c00x112dataEnglishUnited States0.48175182481751827
                                                                                    RT_STRING0x2f3080xd6dataEnglishUnited States0.5
                                                                                    RT_STRING0x2f3e00x84dataFrenchFrance0.5
                                                                                    RT_STRING0x2e2100x40dataEnglishUnited States0.671875
                                                                                    RT_STRING0x2e2980x296dataEnglishUnited States0.3323262839879154
                                                                                    RT_STRING0x2e6380x260dataEnglishUnited States0.0805921052631579
                                                                                    RT_STRING0x2e9e80x328dataEnglishUnited States0.34405940594059403
                                                                                    RT_STRING0x2e9780x70dataEnglishUnited States0.625
                                                                                    RT_STRING0x2e5300x106dataEnglishUnited States0.5763358778625954
                                                                                    RT_STRING0x2e8980xdadataEnglishUnited States0.43119266055045874
                                                                                    RT_STRING0x2e2500x46dataEnglishUnited States0.7428571428571429
                                                                                    RT_STRING0x2ed100xf6dataEnglishUnited States0.47560975609756095
                                                                                    RT_STRING0x2f0f80x210dataEnglishUnited States0.3977272727272727
                                                                                    RT_STRING0x2ee080x1f8dataEnglishUnited States0.36706349206349204
                                                                                    RT_STRING0x2f0000x86dataEnglishUnited States0.6567164179104478
                                                                                    RT_STRING0x2f0880x6edataEnglishUnited States0.6181818181818182
                                                                                    RT_ACCELERATOR0x2cd280x70dataEnglishUnited States0.6785714285714286
                                                                                    RT_GROUP_ICON0x2c6180x22dataEnglishUnited States1.0294117647058822
                                                                                    RT_GROUP_ICON0x2ca500x22dataEnglishUnited States1.0588235294117647
                                                                                    RT_GROUP_ICON0x2d4d80x14dataFrenchFrance1.25
                                                                                    RT_GROUP_ICON0x2e0a80x14dataItalianItaly1.25
                                                                                    RT_GROUP_ICON0x1cbb80x14data1.2
                                                                                    RT_GROUP_ICON0x1d6b80x14data1.25
                                                                                    RT_GROUP_ICON0x1d1380x14data1.25
                                                                                    RT_VERSION0x2ced80x314dataEnglishUnited States0.44543147208121825
                                                                                    None0x1d6d00xeb33data1.0004318147846738
                                                                                    None0x2cc480xedataEnglishUnited States1.5714285714285714
                                                                                    DLLImport
                                                                                    ODBC32.dll
                                                                                    MFC42.DLL
                                                                                    MSVCRT.dll_onexit, _exit, _XcptFilter, exit, _acmdln, __getmainargs, _initterm, __setusermatherr, _adjust_fdiv, __p__commode, __p__fmode, __set_app_type, _except_handler3, _setmbcp, __dllonexit, sprintf, _access, __CxxFrameHandler, malloc, atoi, strrchr, free, _mbsstr, _mbscmp, memmove, wcslen, _ftol, sscanf, _CxxThrowException, _EH_prolog, ??1type_info@@UAE@XZ, _controlfp
                                                                                    KERNEL32.dllGetModuleHandleA, GetSystemDirectoryA, CreateFileA, GetFileSize, CloseHandle, MoveFileExA, LocalAlloc, LocalLock, LocalUnlock, GetModuleHandleW, GetLocalTime, GetProcAddress, LoadLibraryA, FreeLibrary, lstrcpynA, MultiByteToWideChar, GlobalAddAtomA, GlobalFindAtomA, GlobalDeleteAtom, GetCurrentThreadId, SetLastError, FindResourceA, LoadResource, LockResource, MulDiv, GetLastError, FormatMessageA, LocalFree, GetVersion, GetVersionExA, GetModuleFileNameA, FreeConsole, CopyFileA, GetStartupInfoA
                                                                                    USER32.dllIsWindow, SendMessageA, TrackPopupMenu, PostMessageA, SetMenuDefaultItem, KillTimer, SetTimer, CallNextHookEx, GetClassNameA, SetPropA, GetDCEx, GetPropA, RemovePropA, UnhookWindowsHookEx, SetWindowsHookExA, GetParent, GetWindowDC, ReleaseDC, IntersectRect, IsRectEmpty, DestroyIcon, DrawMenuBar, GetMenuState, wsprintfA, CallWindowProcA, GetCursorPos, GetMenuStringA, CreateMenu, CreatePopupMenu, GetDesktopWindow, LoadBitmapA, ModifyMenuA, InsertMenuA, LoadIconA, EnableWindow, GetClientRect, SetWindowLongA, AppendMenuA, DrawEdge, SetRect, FillRect, DrawFocusRect, GetMessagePos, DrawStateA, GetSystemMetrics, InflateRect, GetSysColor, GetMenuItemCount, GetSubMenu, GetMenuItemID, GetMenuItemInfoA, IsMenu, GetMenu, WindowFromDC, CopyRect, OffsetRect, SystemParametersInfoA, MessageBoxA, GetWindowRect, GetClassInfoA, RemoveMenu, UpdateWindow, ShowWindow, FindWindowA, SetForegroundWindow, GetWindowLongA, GetSystemMenu
                                                                                    GDI32.dllBitBlt, GetPixel, CreateCompatibleDC, CreateCompatibleBitmap, SetPixel, Rectangle, CreateFontIndirectA, CreateSolidBrush, CreateFontA, GetTextExtentPoint32A, RoundRect
                                                                                    ADVAPI32.dllRegCreateKeyA, RegOpenKeyExA, RegQueryValueExA, RegSetValueExA, RegCloseKey, CryptAcquireContextA, RegConnectRegistryA, QueryServiceStatus, OpenSCManagerA, OpenServiceA, CloseServiceHandle
                                                                                    SHELL32.dllSHGetMalloc, Shell_NotifyIconA
                                                                                    COMCTL32.dllImageList_Draw, ImageList_GetIconSize, ImageList_GetIcon, ImageList_AddMasked, ImageList_SetBkColor, ImageList_ReplaceIcon
                                                                                    ole32.dllCoUninitialize, CoInitialize, CoCreateInstance
                                                                                    MSVCP60.dll??1_Winit@std@@QAE@XZ, ??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ, ?endl@std@@YAAAV?$basic_ostream@DU?$char_traits@D@std@@@1@AAV21@@Z, ??6std@@YAAAV?$basic_ostream@DU?$char_traits@D@std@@@0@AAV10@PBD@Z, ?cout@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A, ?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB, ??0_Winit@std@@QAE@XZ, ?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB, ??Hstd@@YA?AV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@ABV10@0@Z, ?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z, ?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z, ?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z, ?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z, ??0Init@ios_base@std@@QAE@XZ, ??1Init@ios_base@std@@QAE@XZ
                                                                                    MSIMG32.dllGradientFill
                                                                                    NameOrdinalAddress
                                                                                    SDASQFddefgshdSSSgfdtEghfIITFDSSSSS10x403660
                                                                                    DescriptionData
                                                                                    CompanyName
                                                                                    FileDescriptionDialupwatch MFC Application
                                                                                    FileVersion1, 0, 0, 1
                                                                                    InternalNameDialupwatch
                                                                                    LegalCopyrightCopyright (C) 2002
                                                                                    LegalTrademarks
                                                                                    OriginalFilenameDialupwatch.EXE
                                                                                    ProductNameDialupwatch Application
                                                                                    ProductVersion1, 0, 0, 1
                                                                                    Translation0x0409 0x04b0
                                                                                    Language of compilation systemCountry where language is spokenMap
                                                                                    EnglishUnited States
                                                                                    FrenchFrance
                                                                                    ItalianItaly

                                                                                    Download Network PCAP: filteredfull

                                                                                    TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                                    2025-03-21T18:38:20.277675+01002030868ET MALWARE Win32/Emotet CnC Activity (POST) M101192.168.2.449735194.187.133.160443TCP
                                                                                    • Total Packets: 39
                                                                                    • 8080 undefined
                                                                                    • 443 (HTTPS)
                                                                                    • 80 (HTTP)
                                                                                    TimestampSource PortDest PortSource IPDest IP
                                                                                    Mar 21, 2025 18:38:43.554848909 CET4972880192.168.2.474.219.172.26
                                                                                    Mar 21, 2025 18:38:44.558902979 CET4972880192.168.2.474.219.172.26
                                                                                    Mar 21, 2025 18:38:46.558944941 CET4972880192.168.2.474.219.172.26
                                                                                    Mar 21, 2025 18:38:50.574570894 CET4972880192.168.2.474.219.172.26
                                                                                    Mar 21, 2025 18:38:58.590194941 CET4972880192.168.2.474.219.172.26
                                                                                    Mar 21, 2025 18:39:08.529316902 CET497298080192.168.2.4134.209.36.254
                                                                                    Mar 21, 2025 18:39:09.527702093 CET497298080192.168.2.4134.209.36.254
                                                                                    Mar 21, 2025 18:39:11.527950048 CET497298080192.168.2.4134.209.36.254
                                                                                    Mar 21, 2025 18:39:15.527832031 CET497298080192.168.2.4134.209.36.254
                                                                                    Mar 21, 2025 18:39:23.527738094 CET497298080192.168.2.4134.209.36.254
                                                                                    Mar 21, 2025 18:39:32.520080090 CET497328080192.168.2.4104.156.59.7
                                                                                    Mar 21, 2025 18:39:33.527879000 CET497328080192.168.2.4104.156.59.7
                                                                                    Mar 21, 2025 18:39:35.527998924 CET497328080192.168.2.4104.156.59.7
                                                                                    Mar 21, 2025 18:39:39.527822018 CET497328080192.168.2.4104.156.59.7
                                                                                    Mar 21, 2025 18:39:47.543437958 CET497328080192.168.2.4104.156.59.7
                                                                                    Mar 21, 2025 18:39:56.591527939 CET497348080192.168.2.4120.138.30.150
                                                                                    Mar 21, 2025 18:39:57.590361118 CET497348080192.168.2.4120.138.30.150
                                                                                    Mar 21, 2025 18:39:59.606004953 CET497348080192.168.2.4120.138.30.150
                                                                                    Mar 21, 2025 18:40:03.605967045 CET497348080192.168.2.4120.138.30.150
                                                                                    Mar 21, 2025 18:40:11.605880022 CET497348080192.168.2.4120.138.30.150
                                                                                    Mar 21, 2025 18:40:20.732009888 CET49735443192.168.2.4194.187.133.160
                                                                                    Mar 21, 2025 18:40:20.732109070 CET44349735194.187.133.160192.168.2.4
                                                                                    Mar 21, 2025 18:40:20.732214928 CET49735443192.168.2.4194.187.133.160
                                                                                    Mar 21, 2025 18:40:20.734124899 CET49735443192.168.2.4194.187.133.160
                                                                                    Mar 21, 2025 18:40:20.734162092 CET44349735194.187.133.160192.168.2.4
                                                                                    Mar 21, 2025 18:40:20.734210014 CET49735443192.168.2.4194.187.133.160
                                                                                    Mar 21, 2025 18:40:20.734227896 CET44349735194.187.133.160192.168.2.4
                                                                                    Mar 21, 2025 18:40:20.734263897 CET44349735194.187.133.160192.168.2.4
                                                                                    Mar 21, 2025 18:40:24.756270885 CET497368080192.168.2.4104.236.246.93
                                                                                    Mar 21, 2025 18:40:25.762115002 CET497368080192.168.2.4104.236.246.93
                                                                                    Mar 21, 2025 18:40:27.762051105 CET497368080192.168.2.4104.236.246.93
                                                                                    Mar 21, 2025 18:40:31.762007952 CET497368080192.168.2.4104.236.246.93
                                                                                    Mar 21, 2025 18:40:39.761979103 CET497368080192.168.2.4104.236.246.93
                                                                                    Mar 21, 2025 18:40:48.989140987 CET497378080192.168.2.474.208.45.104
                                                                                    Mar 21, 2025 18:40:49.996191978 CET497378080192.168.2.474.208.45.104
                                                                                    Mar 21, 2025 18:40:52.011794090 CET497378080192.168.2.474.208.45.104
                                                                                    Mar 21, 2025 18:40:56.027335882 CET497378080192.168.2.474.208.45.104
                                                                                    Mar 21, 2025 18:41:04.042933941 CET497378080192.168.2.474.208.45.104
                                                                                    Mar 21, 2025 18:41:13.469537973 CET4973880192.168.2.478.187.156.31
                                                                                    Mar 21, 2025 18:41:14.480412006 CET4973880192.168.2.478.187.156.31
                                                                                    Mar 21, 2025 18:41:16.480343103 CET4973880192.168.2.478.187.156.31
                                                                                    Mar 21, 2025 18:41:20.480381012 CET4973880192.168.2.478.187.156.31
                                                                                    Mar 21, 2025 18:41:28.495866060 CET4973880192.168.2.478.187.156.31
                                                                                    • 194.187.133.160
                                                                                      • 194.187.133.160:443
                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                    0192.168.2.449735194.187.133.1604437648C:\Windows\SysWOW64\mfc110enu\Phoneutil.exe
                                                                                    TimestampBytes transferredDirectionData
                                                                                    Mar 21, 2025 18:40:20.734124899 CET494OUTPOST /Y1pc/ HTTP/1.1
                                                                                    User-Agent: Mozilla/5.0 (Windows NT 6.3; Win64; x64; rv:75.0) Gecko/20100101 Firefox/75.0
                                                                                    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
                                                                                    Accept-Language: en-US,en;q=0.5
                                                                                    Accept-Encoding: gzip, deflate
                                                                                    DNT: 1
                                                                                    Connection: keep-alive
                                                                                    Referer: 194.187.133.160/Y1pc/
                                                                                    Upgrade-Insecure-Requests: 1
                                                                                    Content-Type: multipart/form-data; boundary=--------oVoFEuGE
                                                                                    Host: 194.187.133.160:443
                                                                                    Content-Length: 5988
                                                                                    Cache-Control: no-cache


                                                                                    Target ID:0
                                                                                    Start time:13:38:24
                                                                                    Start date:21/03/2025
                                                                                    Path:C:\Users\user\Desktop\task1.exe
                                                                                    Wow64 process (32bit):true
                                                                                    Commandline:"C:\Users\user\Desktop\task1.exe"
                                                                                    Imagebase:0x400000
                                                                                    File size:192'512 bytes
                                                                                    MD5 hash:2BA73D2D47CF2D388446B781613B7EFF
                                                                                    Has elevated privileges:true
                                                                                    Has administrator privileges:true
                                                                                    Programmed in:C, C++ or other language
                                                                                    Yara matches:
                                                                                    • Rule: Windows_Trojan_Emotet_5528b3b0, Description: unknown, Source: 00000000.00000002.1169317226.0000000002291000.00000020.00001000.00020000.00000000.sdmp, Author: unknown
                                                                                    • Rule: JoeSecurity_Emotet, Description: Yara detected Emotet, Source: 00000000.00000002.1169283675.0000000002274000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                    • Rule: Windows_Trojan_Emotet_5528b3b0, Description: unknown, Source: 00000000.00000002.1169283675.0000000002274000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                                                                    • Rule: JoeSecurity_Emotet, Description: Yara detected Emotet, Source: 00000000.00000002.1169237913.0000000002260000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                    • Rule: Windows_Trojan_Emotet_5528b3b0, Description: unknown, Source: 00000000.00000002.1169237913.0000000002260000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                                                                    Reputation:low
                                                                                    Has exited:true
                                                                                    There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
                                                                                    There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
                                                                                    There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
                                                                                    There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
                                                                                    There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
                                                                                    There is hidden Windows Behavior. Click on Show Windows Behavior to show it.

                                                                                    Target ID:1
                                                                                    Start time:13:38:25
                                                                                    Start date:21/03/2025
                                                                                    Path:C:\Windows\SysWOW64\mfc110enu\Phoneutil.exe
                                                                                    Wow64 process (32bit):true
                                                                                    Commandline:"C:\Windows\SysWOW64\mfc110enu\Phoneutil.exe"
                                                                                    Imagebase:0x400000
                                                                                    File size:192'512 bytes
                                                                                    MD5 hash:2BA73D2D47CF2D388446B781613B7EFF
                                                                                    Has elevated privileges:true
                                                                                    Has administrator privileges:true
                                                                                    Programmed in:C, C++ or other language
                                                                                    Yara matches:
                                                                                    • Rule: JoeSecurity_Emotet, Description: Yara detected Emotet, Source: 00000001.00000002.3037538833.0000000000520000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                    • Rule: Windows_Trojan_Emotet_5528b3b0, Description: unknown, Source: 00000001.00000002.3037538833.0000000000520000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                                                                    • Rule: JoeSecurity_Emotet, Description: Yara detected Emotet, Source: 00000001.00000002.3037797456.0000000000561000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                    • Rule: Windows_Trojan_Emotet_5528b3b0, Description: unknown, Source: 00000001.00000002.3037797456.0000000000561000.00000020.00001000.00020000.00000000.sdmp, Author: unknown
                                                                                    • Rule: JoeSecurity_Emotet, Description: Yara detected Emotet, Source: 00000001.00000002.3037700653.0000000000544000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                    • Rule: Windows_Trojan_Emotet_5528b3b0, Description: unknown, Source: 00000001.00000002.3037700653.0000000000544000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                                                                    Reputation:low
                                                                                    Has exited:false
                                                                                    There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
                                                                                    There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
                                                                                    There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
                                                                                    There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
                                                                                    There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
                                                                                    There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
                                                                                    There is hidden Windows Behavior. Click on Show Windows Behavior to show it.

                                                                                    Target ID:2
                                                                                    Start time:13:38:28
                                                                                    Start date:21/03/2025
                                                                                    Path:C:\Windows\System32\svchost.exe
                                                                                    Wow64 process (32bit):false
                                                                                    Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
                                                                                    Imagebase:0x7ff6ca680000
                                                                                    File size:55'320 bytes
                                                                                    MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                                                    Has elevated privileges:true
                                                                                    Has administrator privileges:true
                                                                                    Programmed in:C, C++ or other language
                                                                                    Reputation:high
                                                                                    Has exited:true

                                                                                    Target ID:3
                                                                                    Start time:13:38:34
                                                                                    Start date:21/03/2025
                                                                                    Path:C:\Windows\System32\svchost.exe
                                                                                    Wow64 process (32bit):false
                                                                                    Commandline:C:\Windows\System32\svchost.exe -k NetworkService -p
                                                                                    Imagebase:0x7ff6ca680000
                                                                                    File size:55'320 bytes
                                                                                    MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                                                    Has elevated privileges:true
                                                                                    Has administrator privileges:false
                                                                                    Programmed in:C, C++ or other language
                                                                                    Reputation:high
                                                                                    Has exited:true

                                                                                    Target ID:4
                                                                                    Start time:13:38:34
                                                                                    Start date:21/03/2025
                                                                                    Path:C:\Windows\System32\SgrmBroker.exe
                                                                                    Wow64 process (32bit):false
                                                                                    Commandline:C:\Windows\system32\SgrmBroker.exe
                                                                                    Imagebase:0x7ff6976d0000
                                                                                    File size:329'504 bytes
                                                                                    MD5 hash:3BA1A18A0DC30A0545E7765CB97D8E63
                                                                                    Has elevated privileges:true
                                                                                    Has administrator privileges:true
                                                                                    Programmed in:C, C++ or other language
                                                                                    Reputation:high
                                                                                    Has exited:false

                                                                                    Target ID:5
                                                                                    Start time:13:38:34
                                                                                    Start date:21/03/2025
                                                                                    Path:C:\Windows\System32\svchost.exe
                                                                                    Wow64 process (32bit):false
                                                                                    Commandline:C:\Windows\system32\svchost.exe -k UnistackSvcGroup
                                                                                    Imagebase:0x7ff6ca680000
                                                                                    File size:55'320 bytes
                                                                                    MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                                                    Has elevated privileges:false
                                                                                    Has administrator privileges:false
                                                                                    Programmed in:C, C++ or other language
                                                                                    Reputation:high
                                                                                    Has exited:false

                                                                                    Target ID:6
                                                                                    Start time:13:38:34
                                                                                    Start date:21/03/2025
                                                                                    Path:C:\Windows\System32\svchost.exe
                                                                                    Wow64 process (32bit):false
                                                                                    Commandline:C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc
                                                                                    Imagebase:0x7ff6ca680000
                                                                                    File size:55'320 bytes
                                                                                    MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                                                    Has elevated privileges:true
                                                                                    Has administrator privileges:true
                                                                                    Programmed in:C, C++ or other language
                                                                                    Reputation:high
                                                                                    Has exited:false
                                                                                    There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
                                                                                    There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
                                                                                    There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
                                                                                    There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
                                                                                    There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
                                                                                    There is hidden Windows Behavior. Click on Show Windows Behavior to show it.

                                                                                    Target ID:7
                                                                                    Start time:13:38:35
                                                                                    Start date:21/03/2025
                                                                                    Path:C:\Windows\System32\svchost.exe
                                                                                    Wow64 process (32bit):false
                                                                                    Commandline:C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s wscsvc
                                                                                    Imagebase:0x7ff6ca680000
                                                                                    File size:55'320 bytes
                                                                                    MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                                                    Has elevated privileges:true
                                                                                    Has administrator privileges:false
                                                                                    Programmed in:C, C++ or other language
                                                                                    Reputation:high
                                                                                    Has exited:false

                                                                                    Target ID:9
                                                                                    Start time:13:39:35
                                                                                    Start date:21/03/2025
                                                                                    Path:C:\Program Files\Windows Defender\MpCmdRun.exe
                                                                                    Wow64 process (32bit):false
                                                                                    Commandline:"C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable
                                                                                    Imagebase:0x7ff7d5ba0000
                                                                                    File size:468'120 bytes
                                                                                    MD5 hash:B3676839B2EE96983F9ED735CD044159
                                                                                    Has elevated privileges:true
                                                                                    Has administrator privileges:false
                                                                                    Programmed in:C, C++ or other language
                                                                                    Reputation:high
                                                                                    Has exited:true

                                                                                    Target ID:10
                                                                                    Start time:13:39:35
                                                                                    Start date:21/03/2025
                                                                                    Path:C:\Windows\System32\conhost.exe
                                                                                    Wow64 process (32bit):false
                                                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                    Imagebase:0x7ff62fc20000
                                                                                    File size:862'208 bytes
                                                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                    Has elevated privileges:true
                                                                                    Has administrator privileges:false
                                                                                    Programmed in:C, C++ or other language
                                                                                    Reputation:high
                                                                                    Has exited:true

                                                                                    No disassembly