Windows Analysis Report
appbase.dll

Overview

General Information

Sample name: appbase.dll
Analysis ID: 1427034
MD5: ebfa9058b78dd1f0909137225aa5fa48
SHA1: 2d8b3e90ebe4f23f3f77b1e25f98304d5507c2e7
SHA256: 2b53674953bb1d733bd4d3c5d88c30f4b049e5b1433b91b8e1b2a6f0ea49a951
Infos:

Detection

Score: 52
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

System process connects to network (likely due to code injection or exploit)
Found API chain indicative of debugger detection
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Contains functionality to delete services
Contains functionality to enumerate running services
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query network adapater information
Contains functionality to read the PEB
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Found evasive API chain (date check)
Found evasive API chain checking for process token information
Found large amount of non-executed APIs
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
Sample execution stops while process was sleeping (likely an evasion)
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)

Classification

Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_036A8B80 CryptBinaryToStringW,CryptBinaryToStringW,GetLastError, 6_2_036A8B80
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_03699970 CryptGetProvParam, 6_2_03699970
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_036999CC CryptGetProvParam,CryptGetProvParam, 6_2_036999CC
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_036991B0 CryptAcquireContextW,CryptGenKey,CryptExportKey,CryptExportKey,CryptDestroyKey,CryptImportKey,CryptImportKey,CryptDestroyKey, 6_2_036991B0
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_03699450 CryptAcquireContextA,CryptCreateHash,CryptHashData,CryptGetHashParam,CryptGetHashParam,CryptDestroyHash,CryptReleaseContext, 6_2_03699450
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_0369A454 CryptReleaseContext,CryptAcquireContextA, 6_2_0369A454
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_036A683C CryptStringToBinaryA,CryptStringToBinaryA, 6_2_036A683C
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_036A8C1C CryptBinaryToStringA,CryptBinaryToStringA,GetLastError, 6_2_036A8C1C
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_036990E4 CryptImportKey, 6_2_036990E4
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_03694890 CryptAcquireContextW,CryptSetKeyParam,CryptSetKeyParam,CryptDecrypt,CryptDestroyKey,CryptReleaseContext, 6_2_03694890
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_0369324C MD5Init,MD5Update,MD5Update,MD5Final, 6_2_0369324C
Source: appbase.dll Static PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DEBUG_STRIPPED, DLL
Source: unknown HTTPS traffic detected: 172.67.136.183:443 -> 192.168.2.7:49700 version: TLS 1.2
Source: unknown HTTPS traffic detected: 172.67.136.183:443 -> 192.168.2.7:49699 version: TLS 1.2
Source: unknown HTTPS traffic detected: 172.67.136.183:443 -> 192.168.2.7:49703 version: TLS 1.2
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_036AD894 FindFirstFileW,FindFirstFileW,CreateFileW,GetFileTime,FileTimeToSystemTime,SystemTimeToTzSpecificLocalTime,GetLastError,CreateFileW,GetFileTime,FileTimeToSystemTime,SystemTimeToTzSpecificLocalTime,GetLastError,FindNextFileW,FindClose,GetLastError, 6_2_036AD894

Networking

barindex
Source: C:\Windows\SysWOW64\rundll32.exe Network Connect: 172.67.136.183 443 Jump to behavior
Source: Joe Sandbox View ASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
Source: Joe Sandbox View JA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 546Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 546Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 546Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 156Connection: Keep-AliveCache-Control: no-cache
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_0369605C InternetOpenW,InternetConnectW,HttpOpenRequestW,InternetSetOptionW,HttpSendRequestA,HttpAddRequestHeadersW,InternetQueryDataAvailable,InternetReadFile,RtlReAllocateHeap,InternetCloseHandle,InternetCloseHandle,InternetCloseHandle, 6_2_0369605C
Source: unknown DNS traffic detected: queries for: wpad.ru0994ecs.net
Source: unknown HTTP traffic detected: POST /wpad.dat HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/113.0Host: wpad.ru0994ecs.netContent-Length: 546Connection: Keep-AliveCache-Control: no-cache
Source: rundll32.exe, 00000006.00000003.3275923129.00000000034FA000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.2137125587.0000000003521000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.2100894959.0000000003521000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.2334528785.0000000003521000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.1615552323.0000000003521000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.2053947472.0000000003521000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.2036926842.00000000034FA000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.3211264975.0000000003521000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.1444547550.0000000003520000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.2036926842.0000000003521000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.2100769628.00000000034FA000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.1693953588.00000000034FA000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.2136763147.0000000003521000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.1671781992.00000000034FA000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.3512765888.00000000034FA000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.2908423905.00000000034FA000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.3539025100.0000000003521000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.3122022427.00000000034FA000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.1809304520.0000000003521000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.2856434492.00000000034FA000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.2700828091.00000000034FA000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://wpad.ru0994ecs.net/
Source: rundll32.exe, 00000005.00000003.2181521381.000000000358D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1428833394.000000000358D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1694025632.000000000358D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1375997619.0000000003569000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1766154365.000000000358D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2312601282.000000000358D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1584824995.000000000358D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2622396694.000000000358D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2520178505.000000000358D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2228028834.000000000358D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1382457356.0000000003566000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1870810923.000000000358D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2266983150.000000000358D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2034166918.000000000358D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2251104930.000000000358D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1988138094.000000000358D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2155379808.000000000358D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1739630503.000000000358D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1802206264.000000000358D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1631138869.000000000358D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2462753190.000000000358D000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://wpad.ru0994ecs.net/%
Source: rundll32.exe, 00000006.00000003.1615552323.0000000003521000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.1569175880.0000000003520000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://wpad.ru0994ecs.net/(GN
Source: rundll32.exe, 00000005.00000003.1766154365.000000000358D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1870810923.000000000358D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2266983150.000000000358D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2251104930.000000000358D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1739630503.000000000358D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1802206264.000000000358D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1824652756.000000000358D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1808643221.000000000358D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1877049426.000000000358D000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://wpad.ru0994ecs.net/0
Source: rundll32.exe, 00000006.00000003.2100894959.0000000003521000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.1615552323.0000000003521000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.2053947472.0000000003521000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.1444547550.0000000003520000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.2036926842.0000000003521000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.1671781992.00000000034FA000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.1809304520.0000000003521000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.1782970815.0000000003521000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.1569175880.0000000003520000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.1815313081.0000000003521000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.1522509574.0000000003520000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.1428172916.0000000003520000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.1756554311.0000000003521000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.1461043410.0000000003520000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.1841363434.0000000003521000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.1371832313.0000000003501000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.1302723672.0000000003501000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.1923633728.0000000003521000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.1897199169.0000000003521000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.1730602139.0000000003521000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.1256748104.0000000003501000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://wpad.ru0994ecs.net/0F4
Source: rundll32.exe, 00000004.00000003.1882768111.0000000000C84000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://wpad.ru0994ecs.net/8
Source: rundll32.exe, 00000006.00000002.3624709361.00000000034FA000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.3539025100.0000000003521000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.3450929918.0000000003521000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.3621943655.00000000034FA000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.3476733473.00000000034FA000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.3595253992.0000000003521000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.3394456459.0000000003521000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.3512765888.0000000003521000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://wpad.ru0994ecs.net/8CN
Source: rundll32.exe, 00000005.00000003.1382457356.0000000003566000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1382536972.0000000003569000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://wpad.ru0994ecs.net/E
Source: rundll32.exe, 00000006.00000003.1444547550.0000000003520000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://wpad.ru0994ecs.net/FD
Source: rundll32.exe, 00000006.00000003.3259755520.00000000034FA000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://wpad.ru0994ecs.net/G
Source: rundll32.exe, 00000006.00000003.2380525682.0000000003521000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.2334528785.0000000003521000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.3211264975.0000000003521000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.2298501785.0000000003521000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.3254248808.00000000034FA000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.2426499033.0000000003521000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.3168857998.00000000034FA000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.3238042260.0000000003521000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.3259755520.00000000034FA000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.2276270536.0000000003521000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.2298587367.0000000003521000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.2292915388.0000000003521000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.3321928652.0000000003521000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.2489311301.00000000034FA000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.2380688350.0000000003521000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.3275923129.0000000003521000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.3205251840.00000000034FA000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.2462690263.0000000003521000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.2334610259.0000000003521000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.2276400111.0000000003521000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://wpad.ru0994ecs.net/HFN
Source: rundll32.exe, 00000005.00000003.3245490862.000000000358D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.3219155663.000000000358D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.3182804818.000000000358D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.3264480473.000000000358D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.3258250159.000000000358D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.3251867450.000000000358D000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://wpad.ru0994ecs.net/P
Source: rundll32.exe, 00000004.00000003.1882768111.0000000000C84000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://wpad.ru0994ecs.net/X
Source: rundll32.exe, 00000006.00000003.1615552323.0000000003521000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.1569175880.0000000003520000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.1522509574.0000000003520000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.1461043410.0000000003520000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://wpad.ru0994ecs.net/hLN
Source: rundll32.exe, 00000005.00000003.2520178505.000000000358D000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://wpad.ru0994ecs.net/lowedCert_AutoUpdate_1
Source: rundll32.exe, 00000005.00000003.2181521381.000000000358D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1428833394.000000000358D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1694025632.000000000358D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.3300636774.000000000358D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1766154365.000000000358D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1584824995.000000000358D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.3245490862.000000000358D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.3219155663.000000000358D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.3182804818.000000000358D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1870810923.000000000358D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.3439108810.000000000358D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2034166918.000000000358D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1988138094.000000000358D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2155379808.000000000358D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.3103646932.000000000358D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1739630503.000000000358D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1802206264.000000000358D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.3326836820.000000000358D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1631138869.000000000358D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.3129834215.000000000358D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1824652756.000000000358D000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://wpad.ru0994ecs.net/p
Source: rundll32.exe, 00000005.00000003.2873795513.0000000003566000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1808643221.0000000003566000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.3182804818.0000000003566000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2817621287.0000000003566000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.3047376357.0000000003566000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2520178505.0000000003566000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2668857722.0000000003566000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.3146235136.0000000003566000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2228028834.0000000003566000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2925734306.0000000003566000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2962159553.0000000003566000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.3219155663.0000000003566000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2426629177.0000000003566000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2380996334.0000000003566000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2702077129.0000000003566000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2718479031.0000000003566000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.3129834215.0000000003566000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2462753190.0000000003566000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2685238529.0000000003566000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.3103646932.0000000003566000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2576030852.0000000003566000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://wpad.ru0994ecs.net/pad.dat
Source: rundll32.exe, 00000004.00000003.1382199981.0000000000C8A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.1374685713.0000000000C89000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.1870917876.0000000000C85000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2181521381.000000000358D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1694025632.000000000358D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.3300636774.000000000358D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1766154365.000000000358D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2312601282.000000000358D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1584824995.000000000358D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2622396694.000000000358D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2520178505.000000000358D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2718479031.000000000358D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2817621287.000000000358D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2228028834.000000000358D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2266983150.000000000358D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.3439108810.000000000358D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2034166918.000000000358D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2251104930.000000000358D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1988138094.000000000358D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2155379808.000000000358D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1739630503.000000000358D000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://wpad.ru0994ecs.net/soft
Source: rundll32.exe, 00000005.00000002.3624727042.00000000034FA000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.3219155663.000000000358D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2791236753.00000000035AD000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2622396694.000000000358D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1808643221.0000000003566000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2520178505.000000000358D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1824902876.00000000035AD000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2718479031.000000000358D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2718479031.00000000035AD000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.3300636774.0000000003566000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2817621287.000000000358D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.3258250159.0000000003566000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.3182804818.000000000358D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2155379808.0000000003566000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.3523108152.0000000003566000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2962159553.000000000358D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2685238529.00000000035AD000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2116773908.0000000003566000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2228028834.000000000358D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1382457356.0000000003566000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1870810923.000000000358D000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://wpad.ru0994ecs.net/wpad.dat
Source: rundll32.exe, 00000006.00000003.2036926842.0000000003521000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.2298501785.0000000003521000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.3089995532.00000000034FA000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.2426499033.0000000003521000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.2803715706.0000000003521000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.2701152258.0000000003521000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.2298587367.0000000003521000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.1923633728.0000000003521000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.2292915388.0000000003521000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.2892535878.00000000034FA000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.2615533136.00000000034FA000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.2700828091.0000000003521000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.1923734754.0000000003521000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://wpad.ru0994ecs.net/wpad.dat$W
Source: rundll32.exe, 00000006.00000003.2334528785.0000000003521000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.2053947472.0000000003521000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.2856434492.00000000034FA000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.3168857998.00000000034FA000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.1841363434.0000000003521000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.3238042260.0000000003521000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.2950936674.00000000034FA000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.3259755520.00000000034FA000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.2276270536.0000000003521000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.2934860342.00000000034FA000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.3321928652.0000000003521000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.2997214357.00000000034FA000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.3595253992.0000000003521000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.2462690263.0000000003521000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.2334610259.0000000003521000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.2276400111.0000000003521000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://wpad.ru0994ecs.net/wpad.dat.W
Source: rundll32.exe, 00000005.00000003.1367497141.0000000003566000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://wpad.ru0994ecs.net/wpad.dat4ecs.net/wpad.dat7
Source: rundll32.exe, 00000005.00000003.1257843264.000000000356B000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1257717523.000000000356B000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.3476733473.0000000003539000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.3512876005.0000000003538000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.3595253992.0000000003521000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.3512765888.0000000003521000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.3595343811.0000000003538000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://wpad.ru0994ecs.net/wpad.dat6
Source: rundll32.exe, 00000005.00000003.1320866163.000000000356A000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://wpad.ru0994ecs.net/wpad.dat7
Source: rundll32.exe, 00000005.00000002.3624727042.00000000034FA000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1824857523.000000000352B000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://wpad.ru0994ecs.net/wpad.dat8
Source: rundll32.exe, 00000006.00000003.1302723672.0000000003539000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.1335529624.0000000003539000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://wpad.ru0994ecs.net/wpad.dat:x
Source: rundll32.exe, 00000005.00000003.1802394207.00000000035AC000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1694025632.000000000358D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.3300636774.000000000358D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1375997619.0000000003569000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2312601282.000000000358D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1584824995.000000000358D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.3245490862.000000000358D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.3219155663.000000000358D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2791236753.00000000035AD000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1824902876.00000000035AD000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2718479031.00000000035AD000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2685238529.00000000035AD000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2228028834.000000000358D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1382457356.0000000003566000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2266983150.000000000358D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.3439108810.000000000358D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2251104930.000000000358D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1988138094.000000000358D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.3103646932.000000000358D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1802206264.000000000358D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.3326836820.000000000358D000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://wpad.ru0994ecs.net/wpad.dat=
Source: rundll32.exe, 00000005.00000003.2181521381.000000000358D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1231418551.000000000356B000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2520178505.000000000358D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2228028834.000000000358D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2251104930.000000000358D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.3129834215.000000000358D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2791236753.000000000358D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2462753190.000000000358D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1824652756.000000000358D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2873795513.000000000358D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2364943486.000000000358D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2925734306.000000000358D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2122915425.000000000358D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1808643221.000000000358D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1898878659.000000000358D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1951160287.000000000358D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2775284816.000000000358D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2116773908.000000000358D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1883001685.000000000358D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2702077129.000000000358D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2426629177.000000000358D000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://wpad.ru0994ecs.net/wpad.datC
Source: rundll32.exe, 00000006.00000002.3625652061.0000000003539000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://wpad.ru0994ecs.net/wpad.datF
Source: rundll32.exe, 00000005.00000003.1428833394.000000000358D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1485227114.000000000358D000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://wpad.ru0994ecs.net/wpad.datI
Source: rundll32.exe, 00000006.00000003.1302723672.0000000003539000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.1335529624.0000000003539000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://wpad.ru0994ecs.net/wpad.datJx
Source: rundll32.exe, 00000004.00000003.1584471515.0000000000CAB000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.1631084290.0000000000CAB000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.1558420271.0000000000CAB000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.1766090889.0000000000CA9000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.1428527654.0000000000CAB000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://wpad.ru0994ecs.net/wpad.datK
Source: rundll32.exe, 00000005.00000003.2228028834.000000000358D000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://wpad.ru0994ecs.net/wpad.datKUl
Source: rundll32.exe, 00000006.00000003.3276116495.0000000003538000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.3621943655.0000000003539000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.3394621771.0000000003538000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.3450929918.0000000003521000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.3378520939.0000000003521000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.3259755520.0000000003539000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.3321928652.0000000003521000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.3378633405.0000000003538000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.3322108973.0000000003538000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.3275923129.0000000003521000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000002.3625652061.0000000003539000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.3394456459.0000000003521000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.3451005501.0000000003538000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://wpad.ru0994ecs.net/wpad.datL
Source: rundll32.exe, 00000004.00000002.3624486325.0000000000C0A000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://wpad.ru0994ecs.net/wpad.datP
Source: rundll32.exe, 00000004.00000003.1320485906.0000000000C8B000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.1303900859.0000000000C8B000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://wpad.ru0994ecs.net/wpad.datQ
Source: rundll32.exe, 00000006.00000003.3394621771.0000000003538000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.3378520939.0000000003521000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.3321928652.0000000003521000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.3378633405.0000000003538000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.3322108973.0000000003538000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.3394456459.0000000003521000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://wpad.ru0994ecs.net/wpad.datR
Source: rundll32.exe, 00000006.00000003.1256748104.0000000003501000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://wpad.ru0994ecs.net/wpad.datVx(
Source: rundll32.exe, 00000006.00000003.3621943655.0000000003539000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://wpad.ru0994ecs.net/wpad.datX
Source: rundll32.exe, 00000006.00000003.2380525682.0000000003521000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000002.3624709361.00000000034FA000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.3122022427.0000000003521000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.2137125587.0000000003521000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.2100894959.0000000003521000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.2334528785.0000000003521000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.2053947472.0000000003521000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.3211264975.0000000003521000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.2036926842.0000000003521000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.2136763147.0000000003521000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.2908423905.00000000034FA000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.3539025100.0000000003521000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.1809304520.0000000003521000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.2856434492.00000000034FA000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.2298501785.0000000003521000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.3089995532.00000000034FA000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.2684322128.0000000003521000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.1815313081.0000000003521000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.2204154140.0000000003521000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.3450929918.0000000003521000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.3254248808.00000000034FA000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://wpad.ru0994ecs.net/wpad.datXW
Source: rundll32.exe, 00000005.00000003.1375997619.0000000003569000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1382457356.0000000003566000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1382536972.0000000003569000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1375545650.0000000003566000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://wpad.ru0994ecs.net/wpad.dat_
Source: rundll32.exe, 00000005.00000003.2622396694.00000000035AD000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://wpad.ru0994ecs.net/wpad.datanU
Source: rundll32.exe, 00000004.00000003.1231742560.0000000000C8B000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.1374685713.0000000000C89000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.1367152526.0000000000C89000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.1257961969.0000000000C8B000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://wpad.ru0994ecs.net/wpad.datd
Source: rundll32.exe, 00000006.00000003.1371832313.0000000003539000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.1335529624.0000000003539000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://wpad.ru0994ecs.net/wpad.datdx
Source: rundll32.exe, 00000004.00000003.1231742560.0000000000C8B000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.1382199981.0000000000C8A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.1374685713.0000000000C89000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.1367152526.0000000000C89000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.1257961969.0000000000C8B000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://wpad.ru0994ecs.net/wpad.date
Source: rundll32.exe, 00000006.00000003.1335747082.00000000034D2000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.1730655830.00000000034CB000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000002.3624709361.00000000034CB000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.1615615314.00000000034CB000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.1672216310.00000000034CB000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.1256796935.00000000034D2000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.1303156157.00000000034D2000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.1756615297.00000000034CB000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.1372221673.00000000034D2000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.1694148909.00000000034CB000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://wpad.ru0994ecs.net/wpad.datf
Source: rundll32.exe, 00000006.00000003.1615552323.0000000003521000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.1444547550.0000000003520000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.1671781992.00000000034FA000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.1569175880.0000000003520000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.1522509574.0000000003520000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.1428172916.0000000003520000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.1756554311.0000000003521000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.1461043410.0000000003520000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.1302723672.0000000003501000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.1730602139.0000000003521000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.1256748104.0000000003501000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.1672306509.0000000003520000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.1693953588.0000000003521000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://wpad.ru0994ecs.net/wpad.datfW
Source: rundll32.exe, 00000006.00000003.2380525682.0000000003521000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000002.3624709361.00000000034FA000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.3122022427.0000000003521000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.2137125587.0000000003521000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.2100894959.0000000003521000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.2334528785.0000000003521000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.2053947472.0000000003521000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.3211264975.0000000003521000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.2036926842.0000000003521000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.2136763147.0000000003521000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.2908423905.00000000034FA000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.3539025100.0000000003521000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.1809304520.0000000003521000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.2856434492.00000000034FA000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.1782970815.0000000003521000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.2298501785.0000000003521000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.3089995532.00000000034FA000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.2684322128.0000000003521000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.1815313081.0000000003521000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.2204154140.0000000003521000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.3450929918.0000000003521000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://wpad.ru0994ecs.net/wpad.datjZ
Source: rundll32.exe, 00000005.00000003.1375997619.0000000003569000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1382457356.0000000003566000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1320866163.000000000356A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1382536972.0000000003569000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1367497141.0000000003566000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1375545650.0000000003566000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://wpad.ru0994ecs.net/wpad.datk
Source: rundll32.exe, 00000004.00000003.1374685713.0000000000C89000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.1367152526.0000000000C89000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.3512876005.0000000003538000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.3539025100.0000000003521000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.3539099696.0000000003538000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000002.3625652061.0000000003539000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.3595253992.0000000003521000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.3512765888.0000000003521000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.3595343811.0000000003538000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://wpad.ru0994ecs.net/wpad.datm32
Source: rundll32.exe, 00000006.00000003.3512876005.0000000003538000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.3539025100.0000000003521000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.3539099696.0000000003538000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.3450929918.0000000003521000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.3595253992.0000000003521000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.3512765888.0000000003521000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.3451005501.0000000003538000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.3595343811.0000000003538000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://wpad.ru0994ecs.net/wpad.datn
Source: rundll32.exe, 00000004.00000003.1320485906.0000000000C8B000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.1374685713.0000000000C89000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.1367152526.0000000000C89000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.1303900859.0000000000C8B000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://wpad.ru0994ecs.net/wpad.datp
Source: rundll32.exe, 00000006.00000003.1615552323.0000000003521000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.1444547550.0000000003520000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.1671781992.00000000034FA000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.1569175880.0000000003520000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.1522509574.0000000003520000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.1428172916.0000000003520000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.1756554311.0000000003521000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.1461043410.0000000003520000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.1371832313.0000000003501000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.1302723672.0000000003501000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.1730602139.0000000003521000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.1256748104.0000000003501000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.1672306509.0000000003520000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.1335529624.0000000003501000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.1693953588.0000000003521000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://wpad.ru0994ecs.net/wpad.datpW
Source: rundll32.exe, 00000006.00000003.1671781992.0000000003539000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.2204196865.0000000003538000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.3476733473.0000000003539000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.3276116495.0000000003538000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.3621943655.0000000003539000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.3238190410.0000000003538000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.3512876005.0000000003538000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.3394621771.0000000003538000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.3539025100.0000000003521000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.2622324882.0000000003539000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.1569175880.0000000003520000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.3254248808.0000000003539000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.3539099696.0000000003538000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.2204154140.0000000003521000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.3450929918.0000000003521000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.2462822660.0000000003538000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.3378520939.0000000003521000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.1756554311.0000000003521000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.2803810078.0000000003538000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.3238042260.0000000003521000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.2803715706.0000000003521000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://wpad.ru0994ecs.net/wpad.datpx
Source: rundll32.exe, 00000005.00000003.1257843264.000000000356B000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1304241346.000000000356B000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1257717523.000000000356B000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://wpad.ru0994ecs.net/wpad.datq
Source: rundll32.exe, 00000005.00000003.2181521381.000000000358D000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://wpad.ru0994ecs.net/wpad.datr
Source: rundll32.exe, 00000004.00000003.1987574024.0000000000C8A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.2128019593.0000000000C83000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.1882768111.0000000000C84000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://wpad.ru0994ecs.net/wpad.datv
Source: rundll32.exe, 00000004.00000003.1584471515.0000000000CAB000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.1631084290.0000000000CAB000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.1231742560.0000000000C8B000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.1320485906.0000000000C8B000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.1558420271.0000000000CAB000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.1382199981.0000000000C8A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.1374685713.0000000000C89000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.1766090889.0000000000CA9000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.1367152526.0000000000C89000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.1303900859.0000000000C8B000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.1428527654.0000000000CAB000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.1257961969.0000000000C8B000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://wpad.ru0994ecs.net/wpad.datw
Source: rundll32.exe, 00000004.00000003.2459318930.0000000000C8A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.1870917876.0000000000C85000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://wpad.ru0994ecs.net/wpad.datz
Source: rundll32.exe, 00000006.00000003.1615552323.0000000003521000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.1569175880.0000000003520000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.1522509574.0000000003520000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.1461043410.0000000003520000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.1693953588.0000000003521000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://wpad.ru0994ecs.net/wpad.dat~Z
Source: rundll32.exe, 00000006.00000003.2908423905.00000000034FA000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.2856434492.00000000034FA000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.2684322128.0000000003521000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.2637888911.00000000034FA000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.2621945105.00000000034FA000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.2803715706.0000000003521000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.2701152258.0000000003521000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.2892535878.00000000034FA000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.2819691241.0000000003521000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.2934860342.00000000034FA000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.2747300744.0000000003521000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.2638012447.0000000003520000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.2700828091.0000000003521000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.2684465265.0000000003521000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://wpad.ru0994ecs.net/xHN
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49744
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49865
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49743
Source: unknown Network traffic detected: HTTP traffic on port 49817 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49864
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49742
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49863
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49741
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49862
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49740
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49861
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49860
Source: unknown Network traffic detected: HTTP traffic on port 49932 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49898 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49875 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49852 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49795 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49739
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49738
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49859
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49858
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49737
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49736
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49857
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49735
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49856
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49734
Source: unknown Network traffic detected: HTTP traffic on port 49772 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49855
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49733
Source: unknown Network traffic detected: HTTP traffic on port 49841 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49854
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49732
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49853
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49731
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49852
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49730
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49851
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49850
Source: unknown Network traffic detected: HTTP traffic on port 49703 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49784 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49749 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49909 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49806 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49729
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49728
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49849
Source: unknown Network traffic detected: HTTP traffic on port 49714 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49727
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49848
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49847
Source: unknown Network traffic detected: HTTP traffic on port 49886 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49846
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49845
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49844
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49843
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49842
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49720
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49841
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49840
Source: unknown Network traffic detected: HTTP traffic on port 49748 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49760 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49828 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49933 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49805 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49719
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49839
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49717
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49838
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49837
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49716
Source: unknown Network traffic detected: HTTP traffic on port 49715 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49715
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49836
Source: unknown Network traffic detected: HTTP traffic on port 49921 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49714
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49835
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49713
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49834
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49712
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49833
Source: unknown Network traffic detected: HTTP traffic on port 49887 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49711
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49832
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49710
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49831
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49830
Source: unknown Network traffic detected: HTTP traffic on port 49839 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49864 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49910 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49853 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49796 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49709
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49708
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49829
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49707
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49828
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49706
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49827
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49705
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49826
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49704
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49825
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49703
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49824
Source: unknown Network traffic detected: HTTP traffic on port 49737 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49702
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49823
Source: unknown Network traffic detected: HTTP traffic on port 49771 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49701
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49822
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49788
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49787
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49786
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49785
Source: unknown Network traffic detected: HTTP traffic on port 49922 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49784
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49783
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49782
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49781
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49780
Source: unknown Network traffic detected: HTTP traffic on port 49785 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49807 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49701 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49713 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49736 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49759 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49779
Source: unknown Network traffic detected: HTTP traffic on port 49885 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49778
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49899
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49777
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49898
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49776
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49897
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49775
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49896
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49774
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49895
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49773
Source: unknown Network traffic detected: HTTP traffic on port 49862 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49894
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49772
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49893
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49771
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49892
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49770
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49891
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49890
Source: unknown Network traffic detected: HTTP traffic on port 49897 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49911 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49851 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49830 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49769
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49768
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49889
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49767
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49888
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49766
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49887
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49765
Source: unknown Network traffic detected: HTTP traffic on port 49758 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49886
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49764
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49885
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49763
Source: unknown Network traffic detected: HTTP traffic on port 49863 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49884
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49762
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49883
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49761
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49882
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49760
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49881
Source: unknown Network traffic detected: HTTP traffic on port 49840 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49880
Source: unknown Network traffic detected: HTTP traffic on port 49702 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49896 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49770 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49797 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49759
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49758
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49879
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49757
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49878
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49877
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49755
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49876
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49875
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49754
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49874
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49752
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49873
Source: unknown Network traffic detected: HTTP traffic on port 49923 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49751
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49872
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49750
Source: unknown Network traffic detected: HTTP traffic on port 49818 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49871
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49870
Source: unknown Network traffic detected: HTTP traffic on port 49786 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49874 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49747 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49829 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49934 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49749
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49748
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49869
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49747
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49868
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49746
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49867
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49745
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49866
Source: unknown Network traffic detected: HTTP traffic on port 49746 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49769 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49803 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49826 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49906 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49849 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49900 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49699
Source: unknown Network traffic detected: HTTP traffic on port 49837 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49711 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49929 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49872 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49700 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49798 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49861 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49735 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49712 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49918 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49873 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49787 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49930 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49745 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49850 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49757 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49799
Source: unknown Network traffic detected: HTTP traffic on port 49734 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49798
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49797
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49796
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49795
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49794
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49793
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49792
Source: unknown Network traffic detected: HTTP traffic on port 49814 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49791
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49790
Source: unknown Network traffic detected: HTTP traffic on port 49895 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49768 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49825 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49884 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49907 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49789
Source: unknown Network traffic detected: HTTP traffic on port 49733 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49710 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49779 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49859 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49871 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49894 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49799 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49816 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49919 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49788 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49767 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49827 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49848 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49882 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49838 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49815 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49908 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49860 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49883 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49778 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49755 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49931 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49804 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49744 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49920 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49708 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49926 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49789 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49800 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49766 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49743 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49720 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49881 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49732 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49812 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49858 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49893 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49915 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49823 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49777 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49790 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49869 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49731 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49834 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49892 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49904 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49847 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49709 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49927 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49822 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49870 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49765 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49938 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49811 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49754 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49699 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49813 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49836 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49916 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49939 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49776 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49845 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49791 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49868 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49707 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49742 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49780 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49879 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49802 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49905 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49928 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49741 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49857 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49764 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49719 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49801 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49940 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49824 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49891 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49730 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49835 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49917 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49880 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49775 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49846 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49792 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49890 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49781 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49878 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49912 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49935 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49717 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49889 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49866 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49820 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49728 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49763 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49855 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49752 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49901 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49924 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49706 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49819 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49844 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49729 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49793 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49831 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49751 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49774 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49782 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49740 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49856 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49913 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49808 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49867 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49700
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49821
Source: unknown Network traffic detected: HTTP traffic on port 49865 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49820
Source: unknown Network traffic detected: HTTP traffic on port 49842 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49940
Source: unknown Network traffic detected: HTTP traffic on port 49727 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49704 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49762 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49833 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49819
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49818
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49939
Source: unknown Network traffic detected: HTTP traffic on port 49810 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49817
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49938
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49816
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49937
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49815
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49936
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49814
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49935
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49813
Source: unknown Network traffic detected: HTTP traffic on port 49902 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49934
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49812
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49933
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49811
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49932
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49810
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49931
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49930
Source: unknown Network traffic detected: HTTP traffic on port 49925 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49794 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49936 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49876 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49809
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49808
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49929
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49807
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49928
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49806
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49927
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49805
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49926
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49804
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49925
Source: unknown Network traffic detected: HTTP traffic on port 49773 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49803
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49924
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49802
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49923
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49801
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49922
Source: unknown Network traffic detected: HTTP traffic on port 49739 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49800
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49921
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49920
Source: unknown Network traffic detected: HTTP traffic on port 49783 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49821 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49877 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49854 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49914 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49919
Source: unknown Network traffic detected: HTTP traffic on port 49937 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49918
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49917
Source: unknown Network traffic detected: HTTP traffic on port 49809 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49916
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49915
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49914
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49913
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49912
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49911
Source: unknown Network traffic detected: HTTP traffic on port 49738 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49910
Source: unknown Network traffic detected: HTTP traffic on port 49705 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49843 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49761 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49899 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49832 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49909
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49908
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49907
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49906
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49905
Source: unknown Network traffic detected: HTTP traffic on port 49716 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49750 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49904
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49903
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49902
Source: unknown Network traffic detected: HTTP traffic on port 49903 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49901
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49900
Source: unknown Network traffic detected: HTTP traffic on port 49888 -> 443
Source: unknown HTTPS traffic detected: 172.67.136.183:443 -> 192.168.2.7:49700 version: TLS 1.2
Source: unknown HTTPS traffic detected: 172.67.136.183:443 -> 192.168.2.7:49699 version: TLS 1.2
Source: unknown HTTPS traffic detected: 172.67.136.183:443 -> 192.168.2.7:49703 version: TLS 1.2
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_036991B0 CryptAcquireContextW,CryptGenKey,CryptExportKey,CryptExportKey,CryptDestroyKey,CryptImportKey,CryptImportKey,CryptDestroyKey, 6_2_036991B0
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_036990E4 CryptImportKey, 6_2_036990E4
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_3_00F17945 NtProtectVirtualMemory, 4_3_00F17945
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_3_00F178A5 NtAllocateVirtualMemory, 4_3_00F178A5
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_650C259A GetNativeSystemInfo,NtAllocateVirtualMemory,NtProtectVirtualMemory,NtCreateThreadEx, 4_2_650C259A
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_650C2590 GetNativeSystemInfo,NtAllocateVirtualMemory,NtProtectVirtualMemory,NtCreateThreadEx, 4_2_650C2590
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_3_04F37945 NtProtectVirtualMemory, 5_3_04F37945
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_3_04F378A5 NtAllocateVirtualMemory, 5_3_04F378A5
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_3_035F7945 NtProtectVirtualMemory, 6_3_035F7945
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_3_035F78A5 NtAllocateVirtualMemory, 6_3_035F78A5
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_036BFB5C NtGetContextThread, 6_2_036BFB5C
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_036BFADC NtFreeVirtualMemory, 6_2_036BFADC
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_036BFEA4 NtProtectVirtualMemory, 6_2_036BFEA4
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_036C05A0 NtTerminateThread, 6_2_036C05A0
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_036BF9BC NtDuplicateObject, 6_2_036BF9BC
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_036C044C NtSetContextThread, 6_2_036C044C
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_036BF804 NtCreateThreadEx, 6_2_036BF804
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_036BF758 NtCreateSection, 6_2_036BF758
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_036C0358 NtReadVirtualMemory, 6_2_036C0358
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_036BFF34 NtQueryInformationFile, 6_2_036BFF34
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_036C03E8 NtResumeThread, 6_2_036C03E8
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_036BFBC0 NtMapViewOfSection, 6_2_036BFBC0
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_036BFFC4 NtQueryInformationProcess, 6_2_036BFFC4
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_036BFA68 NtFlushInstructionCache, 6_2_036BFA68
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_036BF674 NtCreateFile, 6_2_036BF674
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_036BFE24 NtOpenThread, 6_2_036BFE24
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_036C0604 NtWriteVirtualMemory, 6_2_036C0604
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_036C0290 NtReadFile, 6_2_036C0290
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_036C0164 NtQueryVirtualMemory, 6_2_036C0164
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_036BFD30 NtOpenProcess, 6_2_036BFD30
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_036C0514 NtSignalAndWaitForSingleObject, 6_2_036C0514
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_036BF5E4 NtCreateEvent, 6_2_036BF5E4
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_036929C0 NtAllocateVirtualMemory,NtWriteVirtualMemory,NtProtectVirtualMemory,NtAllocateVirtualMemory,NtWriteVirtualMemory,NtFreeVirtualMemory,NtFreeVirtualMemory, 6_2_036929C0
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_036BFDB0 NtOpenProcessToken, 6_2_036BFDB0
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_03694188 CreateRemoteThread,RtlCreateUserThread,NtCreateThreadEx,QueueUserAPC,GetLastError,NtQueueApcThread,RtlRemoteCall,ResumeThread,NtResumeThread,NtAlertResumeThread, 6_2_03694188
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_036BF584 NtClose, 6_2_036BF584
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_036C0054 NtQueryInformationThread, 6_2_036C0054
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_03692C54 NtCreateSection,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtMapViewOfSection,NtMapViewOfSection,NtUnmapViewOfSection,NtUnmapViewOfSection,NtUnmapViewOfSection,NtUnmapViewOfSection, 6_2_03692C54
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_036BF4E8 NtAllocateVirtualMemory, 6_2_036BF4E8
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_036BF8E8 NtCreateTransaction, 6_2_036BF8E8
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_036C00E4 NtQuerySystemInformation, 6_2_036C00E4
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_036B24DC RtlSetCurrentTransaction,RtlInitUnicodeString,RtlSetCurrentTransaction,NtClose,GetFileSizeEx,NtClose,NtClose,NtClose,WaitForSingleObject,ReleaseMutex,WaitForSingleObject,ReleaseMutex,GetLastError,WaitForSingleObject,ReleaseMutex,NtClose,NtClose,NtClose,NtClose, 6_2_036B24DC
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_036C04B0 NtSetEvent, 6_2_036C04B0
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_036BF484 NtAlertResumeThread, 6_2_036BF484
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_036BFC94 NtOpenFile, 6_2_036BFC94
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_036B7FA4 OpenSCManagerA,GetLastError,OpenServiceW,DeleteService,GetLastError,CloseServiceHandle,CloseServiceHandle, 6_2_036B7FA4
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_036B6F9C CreateProcessWithLogonW,GetLastError, 6_2_036B6F9C
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_3_00F15AA5 4_3_00F15AA5
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_3_04F35AA5 5_3_04F35AA5
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_3_035F5AA5 6_3_035F5AA5
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_036911A0 6_2_036911A0
Source: appbase.dll Static PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DEBUG_STRIPPED, DLL
Source: classification engine Classification label: mal52.evad.winDLL@10/0@1/1
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_036A425C LookupPrivilegeValueA,AdjustTokenPrivileges,LookupPrivilegeValueA,PrivilegeCheck,GetLastError, 6_2_036A425C
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_036BC864 GlobalMemoryStatusEx,GetDiskFreeSpaceExA,GetNativeSystemInfo,RtlGetVersion, 6_2_036BC864
Source: C:\Windows\SysWOW64\rundll32.exe Code function: CreateFileA,WriteFile,GetLastError,OpenSCManagerA,GetLastError,CreateServiceW,StartServiceA,GetLastError,CloseServiceHandle,CloseServiceHandle, 6_2_036B3718
Source: C:\Windows\SysWOW64\rundll32.exe Code function: OpenSCManagerA,GetLastError,CreateServiceW,StartServiceA,GetLastError,CloseServiceHandle,CloseServiceHandle, 6_2_036B7C38
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_036B3BE4 CreateToolhelp32Snapshot,GetLastError,Process32FirstW,GetTokenInformation,GetTokenInformation,LookupAccountSidW,IsWow64Process,Process32NextW, 6_2_036B3BE4
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_036B3718 CreateFileA,WriteFile,GetLastError,OpenSCManagerA,GetLastError,CreateServiceW,StartServiceA,GetLastError,CloseServiceHandle,CloseServiceHandle, 6_2_036B3718
Source: C:\Windows\SysWOW64\rundll32.exe Mutant created: NULL
Source: C:\Windows\System32\conhost.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2676:120:WilError_03
Source: appbase.dll Static PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Windows\System32\loaddll32.exe Key opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers Jump to behavior
Source: C:\Windows\System32\loaddll32.exe Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\appbase.dll,main
Source: unknown Process created: C:\Windows\System32\loaddll32.exe loaddll32.exe "C:\Users\user\Desktop\appbase.dll"
Source: C:\Windows\System32\loaddll32.exe Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\loaddll32.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\appbase.dll",#1
Source: C:\Windows\System32\loaddll32.exe Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\appbase.dll,main
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\appbase.dll",#1
Source: C:\Windows\System32\loaddll32.exe Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\appbase.dll",main
Source: C:\Windows\System32\loaddll32.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\appbase.dll",#1 Jump to behavior
Source: C:\Windows\System32\loaddll32.exe Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\appbase.dll,main Jump to behavior
Source: C:\Windows\System32\loaddll32.exe Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\appbase.dll",main Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\appbase.dll",#1 Jump to behavior
Source: C:\Windows\System32\loaddll32.exe Section loaded: apphelp.dll Jump to behavior
Source: C:\Windows\System32\loaddll32.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exe Section loaded: apphelp.dll Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0358b920-0ac7-461f-98f4-58e32cd89148}\InProcServer32 Jump to behavior
Source: appbase.dll Static PE information: Image base 0x650c0000 > 0x60000000
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_036A227C push ecx; mov dword ptr [esp], eax 6_2_036A2373
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_0369649C push edx; mov dword ptr [esp], eax 6_2_03696617
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_0369649C push ecx; mov dword ptr [esp], esi 6_2_03696623
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_036B6724 push edx; mov dword ptr [esp], eax 6_2_036B6E60
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_036BEB33 push esi; mov dword ptr [esp], eax 6_2_036BEA71
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_036BEB33 push edi; mov dword ptr [esp], eax 6_2_036BED49
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_036B8FD4 push eax; mov dword ptr [esp], edi 6_2_036B91E9
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_036BEBB9 push esi; mov dword ptr [esp], eax 6_2_036BEA71
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_036BEBB9 push edi; mov dword ptr [esp], eax 6_2_036BED49
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_036B078C push eax; mov dword ptr [esp], edi 6_2_036B0C79
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_036B638C push edx; mov dword ptr [esp], ebx 6_2_036B65C1
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_036B638C push ecx; mov dword ptr [esp], 00000000h 6_2_036B65CB
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_036A5E38 push edi; mov dword ptr [esp], ebx 6_2_036A65A1
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_036BC210 push edx; mov dword ptr [esp], eax 6_2_036BC2B7
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_036AF2B0 push eax; mov dword ptr [esp], 036C7EACh 6_2_036AF7C4
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_0369FAB4 push edx; mov dword ptr [esp], eax 6_2_0369FEEA
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_036A1A98 push edx; mov dword ptr [esp], eax 6_2_036A1B06
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_036A7558 push edx; mov dword ptr [esp], ebx 6_2_036A7C76
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_036BE51C push esi; mov dword ptr [esp], eax 6_2_036BEA71
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_036BE51C push edi; mov dword ptr [esp], eax 6_2_036BED49
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_036A31E4 push eax; mov dword ptr [esp], ebx 6_2_036A3515
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_036915FC push edx; mov dword ptr [esp], edi 6_2_036916E8
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_036A446C push edx; mov dword ptr [esp], eax 6_2_036A47AE
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_036BBC60 push ecx; mov dword ptr [esp], eax 6_2_036BC073
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_036BBC60 push ebx; mov dword ptr [esp], esi 6_2_036BC186
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_036BBC60 push edx; mov dword ptr [esp], eax 6_2_036BC1E2
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_036B5440 push eax; mov dword ptr [esp], esi 6_2_036B54B7
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_036BEC2A push esi; mov dword ptr [esp], eax 6_2_036BEA71
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_036BEC2A push edi; mov dword ptr [esp], eax 6_2_036BED49
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_03692404 push edx; mov dword ptr [esp], eax 6_2_03692442
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_036BEC12 push esi; mov dword ptr [esp], eax 6_2_036BEA71
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_036B3718 CreateFileA,WriteFile,GetLastError,OpenSCManagerA,GetLastError,CreateServiceW,StartServiceA,GetLastError,CloseServiceHandle,CloseServiceHandle, 6_2_036B3718
Source: C:\Windows\SysWOW64\rundll32.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_0369F1B0 GetCurrentProcessId,GetCurrentThreadId,CreateToolhelp32Snapshot,Thread32First,Thread32Next, 6_2_0369F1B0
Source: C:\Windows\SysWOW64\rundll32.exe Code function: OpenSCManagerA,EnumServicesStatusW,EnumServicesStatusW,GetLastError,CloseServiceHandle, 6_2_036B8A34
Source: C:\Windows\SysWOW64\rundll32.exe Code function: GetUserNameW,GetComputerNameExW,GetComputerNameExW,GetTokenInformation,GetCurrentProcessId,GetModuleFileNameW,GetNativeSystemInfo,RtlGetVersion,GetCurrentThreadId,GetAdaptersInfo,GetAdaptersInfo, 6_2_036AFB44
Source: C:\Windows\SysWOW64\rundll32.exe Code function: GetAdaptersInfo,GetIpForwardTable,GetLastError,GetAdaptersInfo,GetIpForwardTable,inet_ntoa,inet_ntoa,inet_ntoa, 6_2_036B58C8
Source: C:\Windows\SysWOW64\rundll32.exe Evasive API call chain: GetSystemTimeAsFileTime,DecisionNodes
Source: C:\Windows\SysWOW64\rundll32.exe Check user administrative privileges: GetTokenInformation,DecisionNodes
Source: C:\Windows\SysWOW64\rundll32.exe API coverage: 5.7 %
Source: C:\Windows\SysWOW64\rundll32.exe API coverage: 8.9 %
Source: C:\Windows\System32\conhost.exe Last function: Thread delayed
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_036AD894 FindFirstFileW,FindFirstFileW,CreateFileW,GetFileTime,FileTimeToSystemTime,SystemTimeToTzSpecificLocalTime,GetLastError,CreateFileW,GetFileTime,FileTimeToSystemTime,SystemTimeToTzSpecificLocalTime,GetLastError,FindNextFileW,FindClose,GetLastError, 6_2_036AD894
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_036A8630 GetSystemInfo,RtlGetNtVersionNumbers,IsProcessorFeaturePresent,WriteFile,WriteFile, 6_2_036A8630
Source: C:\Windows\System32\loaddll32.exe Thread delayed: delay time: 120000 Jump to behavior
Source: rundll32.exe, 00000004.00000002.3624486325.0000000000C0A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.3624486325.0000000000C65000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.1558420271.0000000000C65000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.1584471515.0000000000C65000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.1631121748.0000000000C65000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1631219032.0000000003540000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1584888451.0000000003540000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000002.3624727042.000000000353C000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1824857523.000000000353C000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1558454668.0000000003540000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.1335747082.00000000034D2000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V RAW
Source: rundll32.exe, 00000004.00000002.3624486325.0000000000C65000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.1558420271.0000000000C65000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.1584471515.0000000000C65000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.1631121748.0000000000C65000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V RAWL
Source: rundll32.exe, 00000005.00000002.3624727042.00000000034FA000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V RAW`
Source: C:\Windows\SysWOW64\rundll32.exe API call chain: ExitProcess graph end node
Source: C:\Windows\SysWOW64\rundll32.exe API call chain: ExitProcess graph end node
Source: C:\Windows\SysWOW64\rundll32.exe API call chain: ExitProcess graph end node

Anti Debugging

barindex
Source: C:\Windows\SysWOW64\rundll32.exe Debugger detection routine: QueryPerformanceCounter, DebugActiveProcess, DecisionNodes, ExitProcess or Sleep
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_0369B854 LdrGetProcedureAddress, 6_2_0369B854
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_0369F1B0 GetCurrentProcessId,GetCurrentThreadId,CreateToolhelp32Snapshot,Thread32First,Thread32Next, 6_2_0369F1B0
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_3_00F15DB5 mov edx, dword ptr fs:[00000030h] 4_3_00F15DB5
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_3_00F163F5 mov eax, dword ptr fs:[00000030h] 4_3_00F163F5
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_3_00F16315 mov eax, dword ptr fs:[00000030h] 4_3_00F16315
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_650C2454 mov eax, dword ptr fs:[00000030h] 4_2_650C2454
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_3_04F35DB5 mov edx, dword ptr fs:[00000030h] 5_3_04F35DB5
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_3_04F363F5 mov eax, dword ptr fs:[00000030h] 5_3_04F363F5
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 5_3_04F36315 mov eax, dword ptr fs:[00000030h] 5_3_04F36315
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_3_035F5DB5 mov edx, dword ptr fs:[00000030h] 6_3_035F5DB5
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_3_035F63F5 mov eax, dword ptr fs:[00000030h] 6_3_035F63F5
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_3_035F6315 mov eax, dword ptr fs:[00000030h] 6_3_035F6315
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_0369BA60 mov eax, dword ptr fs:[00000030h] 6_2_0369BA60
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_0369B934 mov eax, dword ptr fs:[00000030h] 6_2_0369B934
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_0369F11C mov eax, dword ptr fs:[00000030h] 6_2_0369F11C
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_650C1600 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,abort, 4_2_650C1600
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_650C15FC SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,abort, 4_2_650C15FC
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_036A227C RtlAddVectoredExceptionHandler,LoadLibraryExA,LoadLibraryA,TpAllocWork,TpPostWork,TpReleaseWork,WaitForSingleObject,RtlRemoveVectoredExceptionHandler, 6_2_036A227C
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_036AF2B0 WaitForSingleObject,ReleaseMutex,RtlAddVectoredExceptionHandler,WaitForSingleObject,CancelSynchronousIo,WaitForSingleObject,RtlRemoveVectoredExceptionHandler,WaitForSingleObject,ReleaseMutex, 6_2_036AF2B0
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_036A7558 RtlAddVectoredExceptionHandler,swprintf_s,RtlRemoveVectoredExceptionHandler, 6_2_036A7558

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Windows\SysWOW64\rundll32.exe Network Connect: 172.67.136.183 443 Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_036AEF2C WaitForSingleObject,LogonUserW,ImpersonateLoggedOnUser,GetLastError,ReleaseMutex, 6_2_036AEF2C
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\appbase.dll",#1 Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_650C1540 GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter, 4_2_650C1540
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_036AFB44 GetUserNameW,GetComputerNameExW,GetComputerNameExW,GetTokenInformation,GetCurrentProcessId,GetModuleFileNameW,GetNativeSystemInfo,RtlGetVersion,GetCurrentThreadId,GetAdaptersInfo,GetAdaptersInfo, 6_2_036AFB44
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_036AFB44 GetUserNameW,GetComputerNameExW,GetComputerNameExW,GetTokenInformation,GetCurrentProcessId,GetModuleFileNameW,GetNativeSystemInfo,RtlGetVersion,GetCurrentThreadId,GetAdaptersInfo,GetAdaptersInfo, 6_2_036AFB44
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_036B5FF0 socket,inet_addr,htons,bind,listen,closesocket,WaitForSingleObject,ReleaseMutex,WaitForSingleObject,accept,RtlExitUserThread, 6_2_036B5FF0
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 6_2_036BBC60 WaitForSingleObject,ReleaseMutex,WaitForSingleObject,ReleaseMutex,getaddrinfo,GetLastError,socket,GetLastError,bind,listen,accept,GetLastError,closesocket,inet_ntoa,WaitForSingleObject,ReleaseMutex,FreeAddrInfoW,shutdown,closesocket,closesocket,WaitForSingleObject,ReleaseMutex, 6_2_036BBC60
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs