Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
C.png

Overview

General Information

Sample Name:C.png (renamed file extension from png to dll)
Analysis ID:651257
MD5:8b81e6a7702f58b93fdc2b57ab401ffb
SHA1:2990b8adc8891564c404190bedab55df5027da32
SHA256:500f85201bcfc0ae49204bd31ed4f055cac1b0b7f8e74339907f5c14b8e711a8
Tags:dll
Infos:

Detection

CryptOne, Qbot
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Yara detected Qbot
Yara detected CryptOne packer
Sigma detected: Schedule system process
Maps a DLL or memory area into another process
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
Writes to foreign memory regions
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Encrypted powershell cmdline option found
Machine Learning detection for sample
Allocates memory in foreign processes
Creates files in the system32 config directory
Injects code into the Windows Explorer (explorer.exe)
Uses schtasks.exe or at.exe to add and modify task schedules
Contains functionality to detect sleep reduction / modifications
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
One or more processes crash
Contains functionality to query locales information (e.g. system language)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Deletes files inside the Windows folder
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Creates files inside the system directory
Found potential string decryption / allocating functions
Sample execution stops while process was sleeping (likely an evasion)
Contains functionality to call native functions
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to dynamically determine API calls
Contains functionality to record screenshots
Contains long sleeps (>= 3 min)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
AV process strings found (often used to terminate AV products)
PE file does not import any functions
Sample file is different than original file name gathered from version info
PE file contains an invalid checksum
Extensive use of GetProcAddress (often used to hide API calls)
PE file contains strange resources
Drops PE files
Tries to load missing DLLs
Checks if the current process is being debugged
Registers a DLL
Dropped file seen in connection with other malware
Found large amount of non-executed APIs
PE file overlay found
May check if the current machine is a sandbox (GetTickCount - Sleep)
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • loaddll32.exe (PID: 2412 cmdline: loaddll32.exe "C:\Users\user\Desktop\C.dll" MD5: 7DEB5DB86C0AC789123DEC286286B938)
    • cmd.exe (PID: 1212 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\C.dll",#1 MD5: F3BDBE3BB6F734E357235F4D5898582D)
      • rundll32.exe (PID: 5620 cmdline: rundll32.exe "C:\Users\user\Desktop\C.dll",#1 MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
        • explorer.exe (PID: 1888 cmdline: C:\Windows\SysWOW64\explorer.exe MD5: 166AB1B9462E5C1D6D18EC5EC0B6A5F7)
        • WerFault.exe (PID: 3032 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 5620 -s 752 MD5: 9E2B8ACAD48ECCA55C0230D63623661B)
    • explorer.exe (PID: 812 cmdline: C:\Windows\SysWOW64\explorer.exe MD5: 166AB1B9462E5C1D6D18EC5EC0B6A5F7)
      • schtasks.exe (PID: 6468 cmdline: "C:\Windows\system32\schtasks.exe" /Create /RU "NT AUTHORITY\SYSTEM" /Z /ST 17:57 /tn qsrshyj /ET 18:08 /tr "powershell.exe -encodedCommand cgBlAGcAcwB2AHIAMwAyAC4AZQB4AGUAIAAiAEMAOgBcAFUAcwBlAHIAcwBcAGoAbwBuAGUAcwBcAEQAZQBzAGsAdABvAHAAXABDAC4AZABsAGwAIgA=" /SC ONCE MD5: 15FF7D8324231381BAD48A052F85DF04)
        • conhost.exe (PID: 6480 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • powershell.exe (PID: 6532 cmdline: powershell.exe -encodedCommand cgBlAGcAcwB2AHIAMwAyAC4AZQB4AGUAIAAiAEMAOgBcAFUAcwBlAHIAcwBcAGoAbwBuAGUAcwBcAEQAZQBzAGsAdABvAHAAXABDAC4AZABsAGwAIgA= MD5: 95000560239032BC68B4C2FDFCDEF913)
    • conhost.exe (PID: 6540 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • regsvr32.exe (PID: 6664 cmdline: "C:\Windows\system32\regsvr32.exe" C:\Users\user\Desktop\C.dll MD5: D78B75FC68247E8A63ACBA846182740E)
      • regsvr32.exe (PID: 6676 cmdline: C:\Users\user\Desktop\C.dll MD5: 426E7499F6A7346F0410DEAD0805586B)
        • explorer.exe (PID: 6812 cmdline: C:\Windows\SysWOW64\explorer.exe MD5: 166AB1B9462E5C1D6D18EC5EC0B6A5F7)
          • conhost.exe (PID: 7032 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • powershell.exe (PID: 3732 cmdline: powershell.exe -encodedCommand cgBlAGcAcwB2AHIAMwAyAC4AZQB4AGUAIAAiAEMAOgBcAFUAcwBlAHIAcwBcAGoAbwBuAGUAcwBcAEQAZQBzAGsAdABvAHAAXABDAC4AZABsAGwAIgA= MD5: 95000560239032BC68B4C2FDFCDEF913)
    • conhost.exe (PID: 6124 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • regsvr32.exe (PID: 6404 cmdline: "C:\Windows\system32\regsvr32.exe" C:\Users\user\Desktop\C.dll MD5: D78B75FC68247E8A63ACBA846182740E)
      • regsvr32.exe (PID: 6408 cmdline: C:\Users\user\Desktop\C.dll MD5: 426E7499F6A7346F0410DEAD0805586B)
  • cleanup
{"Bot id": "AA", "Campaign": "1655971687", "Version": "403.780", "C2 list": ["38.70.253.226:2222", "47.23.89.60:993", "120.150.218.241:995", "117.248.109.38:21", "37.34.253.233:443", "86.132.14.70:2078", "111.125.245.116:995", "217.165.85.191:993", "176.45.232.204:995", "5.32.41.45:443", "93.48.80.198:995", "100.38.242.113:995", "94.59.252.166:2222", "74.14.5.179:2222", "71.13.93.154:2222", "193.253.44.249:2222", "108.60.213.141:443", "45.241.231.78:993", "217.128.122.65:2222", "40.134.246.185:995", "1.161.124.241:443", "70.46.220.114:443", "24.43.99.75:443", "32.221.224.140:995", "80.11.74.81:2222", "31.215.184.140:2222", "39.49.85.29:995", "67.209.195.198:443", "186.90.153.162:2222", "148.64.96.100:443", "67.165.206.193:993", "210.246.4.69:995", "208.107.221.224:443", "89.101.97.139:443", "88.234.116.71:443", "121.7.223.45:2222", "104.34.212.7:32103", "69.14.172.24:443", "41.228.22.180:443", "197.87.182.60:443", "24.178.196.158:2222", "1.161.124.241:995", "189.78.107.163:32101", "39.52.74.55:995", "2.34.12.8:443", "182.191.92.203:995", "173.21.10.71:2222", "39.41.2.45:995", "90.114.10.16:2222", "184.97.29.26:443", "76.25.142.196:443", "47.156.129.52:443", "24.55.67.176:443", "190.252.242.69:443", "70.51.132.161:2222", "72.252.157.93:995", "90.120.209.197:2078", "72.252.157.93:993", "72.252.157.93:990", "177.45.64.254:32101", "24.139.72.117:443", "187.250.202.2:443", "94.36.193.176:2222", "109.12.111.14:443", "89.86.33.217:443", "179.158.105.44:443", "63.143.92.99:995", "45.46.53.140:2222", "31.215.67.68:2222", "188.136.218.225:61202", "187.208.115.219:443", "31.215.184.140:1194", "39.57.60.246:995", "24.122.142.181:443", "84.241.8.23:32103", "191.250.120.152:443", "202.134.152.2:2222", "91.177.173.10:995", "148.0.43.48:443", "172.115.177.204:2222", "81.193.30.90:443", "68.204.15.28:443", "197.94.94.206:443", "87.109.229.215:995", "102.182.232.3:995", "196.203.37.215:80", "81.250.191.49:2222", "83.110.94.105:443", "201.176.6.24:995", "173.174.216.62:443", "31.215.70.37:443", "175.145.235.37:443", "174.69.215.101:443", "187.172.164.12:443", "201.172.23.68:2222", "41.84.249.56:995", "191.34.121.84:443", "113.53.152.11:443", "86.195.158.178:2222", "109.228.220.196:443", "82.41.63.217:443", "82.152.39.39:443", "106.51.48.188:50001", "103.246.242.202:443", "41.38.167.179:995", "98.50.191.202:443", "185.56.243.146:443", "191.112.28.64:443", "39.44.30.209:995", "47.157.227.70:443", "187.251.132.144:22", "31.35.28.29:443", "148.252.133.168:443", "42.103.132.91:2222", "180.129.108.214:995", "138.186.28.253:443", "89.137.52.44:443", "120.61.2.218:443", "122.118.129.227:995", "124.109.35.171:995", "75.99.168.194:61201", "103.91.182.114:2222", "37.210.156.247:2222", "58.105.167.36:50000", "187.207.131.50:61202", "76.70.9.169:2222", "187.211.80.39:443", "176.67.56.94:443", "103.116.178.85:995", "143.0.219.6:995", "79.80.80.29:2222"]}
SourceRuleDescriptionAuthorStrings
00000002.00000002.323381928.00000000010A0000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_Qbot_1Yara detected QbotJoe Security
    00000018.00000002.393963522.0000000003B10000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_Qbot_1Yara detected QbotJoe Security
      00000019.00000002.765579370.0000000002FB0000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_Qbot_1Yara detected QbotJoe Security
        00000002.00000000.281557672.0000000001070000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_CryptYara detected CryptOne packerJoe Security
          00000002.00000000.281557672.0000000001070000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_Qbot_1Yara detected QbotJoe Security
            Click to see the 19 entries
            SourceRuleDescriptionAuthorStrings
            4.2.explorer.exe.3230000.0.raw.unpackJoeSecurity_Qbot_1Yara detected QbotJoe Security
              2.0.rundll32.exe.10a0000.6.unpackJoeSecurity_Qbot_1Yara detected QbotJoe Security
                24.2.regsvr32.exe.3af0000.2.unpackJoeSecurity_Qbot_1Yara detected QbotJoe Security
                  2.2.rundll32.exe.10c0000.3.unpackJoeSecurity_Qbot_1Yara detected QbotJoe Security
                    0.2.loaddll32.exe.2750184.1.unpackJoeSecurity_Qbot_1Yara detected QbotJoe Security
                      Click to see the 33 entries

                      Persistence and Installation Behavior

                      barindex
                      Source: Process startedAuthor: Joe Security: Data: Command: "C:\Windows\system32\schtasks.exe" /Create /RU "NT AUTHORITY\SYSTEM" /Z /ST 17:57 /tn qsrshyj /ET 18:08 /tr "powershell.exe -encodedCommand cgBlAGcAcwB2AHIAMwAyAC4AZQB4AGUAIAAiAEMAOgBcAFUAcwBlAHIAcwBcAGoAbwBuAGUAcwBcAEQAZQBzAGsAdABvAHAAXABDAC4AZABsAGwAIgA=" /SC ONCE, CommandLine: "C:\Windows\system32\schtasks.exe" /Create /RU "NT AUTHORITY\SYSTEM" /Z /ST 17:57 /tn qsrshyj /ET 18:08 /tr "powershell.exe -encodedCommand cgBlAGcAcwB2AHIAMwAyAC4AZQB4AGUAIAAiAEMAOgBcAFUAcwBlAHIAcwBcAGoAbwBuAGUAcwBcAEQAZQBzAGsAdABvAHAAXABDAC4AZABsAGwAIgA=" /SC ONCE, CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: C:\Windows\SysWOW64\explorer.exe, ParentImage: C:\Windows\SysWOW64\explorer.exe, ParentProcessId: 812, ParentProcessName: explorer.exe, ProcessCommandLine: "C:\Windows\system32\schtasks.exe" /Create /RU "NT AUTHORITY\SYSTEM" /Z /ST 17:57 /tn qsrshyj /ET 18:08 /tr "powershell.exe -encodedCommand cgBlAGcAcwB2AHIAMwAyAC4AZQB4AGUAIAAiAEMAOgBcAFUAcwBlAHIAcwBcAGoAbwBuAGUAcwBcAEQAZQBzAGsAdABvAHAAXABDAC4AZABsAGwAIgA=" /SC ONCE, ProcessId: 6468, ProcessName: schtasks.exe
                      No Snort rule has matched

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection

                      barindex
                      Source: C.dllJoe Sandbox ML: detected
                      Source: 4.0.explorer.exe.3230000.0.unpackMalware Configuration Extractor: Qbot {"Bot id": "AA", "Campaign": "1655971687", "Version": "403.780", "C2 list": ["38.70.253.226:2222", "47.23.89.60:993", "120.150.218.241:995", "117.248.109.38:21", "37.34.253.233:443", "86.132.14.70:2078", "111.125.245.116:995", "217.165.85.191:993", "176.45.232.204:995", "5.32.41.45:443", "93.48.80.198:995", "100.38.242.113:995", "94.59.252.166:2222", "74.14.5.179:2222", "71.13.93.154:2222", "193.253.44.249:2222", "108.60.213.141:443", "45.241.231.78:993", "217.128.122.65:2222", "40.134.246.185:995", "1.161.124.241:443", "70.46.220.114:443", "24.43.99.75:443", "32.221.224.140:995", "80.11.74.81:2222", "31.215.184.140:2222", "39.49.85.29:995", "67.209.195.198:443", "186.90.153.162:2222", "148.64.96.100:443", "67.165.206.193:993", "210.246.4.69:995", "208.107.221.224:443", "89.101.97.139:443", "88.234.116.71:443", "121.7.223.45:2222", "104.34.212.7:32103", "69.14.172.24:443", "41.228.22.180:443", "197.87.182.60:443", "24.178.196.158:2222", "1.161.124.241:995", "189.78.107.163:32101", "39.52.74.55:995", "2.34.12.8:443", "182.191.92.203:995", "173.21.10.71:2222", "39.41.2.45:995", "90.114.10.16:2222", "184.97.29.26:443", "76.25.142.196:443", "47.156.129.52:443", "24.55.67.176:443", "190.252.242.69:443", "70.51.132.161:2222", "72.252.157.93:995", "90.120.209.197:2078", "72.252.157.93:993", "72.252.157.93:990", "177.45.64.254:32101", "24.139.72.117:443", "187.250.202.2:443", "94.36.193.176:2222", "109.12.111.14:443", "89.86.33.217:443", "179.158.105.44:443", "63.143.92.99:995", "45.46.53.140:2222", "31.215.67.68:2222", "188.136.218.225:61202", "187.208.115.219:443", "31.215.184.140:1194", "39.57.60.246:995", "24.122.142.181:443", "84.241.8.23:32103", "191.250.120.152:443", "202.134.152.2:2222", "91.177.173.10:995", "148.0.43.48:443", "172.115.177.204:2222", "81.193.30.90:443", "68.204.15.28:443", "197.94.94.206:443", "87.109.229.215:995", "102.182.232.3:995", "196.203.37.215:80", "81.250.191.49:2222", "83.110.94.105:443", "201.176.6.24:995", "173.174.216.62:443", "31.215.70.37:443", "175.145.235.37:443", "174.69.215.101:443", "187.172.164.12:443", "201.172.23.68:2222", "41.84.249.56:995", "191.34.121.84:443", "113.53.152.11:443", "86.195.158.178:2222", "109.228.220.196:443", "82.41.63.217:443", "82.152.39.39:443", "106.51.48.188:50001", "103.246.242.202:443", "41.38.167.179:995", "98.50.191.202:443", "185.56.243.146:443", "191.112.28.64:443", "39.44.30.209:995", "47.157.227.70:443", "187.251.132.144:22", "31.35.28.29:443", "148.252.133.168:443", "42.103.132.91:2222", "180.129.108.214:995", "138.186.28.253:443", "89.137.52.44:443", "120.61.2.218:443", "122.118.129.227:995", "124.109.35.171:995", "75.99.168.194:61201", "103.91.182.114:2222", "37.210.156.247:2222", "58.105.167.36:50000", "187.207.131.50:61202", "76.70.9.169:2222", "187.211.80.39:443", "176.67.56.94:443", "103.116.178.85:995", "143.0.219.6:995", "79.80.80.29:2222"]}
                      Source: C.dllStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, DLL, BYTES_REVERSED_HI
                      Source: Binary string: amstream.pdb source: explorer.exe, 00000004.00000003.324038860.0000000005034000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000019.00000003.394565875.0000000003F4F000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: amstream.pdbGCTL source: explorer.exe, 00000004.00000003.324038860.0000000005034000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000019.00000003.394565875.0000000003F4F000.00000004.00000800.00020000.00000000.sdmp
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00B15A3C GetModuleHandleA,GetProcAddress,lstrcpyn,lstrcpyn,lstrcpyn,FindFirstFileA,FindClose,lstrlen,lstrcpyn,lstrlen,lstrcpyn,
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00B18F90 FindFirstFileA,FindClose,FileTimeToLocalFileTime,FileTimeToDosDateTime,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_009D5A3C GetModuleHandleA,GetProcAddress,lstrcpyn,lstrcpyn,lstrcpyn,FindFirstFileA,FindClose,lstrlen,lstrcpyn,lstrlen,lstrcpyn,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_009D8F90 FindFirstFileA,FindClose,FileTimeToLocalFileTime,FileTimeToDosDateTime,
                      Source: explorer.exe, 00000004.00000003.325177471.0000000005378000.00000004.00000800.00020000.00000000.sdmp, C.dllString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl04
                      Source: explorer.exe, 00000004.00000003.325177471.0000000005378000.00000004.00000800.00020000.00000000.sdmp, C.dllString found in binary or memory: http://crl.sectigo.com/SectigoPublicCodeSigningCAR36.crl0y
                      Source: explorer.exe, 00000004.00000003.325177471.0000000005378000.00000004.00000800.00020000.00000000.sdmp, C.dllString found in binary or memory: http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0
                      Source: explorer.exe, 00000004.00000003.325177471.0000000005378000.00000004.00000800.00020000.00000000.sdmp, C.dllString found in binary or memory: http://crt.sectigo.com/SectigoPublicCodeSigningCAR36.crt0#
                      Source: explorer.exe, 00000004.00000003.325177471.0000000005378000.00000004.00000800.00020000.00000000.sdmp, C.dllString found in binary or memory: http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#
                      Source: explorer.exe, 00000004.00000003.325177471.0000000005378000.00000004.00000800.00020000.00000000.sdmp, C.dllString found in binary or memory: http://ocsp.comodoca.com0
                      Source: explorer.exe, 00000004.00000003.325177471.0000000005378000.00000004.00000800.00020000.00000000.sdmp, C.dllString found in binary or memory: http://ocsp.sectigo.com0
                      Source: explorer.exe, 00000004.00000003.325177471.0000000005378000.00000004.00000800.00020000.00000000.sdmp, C.dllString found in binary or memory: http://ocsp.sectigo.com0#
                      Source: loaddll32.exe, rundll32.exeString found in binary or memory: http://schemas.xmlsoap.org/soap/encoding/
                      Source: loaddll32.exe, 00000000.00000002.289505180.0000000000B11000.00000020.00000001.01000000.00000003.sdmp, rundll32.exe, 00000002.00000002.323140727.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, explorer.exe, 00000004.00000003.325177471.0000000005378000.00000004.00000800.00020000.00000000.sdmp, regsvr32.exe, 00000018.00000002.393512133.0000000000401000.00000020.00000001.01000000.00000003.sdmp, C.dllString found in binary or memory: http://schemas.xmlsoap.org/soap/encoding/Nhttp://www.borland.com/namespaces/Types
                      Source: loaddll32.exe, rundll32.exeString found in binary or memory: http://www.borland.com/namespaces/Types
                      Source: regsvr32.exe, 00000018.00000002.393875981.00000000035D0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://www.borland.com/namespaces/Types-IAppServerSOAP
                      Source: loaddll32.exe, 00000000.00000002.289505180.0000000000B11000.00000020.00000001.01000000.00000003.sdmp, rundll32.exe, 00000002.00000002.323140727.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, explorer.exe, 00000004.00000003.325177471.0000000005378000.00000004.00000800.00020000.00000000.sdmp, regsvr32.exe, 00000018.00000002.393512133.0000000000401000.00000020.00000001.01000000.00000003.sdmp, C.dllString found in binary or memory: http://www.borland.com/namespaces/Typeslhttp://www.borland.com/namespaces/Types-IAppServerSOAP
                      Source: explorer.exe, 00000004.00000003.325177471.0000000005378000.00000004.00000800.00020000.00000000.sdmp, C.dllString found in binary or memory: https://sectigo.com/CPS0
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_009F6EBC GetObjectA,GetDC,CreateCompatibleDC,CreateBitmap,CreateCompatibleBitmap,GetDeviceCaps,GetDeviceCaps,SelectObject,GetDIBColorTable,GetDIBits,SelectObject,CreateDIBSection,GetDIBits,SelectObject,SelectPalette,RealizePalette,FillRect,SetTextColor,SetBkColor,SetDIBColorTable,PatBlt,CreateCompatibleDC,SelectObject,SelectPalette,RealizePalette,SetTextColor,SetBkColor,BitBlt,SelectPalette,SelectObject,DeleteDC,SelectPalette,
                      Source: C.dllStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, DLL, BYTES_REVERSED_HI
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 5620 -s 752
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile deleted: C:\Windows\Temp\__PSScriptPolicyTest_et0gmkgs.0m3.ps1Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShellJump to behavior
                      Source: C:\Windows\System32\loaddll32.exeCode function: String function: 00B16D1C appears 48 times
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: String function: 009D6D1C appears 48 times
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00B3CFCC NtdllDefWindowProc_A,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_009FCFCC NtdllDefWindowProc_A,
                      Source: C.dll.4.drStatic PE information: No import functions for PE file found
                      Source: C.dllBinary or memory string: OriginalFilenameDupefinder.exe> vs C.dll
                      Source: C.dllStatic PE information: Resource name: RT_BITMAP type: GLS_BINARY_LSB_FIRST
                      Source: C:\Windows\System32\loaddll32.exeSection loaded: ggr.dll
                      Source: C:\Windows\System32\loaddll32.exeSection loaded: jr3.dll
                      Source: C:\Windows\System32\regsvr32.exeSection loaded: sfc.dll
                      Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: sfc.dll
                      Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: ggr.dll
                      Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: jr3.dll
                      Source: C:\Windows\System32\regsvr32.exeSection loaded: sfc.dll
                      Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: sfc.dll
                      Source: Joe Sandbox ViewDropped File: C:\Users\user\Desktop\C.dll 73CBBE5DA2FCE01B57CAA2A39EA01DB26B84DD62631409CF4B3FCFDC4A09A2F7
                      Source: C.dll.4.drStatic PE information: Data appended to the last section found
                      Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                      Source: unknownProcess created: C:\Windows\System32\loaddll32.exe loaddll32.exe "C:\Users\user\Desktop\C.dll"
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\C.dll",#1
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\C.dll",#1
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\explorer.exe C:\Windows\SysWOW64\explorer.exe
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\explorer.exe C:\Windows\SysWOW64\explorer.exe
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 5620 -s 752
                      Source: C:\Windows\SysWOW64\explorer.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\system32\schtasks.exe" /Create /RU "NT AUTHORITY\SYSTEM" /Z /ST 17:57 /tn qsrshyj /ET 18:08 /tr "powershell.exe -encodedCommand cgBlAGcAcwB2AHIAMwAyAC4AZQB4AGUAIAAiAEMAOgBcAFUAcwBlAHIAcwBcAGoAbwBuAGUAcwBcAEQAZQBzAGsAdABvAHAAXABDAC4AZABsAGwAIgA=" /SC ONCE
                      Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -encodedCommand cgBlAGcAcwB2AHIAMwAyAC4AZQB4AGUAIAAiAEMAOgBcAFUAcwBlAHIAcwBcAGoAbwBuAGUAcwBcAEQAZQBzAGsAdABvAHAAXABDAC4AZABsAGwAIgA=
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\regsvr32.exe "C:\Windows\system32\regsvr32.exe" C:\Users\user\Desktop\C.dll
                      Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\SysWOW64\regsvr32.exe C:\Users\user\Desktop\C.dll
                      Source: C:\Windows\SysWOW64\regsvr32.exeProcess created: C:\Windows\SysWOW64\explorer.exe C:\Windows\SysWOW64\explorer.exe
                      Source: C:\Windows\SysWOW64\explorer.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -encodedCommand cgBlAGcAcwB2AHIAMwAyAC4AZQB4AGUAIAAiAEMAOgBcAFUAcwBlAHIAcwBcAGoAbwBuAGUAcwBcAEQAZQBzAGsAdABvAHAAXABDAC4AZABsAGwAIgA=
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\regsvr32.exe "C:\Windows\system32\regsvr32.exe" C:\Users\user\Desktop\C.dll
                      Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\SysWOW64\regsvr32.exe C:\Users\user\Desktop\C.dll
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\C.dll",#1
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\explorer.exe C:\Windows\SysWOW64\explorer.exe
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\C.dll",#1
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\explorer.exe C:\Windows\SysWOW64\explorer.exe
                      Source: C:\Windows\SysWOW64\explorer.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\system32\schtasks.exe" /Create /RU "NT AUTHORITY\SYSTEM" /Z /ST 17:57 /tn qsrshyj /ET 18:08 /tr "powershell.exe -encodedCommand cgBlAGcAcwB2AHIAMwAyAC4AZQB4AGUAIAAiAEMAOgBcAFUAcwBlAHIAcwBcAGoAbwBuAGUAcwBcAEQAZQBzAGsAdABvAHAAXABDAC4AZABsAGwAIgA=" /SC ONCE
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\regsvr32.exe "C:\Windows\system32\regsvr32.exe" C:\Users\user\Desktop\C.dll
                      Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\SysWOW64\regsvr32.exe C:\Users\user\Desktop\C.dll
                      Source: C:\Windows\SysWOW64\regsvr32.exeProcess created: C:\Windows\SysWOW64\explorer.exe C:\Windows\SysWOW64\explorer.exe
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\regsvr32.exe "C:\Windows\system32\regsvr32.exe" C:\Users\user\Desktop\C.dll
                      Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\SysWOW64\regsvr32.exe C:\Users\user\Desktop\C.dll
                      Source: C:\Windows\SysWOW64\explorer.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\IaeeomkaqJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\WERC572.tmpJump to behavior
                      Source: classification engineClassification label: mal100.troj.evad.winDLL@28/12@0/1
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00B19114 GetDiskFreeSpaceA,
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00B353DC GetLastError,FormatMessageA,
                      Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
                      Source: C:\Windows\SysWOW64\rundll32.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
                      Source: C:\Windows\SysWOW64\regsvr32.exeKey opened: HKEY_USERS.DEFAULT\Software\Borland\Delphi\Locales
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_64\mscorlib\ac26e2af62f23e37e645b5e44068a025\mscorlib.ni.dll
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_64\mscorlib\ac26e2af62f23e37e645b5e44068a025\mscorlib.ni.dll
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\C.dll",#1
                      Source: C:\Windows\SysWOW64\explorer.exeMutant created: \Sessions\1\BaseNamedObjects\{A644AA43-420A-4699-971E-B9FC952EE63F}
                      Source: C:\Windows\System32\conhost.exeMutant created: \BaseNamedObjects\Local\SM0:6540:120:WilError_01
                      Source: C:\Windows\SysWOW64\explorer.exeMutant created: \BaseNamedObjects\{B392BFCE-678F-45E7-AC07-60731D963391}
                      Source: C:\Windows\SysWOW64\explorer.exeMutant created: \BaseNamedObjects\Global\{F4935CEA-067E-4885-957C-2F62BD7516DF}
                      Source: C:\Windows\System32\conhost.exeMutant created: \BaseNamedObjects\Local\SM0:7032:120:WilError_01
                      Source: C:\Windows\SysWOW64\explorer.exeMutant created: \Sessions\1\BaseNamedObjects\{B392BFCE-678F-45E7-AC07-60731D963391}
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6480:120:WilError_01
                      Source: C:\Windows\SysWOW64\explorer.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{A644AA43-420A-4699-971E-B9FC952EE63F}
                      Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess5620
                      Source: C:\Windows\SysWOW64\explorer.exeMutant created: \BaseNamedObjects\{F4935CEA-067E-4885-957C-2F62BD7516DF}
                      Source: C:\Windows\System32\conhost.exeMutant created: \BaseNamedObjects\Local\SM0:6124:120:WilError_01
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00B2B20C FindResourceA,
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\explorer.exe
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\explorer.exe
                      Source: C:\Windows\SysWOW64\regsvr32.exeProcess created: C:\Windows\SysWOW64\explorer.exe
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\explorer.exe
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\explorer.exe
                      Source: C:\Windows\SysWOW64\regsvr32.exeProcess created: C:\Windows\SysWOW64\explorer.exe
                      Source: C:\Windows\SysWOW64\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dll
                      Source: C.dllStatic file information: File size 1112443 > 1048576
                      Source: Binary string: amstream.pdb source: explorer.exe, 00000004.00000003.324038860.0000000005034000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000019.00000003.394565875.0000000003F4F000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: amstream.pdbGCTL source: explorer.exe, 00000004.00000003.324038860.0000000005034000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000019.00000003.394565875.0000000003F4F000.00000004.00000800.00020000.00000000.sdmp
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00BDB88C push 00BDB8FBh; ret
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00B1E0B4 push 00B1E230h; ret
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00B398B4 push 00B39984h; ret
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00B270A0 push 00B27148h; ret
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00B41888 push 00B418B4h; ret
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00B3F8F8 push 00B3F924h; ret
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00B16838 push 00B16864h; ret
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00B27028 push 00B2709Eh; ret
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00B2A818 push ecx; mov dword ptr [esp], edx
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00B3D854 push 00B3D880h; ret
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00B2A85C push ecx; mov dword ptr [esp], edx
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00B3A1CC push 00B3A1F8h; ret
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00B1E2B4 push 00B1E2E0h; ret
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00B17AD0 push 00B17AFCh; ret
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00B1EAD0 push 00B1EAFCh; ret
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00B1E234 push 00B1E2A3h; ret
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00B3BA28 push 00B3BA54h; ret
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00B3A21C push 00B3A248h; ret
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00B28A0C push 00B28A59h; ret
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00B27244 push 00B27270h; ret
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00B3BBD4 push 00B3BC00h; ret
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00B16B00 push 00B16B2Ch; ret
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00B28B44 push 00B28B70h; ret
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00B274B0 push ecx; mov dword ptr [esp], ecx
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00B3D48C push 00B3D4B8h; ret
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00B274D0 push ecx; mov dword ptr [esp], ecx
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00B2A4D4 push ecx; mov dword ptr [esp], edx
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00B3A4D4 push 00B3A500h; ret
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00B324DC push 00B3256Ch; ret
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00B3D4C4 push 00B3D4FCh; ret
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00B3242C push 00B324D7h; ret
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00B3BDCC LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,
                      Source: C.dll.4.drStatic PE information: real checksum: 0x109ebe should be: 0xa0a4
                      Source: C.dllStatic PE information: real checksum: 0x109ebe should be: 0x110071
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\regsvr32.exe "C:\Windows\system32\regsvr32.exe" C:\Users\user\Desktop\C.dll

                      Persistence and Installation Behavior

                      barindex
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShellJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeFile created: C:\Users\user\Desktop\C.dllJump to dropped file

                      Boot Survival

                      barindex
                      Source: C:\Windows\SysWOW64\explorer.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\system32\schtasks.exe" /Create /RU "NT AUTHORITY\SYSTEM" /Z /ST 17:57 /tn qsrshyj /ET 18:08 /tr "powershell.exe -encodedCommand cgBlAGcAcwB2AHIAMwAyAC4AZQB4AGUAIAAiAEMAOgBcAFUAcwBlAHIAcwBcAGoAbwBuAGUAcwBcAEQAZQBzAGsAdABvAHAAXABDAC4AZABsAGwAIgA=" /SC ONCE

                      Hooking and other Techniques for Hiding and Protection

                      barindex
                      Source: C:\Windows\System32\loaddll32.exeMemory written: PID: 812 base: 38F380 value: E9 63 6E EA 02
                      Source: C:\Windows\SysWOW64\regsvr32.exeMemory written: PID: 6812 base: 38F380 value: E9 63 6E C2 02
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00B39C84 IsIconic,GetWindowPlacement,GetWindowRect,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_00A212A4 IsIconic,GetWindowPlacement,GetWindowRect,GetWindowLongA,GetWindowLongA,ScreenToClient,ScreenToClient,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_009F9C84 IsIconic,GetWindowPlacement,GetWindowRect,
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00B3BDCC LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\regsvr32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Windows\SysWOW64\regsvr32.exeProcess information set: NOOPENFILEERRORBOX

                      Malware Analysis System Evasion

                      barindex
                      Source: explorer.exe, 00000019.00000002.766149295.0000000003D80000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SYSANALYZER.EXEH
                      Source: explorer.exe, 00000019.00000003.395367126.0000000003DFF000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000019.00000002.766189810.0000000003E05000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: FRIDA-WINJECTOR-HELPER-64.EXE
                      Source: explorer.exe, 00000019.00000003.395367126.0000000003DFF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: TCPDUMP.EXEQ
                      Source: explorer.exe, 00000019.00000002.766149295.0000000003D80000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: FILEMON.EXEP
                      Source: explorer.exe, 00000019.00000002.766189810.0000000003E05000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: FRIDA-WINJECTOR-HELPER-64.EXEM
                      Source: explorer.exe, 00000019.00000002.766149295.0000000003D80000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: IMPORTREC.EXE
                      Source: explorer.exe, 00000019.00000002.766149295.0000000003D80000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: DUMPCAP.EXE{
                      Source: explorer.exe, 00000019.00000002.766149295.0000000003D80000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: WIRESHARK.EXEZ
                      Source: explorer.exe, 00000019.00000002.766149295.0000000003D80000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: PROCMON.EXEM
                      Source: explorer.exe, 00000019.00000003.395367126.0000000003DFF000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000019.00000002.766149295.0000000003D80000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: WINDUMP.EXE
                      Source: explorer.exe, 00000019.00000003.395367126.0000000003DFF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: WIRESHARK.EXEW
                      Source: explorer.exe, 00000019.00000002.766149295.0000000003D80000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: PETOOLS.EXEC
                      Source: explorer.exe, 00000019.00000003.395367126.0000000003DFF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: FRIDA-WINJECTOR-HELPER-64.EXEW
                      Source: explorer.exe, 00000019.00000002.766189810.0000000003E05000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: FRIDA-WINJECTOR-HELPER-32.EXE|
                      Source: explorer.exe, 00000019.00000002.766149295.0000000003D80000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: TCPDUMP.EXEE
                      Source: explorer.exe, 00000019.00000003.395367126.0000000003DFF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: PROCMON.EXEW
                      Source: explorer.exe, 00000019.00000002.766149295.0000000003D80000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SYSANALYZER.EXE
                      Source: explorer.exe, 00000019.00000002.766149295.0000000003D80000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: WINDUMP.EXE|
                      Source: explorer.exe, 00000019.00000003.395367126.0000000003DFF000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000019.00000002.766149295.0000000003D80000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: FILEMON.EXE
                      Source: explorer.exe, 00000019.00000003.395367126.0000000003DFF000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000019.00000002.766149295.0000000003D80000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: PROCMON.EXE
                      Source: explorer.exe, 00000019.00000003.395367126.0000000003DFF000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000019.00000002.766189810.0000000003E05000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: FRIDA-WINJECTOR-HELPER-32.EXE
                      Source: explorer.exe, 00000019.00000003.395367126.0000000003DFF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: DUMPCAP.EXEP
                      Source: explorer.exe, 00000019.00000002.766149295.0000000003D80000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SNIFF_HIT.EXEY
                      Source: explorer.exe, 00000019.00000003.395367126.0000000003DFF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: PETOOLS.EXEV
                      Source: explorer.exe, 00000019.00000003.395367126.0000000003DFF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: FILEMON.EXEW
                      Source: explorer.exe, 00000019.00000003.395367126.0000000003DFF000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000019.00000002.766149295.0000000003D80000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: PETOOLS.EXE
                      Source: explorer.exe, 00000019.00000003.395367126.0000000003DFF000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000019.00000002.766149295.0000000003D80000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: TCPDUMP.EXE
                      Source: explorer.exe, 00000019.00000002.766149295.0000000003D80000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SNIFF_HIT.EXE
                      Source: explorer.exe, 00000019.00000002.766149295.0000000003D80000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SNIFF_HIT.EXEN
                      Source: explorer.exe, 00000019.00000002.766163463.0000000003DFF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: PROC_ANALYZER.EXE
                      Source: explorer.exe, 00000019.00000003.395367126.0000000003DFF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: WINDUMP.EXEW
                      Source: explorer.exe, 00000019.00000003.395367126.0000000003DFF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: FRIDA-WINJECTOR-HELPER-32.EXEV
                      Source: explorer.exe, 00000019.00000003.395367126.0000000003DFF000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000019.00000002.766149295.0000000003D80000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: DUMPCAP.EXE
                      Source: explorer.exe, 00000019.00000003.395367126.0000000003DFF000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000019.00000002.766149295.0000000003D80000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: WIRESHARK.EXE
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00B4047C
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_00A0047C
                      Source: C:\Windows\SysWOW64\explorer.exe TID: 6488Thread sleep time: -129000s >= -30000s
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6620Thread sleep count: 1747 > 30
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6620Thread sleep count: 2015 > 30
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6588Thread sleep time: -922337203685477s >= -30000s
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6640Thread sleep time: -922337203685477s >= -30000s
                      Source: C:\Windows\SysWOW64\regsvr32.exe TID: 6808Thread sleep count: 109 > 30
                      Source: C:\Windows\SysWOW64\explorer.exe TID: 7024Thread sleep count: 105 > 30
                      Source: C:\Windows\SysWOW64\explorer.exe TID: 7024Thread sleep time: -105000s >= -30000s
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 916Thread sleep count: 1529 > 30
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 5840Thread sleep count: 266 > 30
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 5832Thread sleep time: -922337203685477s >= -30000s
                      Source: C:\Windows\SysWOW64\explorer.exeLast function: Thread delayed
                      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                      Source: C:\Windows\SysWOW64\explorer.exeLast function: Thread delayed
                      Source: C:\Windows\SysWOW64\explorer.exeLast function: Thread delayed
                      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                      Source: C:\Windows\SysWOW64\explorer.exeWindow / User API: threadDelayed 829
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1747
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2015
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1529
                      Source: C:\Windows\System32\loaddll32.exeAPI coverage: 6.1 %
                      Source: C:\Windows\SysWOW64\rundll32.exeAPI coverage: 5.7 %
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00B4047C
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_00A0047C
                      Source: C:\Windows\System32\loaddll32.exeProcess information queried: ProcessInformation
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00B3596C GetSystemInfo,
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00B15A3C GetModuleHandleA,GetProcAddress,lstrcpyn,lstrcpyn,lstrcpyn,FindFirstFileA,FindClose,lstrlen,lstrcpyn,lstrlen,lstrcpyn,
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00B18F90 FindFirstFileA,FindClose,FileTimeToLocalFileTime,FileTimeToDosDateTime,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_009D5A3C GetModuleHandleA,GetProcAddress,lstrcpyn,lstrcpyn,lstrcpyn,FindFirstFileA,FindClose,lstrlen,lstrcpyn,lstrlen,lstrcpyn,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_009D8F90 FindFirstFileA,FindClose,FileTimeToLocalFileTime,FileTimeToDosDateTime,
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                      Source: C:\Windows\System32\loaddll32.exeAPI call chain: ExitProcess graph end node
                      Source: C:\Windows\SysWOW64\rundll32.exeAPI call chain: ExitProcess graph end node
                      Source: C:\Windows\SysWOW64\rundll32.exeAPI call chain: ExitProcess graph end node
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00B3BDCC LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPort
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPort
                      Source: C:\Windows\System32\loaddll32.exeMemory protected: page write copy | page execute and write copy | page guard

                      HIPS / PFW / Operating System Protection Evasion

                      barindex
                      Source: C:\Windows\System32\loaddll32.exeSection loaded: unknown target: C:\Windows\SysWOW64\explorer.exe protection: execute and read and write
                      Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: unknown target: C:\Windows\SysWOW64\explorer.exe protection: execute and read and write
                      Source: C:\Windows\System32\loaddll32.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: 3260000
                      Source: C:\Windows\System32\loaddll32.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: 38F380
                      Source: C:\Windows\SysWOW64\regsvr32.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: 2FE0000
                      Source: C:\Windows\SysWOW64\regsvr32.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: 38F380
                      Source: unknownProcess created: Base64 decoded regsvr32.exe "C:\Users\jones\Desktop\C.dll"
                      Source: unknownProcess created: Base64 decoded regsvr32.exe "C:\Users\jones\Desktop\C.dll"
                      Source: C:\Windows\System32\loaddll32.exeMemory allocated: C:\Windows\SysWOW64\explorer.exe base: 3260000 protect: page read and write
                      Source: C:\Windows\SysWOW64\regsvr32.exeMemory allocated: C:\Windows\SysWOW64\explorer.exe base: 2FE0000 protect: page read and write
                      Source: C:\Windows\System32\loaddll32.exeMemory written: PID: 812 base: 3260000 value: 9C
                      Source: C:\Windows\System32\loaddll32.exeMemory written: PID: 812 base: 38F380 value: E9
                      Source: C:\Windows\SysWOW64\regsvr32.exeMemory written: PID: 6812 base: 2FE0000 value: 9C
                      Source: C:\Windows\SysWOW64\regsvr32.exeMemory written: PID: 6812 base: 38F380 value: E9
                      Source: C:\Windows\SysWOW64\explorer.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\system32\schtasks.exe" /Create /RU "NT AUTHORITY\SYSTEM" /Z /ST 17:57 /tn qsrshyj /ET 18:08 /tr "powershell.exe -encodedCommand cgBlAGcAcwB2AHIAMwAyAC4AZQB4AGUAIAAiAEMAOgBcAFUAcwBlAHIAcwBcAGoAbwBuAGUAcwBcAEQAZQBzAGsAdABvAHAAXABDAC4AZABsAGwAIgA=" /SC ONCE
                      Source: C:\Windows\SysWOW64\explorer.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\system32\schtasks.exe" /Create /RU "NT AUTHORITY\SYSTEM" /Z /ST 17:57 /tn qsrshyj /ET 18:08 /tr "powershell.exe -encodedCommand cgBlAGcAcwB2AHIAMwAyAC4AZQB4AGUAIAAiAEMAOgBcAFUAcwBlAHIAcwBcAGoAbwBuAGUAcwBcAEQAZQBzAGsAdABvAHAAXABDAC4AZABsAGwAIgA=" /SC ONCE
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\explorer.exe C:\Windows\SysWOW64\explorer.exe
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\C.dll",#1
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\explorer.exe C:\Windows\SysWOW64\explorer.exe
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\regsvr32.exe "C:\Windows\system32\regsvr32.exe" C:\Users\user\Desktop\C.dll
                      Source: C:\Windows\SysWOW64\regsvr32.exeProcess created: C:\Windows\SysWOW64\explorer.exe C:\Windows\SysWOW64\explorer.exe
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\regsvr32.exe "C:\Windows\system32\regsvr32.exe" C:\Users\user\Desktop\C.dll
                      Source: C:\Windows\System32\loaddll32.exeQueries volume information: C:\ VolumeInformation
                      Source: C:\Windows\SysWOW64\rundll32.exeQueries volume information: C:\ VolumeInformation
                      Source: C:\Windows\SysWOW64\explorer.exeQueries volume information: C:\ VolumeInformation
                      Source: C:\Windows\SysWOW64\explorer.exeQueries volume information: C:\ VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Numerics\v4.0_4.0.0.0__b77a5c561934e089\System.Numerics.dll VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                      Source: C:\Windows\SysWOW64\regsvr32.exeQueries volume information: C:\ VolumeInformation
                      Source: C:\Windows\SysWOW64\explorer.exeQueries volume information: C:\ VolumeInformation
                      Source: C:\Windows\SysWOW64\explorer.exeQueries volume information: C:\ VolumeInformation
                      Source: C:\Windows\SysWOW64\explorer.exeQueries volume information: C:\ VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Numerics\v4.0_4.0.0.0__b77a5c561934e089\System.Numerics.dll VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformation
                      Source: C:\Windows\System32\loaddll32.exeCode function: GetModuleFileNameA,RegOpenKeyExA,RegOpenKeyExA,RegOpenKeyExA,RegQueryValueExA,RegQueryValueExA,RegCloseKey,lstrcpyn,GetThreadLocale,GetLocaleInfoA,lstrlen,lstrcpyn,LoadLibraryExA,lstrcpyn,LoadLibraryExA,lstrcpyn,LoadLibraryExA,
                      Source: C:\Windows\System32\loaddll32.exeCode function: GetLocaleInfoA,GetACP,
                      Source: C:\Windows\System32\loaddll32.exeCode function: GetLocaleInfoA,
                      Source: C:\Windows\System32\loaddll32.exeCode function: GetLocaleInfoA,
                      Source: C:\Windows\System32\loaddll32.exeCode function: lstrcpyn,GetThreadLocale,GetLocaleInfoA,lstrlen,lstrcpyn,LoadLibraryExA,lstrcpyn,LoadLibraryExA,lstrcpyn,LoadLibraryExA,
                      Source: C:\Windows\System32\loaddll32.exeCode function: GetLocaleInfoA,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetModuleFileNameA,RegOpenKeyExA,RegOpenKeyExA,RegOpenKeyExA,RegQueryValueExA,RegQueryValueExA,RegCloseKey,lstrcpyn,GetThreadLocale,GetLocaleInfoA,lstrlen,lstrcpyn,LoadLibraryExA,lstrcpyn,LoadLibraryExA,lstrcpyn,LoadLibraryExA,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetLocaleInfoA,GetACP,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetLocaleInfoA,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetLocaleInfoA,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetLocaleInfoA,
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: lstrcpyn,GetThreadLocale,GetLocaleInfoA,lstrlen,lstrcpyn,LoadLibraryExA,lstrcpyn,LoadLibraryExA,lstrcpyn,LoadLibraryExA,
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00B1A4C0 GetLocalTime,
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00B1C9CC GetVersionExA,
                      Source: loaddll32.exe, 00000000.00000003.276518369.0000000002CAF000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000002.00000000.281761673.0000000004B7F000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000002.00000003.277505237.0000000004B7F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: bdagent.exe
                      Source: rundll32.exe, 00000002.00000000.281761673.0000000004B7F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: cmdagent.exe
                      Source: loaddll32.exe, 00000000.00000003.276518369.0000000002CAF000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000002.00000000.281761673.0000000004B7F000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000002.00000003.277505237.0000000004B7F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: vsserv.exe
                      Source: loaddll32.exe, 00000000.00000003.276518369.0000000002CAF000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000002.00000000.281761673.0000000004B7F000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000002.00000003.277505237.0000000004B7F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: avp.exe
                      Source: rundll32.exe, 00000002.00000000.281761673.0000000004B7F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SavService.exe
                      Source: loaddll32.exe, 00000000.00000003.276518369.0000000002CAF000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000002.00000000.281761673.0000000004B7F000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000002.00000003.277505237.0000000004B7F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: avgcsrvx.exe
                      Source: rundll32.exe, 00000002.00000000.281761673.0000000004B7F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: dwengine.exe
                      Source: loaddll32.exe, 00000000.00000003.276518369.0000000002CAF000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000002.00000000.281761673.0000000004B7F000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000002.00000003.277505237.0000000004B7F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: mcshield.exe
                      Source: rundll32.exe, 00000002.00000000.281761673.0000000004B7F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SAVAdminService.exe
                      Source: loaddll32.exe, 00000000.00000003.276518369.0000000002CAF000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000002.00000000.281761673.0000000004B7F000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000002.00000003.277505237.0000000004B7F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: MsMpEng.exe

                      Stealing of Sensitive Information

                      barindex
                      Source: Yara matchFile source: 4.2.explorer.exe.3230000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.0.rundll32.exe.10a0000.6.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 24.2.regsvr32.exe.3af0000.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.rundll32.exe.10c0000.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.loaddll32.exe.2750184.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 24.2.regsvr32.exe.3b10000.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 24.2.regsvr32.exe.3ac0184.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 25.2.explorer.exe.2fb0000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.0.rundll32.exe.1070184.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.rundll32.exe.1070184.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.0.rundll32.exe.1070184.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.0.rundll32.exe.1070184.5.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.0.explorer.exe.3230000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.0.rundll32.exe.10a0000.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.0.rundll32.exe.10c0000.7.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.loaddll32.exe.2750184.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 25.0.explorer.exe.2fb0000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.rundll32.exe.10c0000.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.rundll32.exe.10a0000.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.loaddll32.exe.2780000.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.0.rundll32.exe.10a0000.6.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.loaddll32.exe.27a0000.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.0.rundll32.exe.10c0000.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.explorer.exe.3230000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 24.2.regsvr32.exe.3af0000.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.0.rundll32.exe.1070184.5.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.loaddll32.exe.27a0000.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 25.2.explorer.exe.2fb0000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 24.2.regsvr32.exe.3b10000.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.rundll32.exe.10a0000.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 25.0.explorer.exe.2fb0000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.0.rundll32.exe.10c0000.7.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 24.2.regsvr32.exe.3ac0184.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.0.explorer.exe.3230000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.loaddll32.exe.2780000.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.0.rundll32.exe.10a0000.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.rundll32.exe.1070184.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.0.rundll32.exe.10c0000.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000002.00000002.323381928.00000000010A0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000018.00000002.393963522.0000000003B10000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000019.00000002.765579370.0000000002FB0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000000.281557672.0000000001070000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.290253396.0000000002750000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000000.283835804.0000000001070000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.765540679.0000000003230000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.323413560.00000000010C0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000018.00000002.393925531.0000000003AF0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000000.283947623.00000000010C0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000019.00000000.390120530.0000000002FB0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000000.288483062.0000000003230000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000000.281698290.00000000010C0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.290425745.00000000027A0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000000.281670705.00000000010A0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.323357187.0000000001070000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000018.00000002.393905257.0000000003AC0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000000.283887210.00000000010A0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.290335602.0000000002780000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000000.281557672.0000000001070000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.290253396.0000000002750000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000000.283835804.0000000001070000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.323357187.0000000001070000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000018.00000002.393905257.0000000003AC0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY

                      Remote Access Functionality

                      barindex
                      Source: Yara matchFile source: 4.2.explorer.exe.3230000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.0.rundll32.exe.10a0000.6.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 24.2.regsvr32.exe.3af0000.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.rundll32.exe.10c0000.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.loaddll32.exe.2750184.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 24.2.regsvr32.exe.3b10000.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 24.2.regsvr32.exe.3ac0184.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 25.2.explorer.exe.2fb0000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.0.rundll32.exe.1070184.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.rundll32.exe.1070184.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.0.rundll32.exe.1070184.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.0.rundll32.exe.1070184.5.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.0.explorer.exe.3230000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.0.rundll32.exe.10a0000.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.0.rundll32.exe.10c0000.7.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.loaddll32.exe.2750184.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 25.0.explorer.exe.2fb0000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.rundll32.exe.10c0000.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.rundll32.exe.10a0000.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.loaddll32.exe.2780000.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.0.rundll32.exe.10a0000.6.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.loaddll32.exe.27a0000.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.0.rundll32.exe.10c0000.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.explorer.exe.3230000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 24.2.regsvr32.exe.3af0000.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.0.rundll32.exe.1070184.5.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.loaddll32.exe.27a0000.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 25.2.explorer.exe.2fb0000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 24.2.regsvr32.exe.3b10000.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.rundll32.exe.10a0000.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 25.0.explorer.exe.2fb0000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.0.rundll32.exe.10c0000.7.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 24.2.regsvr32.exe.3ac0184.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.0.explorer.exe.3230000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.loaddll32.exe.2780000.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.0.rundll32.exe.10a0000.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.rundll32.exe.1070184.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.0.rundll32.exe.10c0000.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000002.00000002.323381928.00000000010A0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000018.00000002.393963522.0000000003B10000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000019.00000002.765579370.0000000002FB0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000000.281557672.0000000001070000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.290253396.0000000002750000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000000.283835804.0000000001070000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.765540679.0000000003230000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.323413560.00000000010C0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000018.00000002.393925531.0000000003AF0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000000.283947623.00000000010C0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000019.00000000.390120530.0000000002FB0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000000.288483062.0000000003230000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000000.281698290.00000000010C0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.290425745.00000000027A0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000000.281670705.00000000010A0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.323357187.0000000001070000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000018.00000002.393905257.0000000003AC0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000000.283887210.00000000010A0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.290335602.0000000002780000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000000.281557672.0000000001070000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.290253396.0000000002750000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000000.283835804.0000000001070000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.323357187.0000000001070000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000018.00000002.393905257.0000000003AC0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                      Valid Accounts1
                      Command and Scripting Interpreter
                      1
                      Scheduled Task/Job
                      411
                      Process Injection
                      111
                      Masquerading
                      1
                      Credential API Hooking
                      1
                      System Time Discovery
                      Remote Services1
                      Screen Capture
                      Exfiltration Over Other Network MediumData ObfuscationEavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                      Default Accounts1
                      Scheduled Task/Job
                      1
                      DLL Side-Loading
                      1
                      Scheduled Task/Job
                      1
                      Disable or Modify Tools
                      LSASS Memory23
                      Security Software Discovery
                      Remote Desktop Protocol1
                      Credential API Hooking
                      Exfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                      Domain Accounts1
                      Native API
                      Logon Script (Windows)1
                      DLL Side-Loading
                      31
                      Virtualization/Sandbox Evasion
                      Security Account Manager1
                      Process Discovery
                      SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                      Local Accounts1
                      PowerShell
                      Logon Script (Mac)Logon Script (Mac)411
                      Process Injection
                      NTDS31
                      Virtualization/Sandbox Evasion
                      Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
                      Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script11
                      Deobfuscate/Decode Files or Information
                      LSA Secrets11
                      Application Window Discovery
                      SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                      Replication Through Removable MediaLaunchdRc.commonRc.common2
                      Obfuscated Files or Information
                      Cached Domain Credentials1
                      Remote System Discovery
                      VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                      External Remote ServicesScheduled TaskStartup ItemsStartup Items1
                      Regsvr32
                      DCSync1
                      File and Directory Discovery
                      Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                      Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job1
                      Rundll32
                      Proc Filesystem25
                      System Information Discovery
                      Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
                      Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)1
                      DLL Side-Loading
                      /etc/passwd and /etc/shadowSystem Network Connections DiscoverySoftware Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
                      Supply Chain CompromiseAppleScriptAt (Windows)At (Windows)1
                      File Deletion
                      Network SniffingProcess DiscoveryTaint Shared ContentLocal Data StagingExfiltration Over Unencrypted/Obfuscated Non-C2 ProtocolFile Transfer ProtocolsData Encrypted for Impact
                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet
                      behaviorgraph top1 signatures2 2 Behavior Graph ID: 651257 Sample: C.png Startdate: 23/06/2022 Architecture: WINDOWS Score: 100 66 Yara detected CryptOne packer 2->66 68 Yara detected Qbot 2->68 70 Sigma detected: Schedule system process 2->70 72 3 other signatures 2->72 9 loaddll32.exe 1 2->9         started        12 powershell.exe 11 2->12         started        14 powershell.exe 8 2->14         started        process3 signatures4 74 Overwrites code with unconditional jumps - possibly settings hooks in foreign process 9->74 76 Injects code into the Windows Explorer (explorer.exe) 9->76 78 Writes to foreign memory regions 9->78 82 3 other signatures 9->82 16 explorer.exe 8 1 9->16         started        20 cmd.exe 1 9->20         started        80 Creates files in the system32 config directory 12->80 22 regsvr32.exe 12->22         started        24 conhost.exe 12->24         started        26 regsvr32.exe 14->26         started        28 conhost.exe 14->28         started        process5 file6 50 C:\Users\user\Desktop\C.dll, PE32 16->50 dropped 64 Uses schtasks.exe or at.exe to add and modify task schedules 16->64 30 schtasks.exe 1 16->30         started        32 rundll32.exe 20->32         started        35 regsvr32.exe 22->35         started        37 regsvr32.exe 26->37         started        signatures7 process8 signatures9 39 conhost.exe 30->39         started        54 Contains functionality to detect sleep reduction / modifications 32->54 41 WerFault.exe 23 9 32->41         started        44 explorer.exe 32->44         started        56 Overwrites code with unconditional jumps - possibly settings hooks in foreign process 35->56 58 Injects code into the Windows Explorer (explorer.exe) 35->58 60 Writes to foreign memory regions 35->60 62 2 other signatures 35->62 46 explorer.exe 8 2 35->46         started        process10 dnsIp11 52 192.168.2.1 unknown unknown 41->52 48 conhost.exe 46->48         started        process12

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                      windows-stand
                      SourceDetectionScannerLabelLink
                      C.dll100%Joe Sandbox ML
                      No Antivirus matches
                      SourceDetectionScannerLabelLinkDownload
                      4.0.explorer.exe.3230000.0.unpack100%AviraHEUR/AGEN.1234562Download File
                      2.2.rundll32.exe.10c0000.3.unpack100%AviraHEUR/AGEN.1234562Download File
                      25.2.explorer.exe.2fb0000.0.unpack100%AviraHEUR/AGEN.1234562Download File
                      25.0.explorer.exe.2fb0000.0.unpack100%AviraHEUR/AGEN.1234562Download File
                      4.2.explorer.exe.3230000.0.unpack100%AviraHEUR/AGEN.1234562Download File
                      0.2.loaddll32.exe.27a0000.3.unpack100%AviraHEUR/AGEN.1234562Download File
                      24.2.regsvr32.exe.3b10000.3.unpack100%AviraHEUR/AGEN.1234562Download File
                      2.0.rundll32.exe.10c0000.7.unpack100%AviraHEUR/AGEN.1234562Download File
                      2.0.rundll32.exe.10c0000.3.unpack100%AviraHEUR/AGEN.1234562Download File
                      No Antivirus matches
                      SourceDetectionScannerLabelLink
                      http://crt.sectigo.com/SectigoPublicCodeSigningCAR36.crt0#0%URL Reputationsafe
                      http://www.borland.com/namespaces/Types-IAppServerSOAP0%VirustotalBrowse
                      http://www.borland.com/namespaces/Types-IAppServerSOAP0%Avira URL Cloudsafe
                      https://sectigo.com/CPS00%URL Reputationsafe
                      http://www.borland.com/namespaces/Types0%URL Reputationsafe
                      http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#0%URL Reputationsafe
                      http://crl.sectigo.com/SectigoPublicCodeSigningCAR36.crl0y0%URL Reputationsafe
                      http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl00%URL Reputationsafe
                      http://ocsp.sectigo.com00%URL Reputationsafe
                      http://ocsp.sectigo.com0#0%URL Reputationsafe
                      http://www.borland.com/namespaces/Typeslhttp://www.borland.com/namespaces/Types-IAppServerSOAP0%Avira URL Cloudsafe
                      No contacted domains info
                      NameSourceMaliciousAntivirus DetectionReputation
                      http://crt.sectigo.com/SectigoPublicCodeSigningCAR36.crt0#explorer.exe, 00000004.00000003.325177471.0000000005378000.00000004.00000800.00020000.00000000.sdmp, C.dllfalse
                      • URL Reputation: safe
                      unknown
                      http://www.borland.com/namespaces/Types-IAppServerSOAPregsvr32.exe, 00000018.00000002.393875981.00000000035D0000.00000004.00001000.00020000.00000000.sdmpfalse
                      • 0%, Virustotal, Browse
                      • Avira URL Cloud: safe
                      unknown
                      https://sectigo.com/CPS0explorer.exe, 00000004.00000003.325177471.0000000005378000.00000004.00000800.00020000.00000000.sdmp, C.dllfalse
                      • URL Reputation: safe
                      unknown
                      http://www.borland.com/namespaces/Typesloaddll32.exe, rundll32.exefalse
                      • URL Reputation: safe
                      unknown
                      http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#explorer.exe, 00000004.00000003.325177471.0000000005378000.00000004.00000800.00020000.00000000.sdmp, C.dllfalse
                      • URL Reputation: safe
                      unknown
                      http://schemas.xmlsoap.org/soap/encoding/Nhttp://www.borland.com/namespaces/Typesloaddll32.exe, 00000000.00000002.289505180.0000000000B11000.00000020.00000001.01000000.00000003.sdmp, rundll32.exe, 00000002.00000002.323140727.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, explorer.exe, 00000004.00000003.325177471.0000000005378000.00000004.00000800.00020000.00000000.sdmp, regsvr32.exe, 00000018.00000002.393512133.0000000000401000.00000020.00000001.01000000.00000003.sdmp, C.dllfalse
                        high
                        http://crl.sectigo.com/SectigoPublicCodeSigningCAR36.crl0yexplorer.exe, 00000004.00000003.325177471.0000000005378000.00000004.00000800.00020000.00000000.sdmp, C.dllfalse
                        • URL Reputation: safe
                        unknown
                        http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0explorer.exe, 00000004.00000003.325177471.0000000005378000.00000004.00000800.00020000.00000000.sdmp, C.dllfalse
                        • URL Reputation: safe
                        unknown
                        http://ocsp.sectigo.com0explorer.exe, 00000004.00000003.325177471.0000000005378000.00000004.00000800.00020000.00000000.sdmp, C.dllfalse
                        • URL Reputation: safe
                        unknown
                        http://schemas.xmlsoap.org/soap/encoding/loaddll32.exe, rundll32.exefalse
                          high
                          http://ocsp.sectigo.com0#explorer.exe, 00000004.00000003.325177471.0000000005378000.00000004.00000800.00020000.00000000.sdmp, C.dllfalse
                          • URL Reputation: safe
                          unknown
                          http://www.borland.com/namespaces/Typeslhttp://www.borland.com/namespaces/Types-IAppServerSOAPloaddll32.exe, 00000000.00000002.289505180.0000000000B11000.00000020.00000001.01000000.00000003.sdmp, rundll32.exe, 00000002.00000002.323140727.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, explorer.exe, 00000004.00000003.325177471.0000000005378000.00000004.00000800.00020000.00000000.sdmp, regsvr32.exe, 00000018.00000002.393512133.0000000000401000.00000020.00000001.01000000.00000003.sdmp, C.dllfalse
                          • Avira URL Cloud: safe
                          unknown
                          • No. of IPs < 25%
                          • 25% < No. of IPs < 50%
                          • 50% < No. of IPs < 75%
                          • 75% < No. of IPs
                          IPDomainCountryFlagASNASN NameMalicious
                          IP
                          192.168.2.1
                          Joe Sandbox Version:35.0.0 Citrine
                          Analysis ID:651257
                          Start date and time: 23/06/202217:54:072022-06-23 17:54:07 +02:00
                          Joe Sandbox Product:CloudBasic
                          Overall analysis duration:0h 10m 8s
                          Hypervisor based Inspection enabled:false
                          Report type:light
                          Sample file name:C.png (renamed file extension from png to dll)
                          Cookbook file name:default.jbs
                          Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                          Number of analysed new started processes analysed:45
                          Number of new started drivers analysed:0
                          Number of existing processes analysed:0
                          Number of existing drivers analysed:0
                          Number of injected processes analysed:0
                          Technologies:
                          • HCA enabled
                          • EGA enabled
                          • HDC enabled
                          • AMSI enabled
                          Analysis Mode:default
                          Analysis stop reason:Timeout
                          Detection:MAL
                          Classification:mal100.troj.evad.winDLL@28/12@0/1
                          EGA Information:
                          • Successful, ratio: 100%
                          HDC Information:
                          • Successful, ratio: 100% (good quality ratio 97.9%)
                          • Quality average: 79%
                          • Quality standard deviation: 25.3%
                          HCA Information:Failed
                          Cookbook Comments:
                          • Adjust boot time
                          • Enable AMSI
                          • Override analysis time to 240s for rundll32
                          • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, WerFault.exe, WMIADAP.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe, wuapihost.exe
                          • Excluded IPs from analysis (whitelisted): 20.42.65.92
                          • Excluded domains from analysis (whitelisted): www.bing.com, ris.api.iris.microsoft.com, fs.microsoft.com, onedsblobprdeus17.eastus.cloudapp.azure.com, store-images.s-microsoft.com, login.live.com, blobcollector.events.data.trafficmanager.net, sls.update.microsoft.com, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, watson.telemetry.microsoft.com, arc.msn.com
                          • Not all processes where analyzed, report is missing behavior information
                          • Report creation exceeded maximum time and may have missing disassembly code information.
                          • Report size exceeded maximum capacity and may have missing behavior information.
                          • Report size getting too big, too many NtReadVirtualMemory calls found.
                          TimeTypeDescription
                          17:55:51API Interceptor1x Sleep call for process: WerFault.exe modified
                          17:55:54Task SchedulerRun new task: qsrshyj path: powershell.exe s>-encodedCommand cgBlAGcAcwB2AHIAMwAyAC4AZQB4AGUAIAAiAEMAOgBcAFUAcwBlAHIAcwBcAGoAbwBuAGUAcwBcAEQAZQBzAGsAdABvAHAAXABDAC4AZABsAGwAIgA=
                          No context
                          No context
                          No context
                          No context
                          No context
                          Process:C:\Windows\SysWOW64\WerFault.exe
                          File Type:Little-endian UTF-16 Unicode text, with CRLF line terminators
                          Category:dropped
                          Size (bytes):65536
                          Entropy (8bit):1.0117567529304945
                          Encrypted:false
                          SSDEEP:192:6eia0oXUHBUZMX4jed+63QfJ/u7sfS274ItWc:7iMXcBUZMX4jeox/u7sfX4ItWc
                          MD5:54F18E493CADCD929663976CA5F17A33
                          SHA1:10D870E766B927D63A960EB4AF38C2DC8D71B310
                          SHA-256:A3434084795AC2543CD11ABCE386600DC5926A38AB79F9352686E2B75938E09B
                          SHA-512:8B08D492128B39F522590FE36D6DA0EB11601B18A344BB2C175E836B21343FE0D582691D12FC6B38A5F40B30482942395513D443370ACD73B33AFDD09396E147
                          Malicious:false
                          Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.0.0.4.7.3.3.3.5.5.4.2.5.2.8.4.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.0.0.4.7.3.3.3.7.9.0.1.8.8.2.2.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.2.4.0.d.8.5.2.a.-.7.1.6.5.-.4.4.e.c.-.9.a.6.f.-.2.7.8.2.8.3.e.0.9.2.8.6.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.d.4.c.8.9.b.c.d.-.4.a.3.2.-.4.a.a.d.-.9.4.0.2.-.8.d.3.4.9.3.3.9.8.7.b.c.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.r.u.n.d.l.l.3.2...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.R.U.N.D.L.L.3.2...E.X.E.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.5.f.4.-.0.0.0.1.-.0.0.1.c.-.a.2.7.2.-.5.8.a.0.1.9.8.7.d.8.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.b.c.c.5.d.c.3.2.2.2.0.3.4.d.3.f.2.5.7.f.1.f.d.3.5.8.8.9.e.5.b.e.9.0.f.0.9.
                          Process:C:\Windows\SysWOW64\WerFault.exe
                          File Type:Mini DuMP crash report, 14 streams, Thu Jun 23 15:55:36 2022, 0x1205a4 type
                          Category:dropped
                          Size (bytes):57838
                          Entropy (8bit):2.1042309247756124
                          Encrypted:false
                          SSDEEP:192:X9djCgxPpKDpO5Skba1sDat+nb7eq+gMRfMf7ujJ3NH3XZk3:Nfres5LbAsWtSb7v+gMRfMf7ujT3C3
                          MD5:7BECB9E17FFE597DB621DD00474A028F
                          SHA1:342A888D8E5BE12CE49B7257BFDD10996157953E
                          SHA-256:0885DE2845AD9CBFD02AE3E213772B47D9421020CCB384496EE8BC52174DE231
                          SHA-512:315AF49155418CC2025AB2CD3579887F402CBF3F7D23368F78D2F7E069C68183BCD153AA9BEC07C21213A7C22D602BEB73D5CFB8218C8EB6F855A9387FD15344
                          Malicious:false
                          Preview:MDMP....... ..........b....................................$...06..........T.......8...........T............"..............p...........\!...................................................................U...........B.......!......GenuineIntelW...........T............b.............................0..1...............W... .E.u.r.o.p.e. .S.t.a.n.d.a.r.d. .T.i.m.e.......................................W... .E.u.r.o.p.e. .D.a.y.l.i.g.h.t. .T.i.m.e.......................................1.7.1.3.4...1...x.8.6.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.....................................................................................................................................................................................................................................................................................................................................................................................................................................................
                          Process:C:\Windows\SysWOW64\WerFault.exe
                          File Type:XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
                          Category:dropped
                          Size (bytes):8304
                          Entropy (8bit):3.69601606347328
                          Encrypted:false
                          SSDEEP:192:Rrl7r3GLNisE6b6YLtO96gUgmfTnSt+prT89bPpsfulm:RrlsNin6b6Y5a6zgmfTnStPCft
                          MD5:4445A8B13AAF59821E622DCE2A8DD128
                          SHA1:2B5F8061B40A635E2213863DD1009F10233C5792
                          SHA-256:500FE9F529AEF879FE842696EAF09CD4AF8DDCCD0EAA3E65EE9DCD36A235970A
                          SHA-512:D7988573490C4BC33043223CB3B702DF70F6DF5DADD5C15D0668E92330903E2DA095AA025D86E8BF56B6AC63CB983A4C9B3AFFA4903316EFA4C4A7CAFE563302
                          Malicious:false
                          Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.7.1.3.4.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.7.1.3.4...1...a.m.d.6.4.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.1.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.1.0.3.3.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.5.6.2.0.<./.P.i.d.>.......
                          Process:C:\Windows\SysWOW64\WerFault.exe
                          File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                          Category:dropped
                          Size (bytes):4670
                          Entropy (8bit):4.4915021649958495
                          Encrypted:false
                          SSDEEP:48:cvIwSD8zsKJgtWI9/XWgc8sqYjI8fm8M4JCdsRZFur+q8/Oh84SrSRd:uITfYMmgrsqY5Jbmn8DWRd
                          MD5:5CA2D431F031D09DD4F6A50AF6FEA1B2
                          SHA1:C38EF3853317B73FACAAC5EAC8BDE5467D3C9506
                          SHA-256:9987A0225FBD3D679F22E9574E7698E0B8FDE5BFDD025AD3278DAB888403B4F4
                          SHA-512:2CBB3133E126488770D53C4D799E54ED759C388F97D2889AD68BB0A451034DEDAA15D9612FBD397BDD54BA5A34573349BC5F665855EEB67C8CCBA7B267FA0433
                          Malicious:false
                          Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="17134" />.. <arg nm="vercsdbld" val="1" />.. <arg nm="verqfe" val="1" />.. <arg nm="csdbld" val="1" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="1033" />.. <arg nm="geoid" val="244" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="1572546" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.1.17134.0-11.0.47" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="4096" />..
                          Process:C:\Windows\SysWOW64\explorer.exe
                          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                          Category:dropped
                          Size (bytes):4096
                          Entropy (8bit):4.396967862981054
                          Encrypted:false
                          SSDEEP:48:OEPx+6I8LgS72DsOA1dyqQrD1tXPFJhsppwAOY5iRYgZX0dB1mkK52wR6PD:nPxht2Dk1dyqIF9JhsLwAOhf2ZW2wIPD
                          MD5:C3D663CFCFDBF2D1EAA72A9FB7F6925D
                          SHA1:4032F9A0D27475295B9BD927B764D8167705DD0A
                          SHA-256:73CBBE5DA2FCE01B57CAA2A39EA01DB26B84DD62631409CF4B3FCFDC4A09A2F7
                          SHA-512:FCFC24C7A425B78C3443B50E6F508F92F076EC6B11993E4FC3105D1DB79F1A23064DABA2B379BAF7108AA5DE9FC161D68D61D200EEF6E153F2C84A2CF7CA037E
                          Malicious:true
                          Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*..........................................@.............................................................................*"...0.......................0......................................................................................CODE................................ ..`DATA....L&.......(..................@...BSS.....i................................idata..*".......$..................@....reloc.......0......................@..P.rsrc........0......................@..P....................................@..P........................................................................................................................................................................................................................
                          Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                          File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
                          Category:dropped
                          Size (bytes):1027
                          Entropy (8bit):5.266336877220217
                          Encrypted:false
                          SSDEEP:24:BxSA0qPvNRBbx2DOXihLHPX5WcHjeTKKjX4CIym1ZJXH41cr2nxSAZv:BZ7vNXboOMDYcqDYB1Z5YZZv
                          MD5:7043F9EBD9E8ECB0CF05A7DE834A1C6F
                          SHA1:06776F55136BCC41165FB247ED67DE33EBD34A94
                          SHA-256:3D46A909B6B3B6FFC99182258A609B96035946A83A14DED7D40C9451D6ECF1C0
                          SHA-512:C6A528343FCEE14C247E2F1693902396DC464D2F0D0958FC459E443A2C73EFD7FAB6B9FE8D9B3ABE7EA8E66CFD7FBEDAB2D69A7D61C12D27C0DDA56218AC09E7
                          Malicious:false
                          Preview:.**********************..Windows PowerShell transcript start..Start time: 20220623175559..Username: WORKGROUP\SYSTEM..RunAs User: WORKGROUP\SYSTEM..Configuration Name: ..Machine: 724536 (Microsoft Windows NT 10.0.17134.0)..Host Application: powershell.exe -encodedCommand cgBlAGcAcwB2AHIAMwAyAC4AZQB4AGUAIAAiAEMAOgBcAFUAcwBlAHIAcwBcAGoAbwBuAGUAcwBcAEQAZQBzAGsAdABvAHAAXABDAC4AZABsAGwAIgA=..Process ID: 6532..PSVersion: 5.1.17134.1..PSEdition: Desktop..PSCompatibleVersions: 1.0, 2.0, 3.0, 4.0, 5.0, 5.1.17134.1..BuildVersion: 10.0.17134.1..CLRVersion: 4.0.30319.42000..WSManStackVersion: 3.0..PSRemotingProtocolVersion: 2.3..SerializationVersion: 1.1.0.1..**********************..**********************..Command start time: 20220623175559..**********************..PS>regsvr32.exe "C:\Users\user\Desktop\C.dll"..**********************..Command start time: 20220623175600..**********************..PS>$global:?..True..**********************..Windows PowerShell transcript end..End time: 2022062317560
                          Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                          File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
                          Category:dropped
                          Size (bytes):1027
                          Entropy (8bit):5.253338253653885
                          Encrypted:false
                          SSDEEP:24:BxSAKBqPvNRBbx2DOXihLHPX5WZHjeTKKjX4CIym1ZJXy51crHtnxSAZWt:BZKCvNXboOMDYZqDYB1Z80RZZWt
                          MD5:C3F08CE22BBE4449120C045B9846BACC
                          SHA1:8446967067BFEA86210A243E9E9EE81BB88AD006
                          SHA-256:5FD360FB512A4804273B078921ACCC689A1D0BAAE33729F63F57466E569D5252
                          SHA-512:8E6BE2F3F403032F1FD2A495247D0C6E83441DC534BCAE207079471706C33D02FAEF68A321BF07ECA4DAD3572F3FEFEE65F636425CBC5AD7D2DCD5A89329935E
                          Malicious:false
                          Preview:.**********************..Windows PowerShell transcript start..Start time: 20220623175702..Username: WORKGROUP\SYSTEM..RunAs User: WORKGROUP\SYSTEM..Configuration Name: ..Machine: 724536 (Microsoft Windows NT 10.0.17134.0)..Host Application: powershell.exe -encodedCommand cgBlAGcAcwB2AHIAMwAyAC4AZQB4AGUAIAAiAEMAOgBcAFUAcwBlAHIAcwBcAGoAbwBuAGUAcwBcAEQAZQBzAGsAdABvAHAAXABDAC4AZABsAGwAIgA=..Process ID: 3732..PSVersion: 5.1.17134.1..PSEdition: Desktop..PSCompatibleVersions: 1.0, 2.0, 3.0, 4.0, 5.0, 5.1.17134.1..BuildVersion: 10.0.17134.1..CLRVersion: 4.0.30319.42000..WSManStackVersion: 3.0..PSRemotingProtocolVersion: 2.3..SerializationVersion: 1.1.0.1..**********************..**********************..Command start time: 20220623175702..**********************..PS>regsvr32.exe "C:\Users\user\Desktop\C.dll"..**********************..Command start time: 20220623175702..**********************..PS>$global:?..True..**********************..Windows PowerShell transcript end..End time: 2022062317570
                          Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                          File Type:data
                          Category:dropped
                          Size (bytes):64
                          Entropy (8bit):0.34726597513537405
                          Encrypted:false
                          SSDEEP:3:Nlll:Nll
                          MD5:446DD1CF97EABA21CF14D03AEBC79F27
                          SHA1:36E4CC7367E0C7B40F4A8ACE272941EA46373799
                          SHA-256:A7DE5177C68A64BD48B36D49E2853799F4EBCFA8E4761F7CC472F333DC5F65CF
                          SHA-512:A6D754709F30B122112AE30E5AB22486393C5021D33DA4D1304C061863D2E1E79E8AEB029CAE61261BB77D0E7BECD53A7B0106D6EA4368B4C302464E3D941CF7
                          Malicious:false
                          Preview:@...e...........................................................
                          Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                          File Type:very short file (no magic)
                          Category:dropped
                          Size (bytes):1
                          Entropy (8bit):0.0
                          Encrypted:false
                          SSDEEP:3:U:U
                          MD5:C4CA4238A0B923820DCC509A6F75849B
                          SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                          SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                          SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                          Malicious:false
                          Preview:1
                          Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                          File Type:very short file (no magic)
                          Category:dropped
                          Size (bytes):1
                          Entropy (8bit):0.0
                          Encrypted:false
                          SSDEEP:3:U:U
                          MD5:C4CA4238A0B923820DCC509A6F75849B
                          SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                          SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                          SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                          Malicious:false
                          Preview:1
                          Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                          File Type:very short file (no magic)
                          Category:dropped
                          Size (bytes):1
                          Entropy (8bit):0.0
                          Encrypted:false
                          SSDEEP:3:U:U
                          MD5:C4CA4238A0B923820DCC509A6F75849B
                          SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                          SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                          SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                          Malicious:false
                          Preview:1
                          Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                          File Type:very short file (no magic)
                          Category:dropped
                          Size (bytes):1
                          Entropy (8bit):0.0
                          Encrypted:false
                          SSDEEP:3:U:U
                          MD5:C4CA4238A0B923820DCC509A6F75849B
                          SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                          SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                          SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                          Malicious:false
                          Preview:1
                          File type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                          Entropy (8bit):6.763003299581498
                          TrID:
                          • Win32 Dynamic Link Library (generic) (1002004/3) 97.97%
                          • Win32 Executable Delphi generic (14689/80) 1.44%
                          • Win16/32 Executable Delphi generic (2074/23) 0.20%
                          • Generic Win/DOS Executable (2004/3) 0.20%
                          • DOS Executable Generic (2002/1) 0.20%
                          File name:C.dll
                          File size:1112443
                          MD5:8b81e6a7702f58b93fdc2b57ab401ffb
                          SHA1:2990b8adc8891564c404190bedab55df5027da32
                          SHA256:500f85201bcfc0ae49204bd31ed4f055cac1b0b7f8e74339907f5c14b8e711a8
                          SHA512:957929d5000d17bd44d9ef21b5b1d6bf3c1e153527000ad545cec7fc8ed9470e15fb4c7316acfd66d3004cc109f2fc483daaebbc27ff1264fc6539c827618659
                          SSDEEP:24576:5vf3ZKnZDyYxr6AVIY7wOM058KJWljhx:NQFnXz+jh
                          TLSH:A4358D32B2D1D837D4721A7C9D5BB2E998747E105E2CE44E7ED44F4C1E3AA813A352A3
                          File Content Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7.......................................................................................................................................
                          Icon Hash:b99988fcd4f66e0f
                          Entrypoint:0x4cb88c
                          Entrypoint Section:CODE
                          Digitally signed:true
                          Imagebase:0x400000
                          Subsystem:windows gui
                          Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, DLL, BYTES_REVERSED_HI
                          DLL Characteristics:
                          Time Stamp:0x2A425E19 [Fri Jun 19 22:22:17 1992 UTC]
                          TLS Callbacks:
                          CLR (.Net) Version:
                          OS Version Major:4
                          OS Version Minor:0
                          File Version Major:4
                          File Version Minor:0
                          Subsystem Version Major:4
                          Subsystem Version Minor:0
                          Import Hash:1e26e30a2a18779b13b95a18534c6e18
                          Signature Valid:
                          Signature Issuer:
                          Signature Validation Error:
                          Error Number:
                          Not Before, Not After
                            Subject Chain
                              Version:
                              Thumbprint MD5:
                              Thumbprint SHA-1:
                              Thumbprint SHA-256:
                              Serial:
                              Instruction
                              push ebp
                              mov ebp, esp
                              add esp, FFFFFFC4h
                              mov eax, 004CB444h
                              call 00007FF2185F6699h
                              xor eax, eax
                              push ebp
                              push 004CB8F4h
                              push dword ptr fs:[eax]
                              mov dword ptr fs:[eax], esp
                              mov eax, 004CFF60h
                              mov edx, 004CB908h
                              call 00007FF2185F4108h
                              mov eax, 004CFF64h
                              mov ecx, 004CB914h
                              mov edx, dword ptr [004CFF60h]
                              call 00007FF2185F43ABh
                              push 004CB918h
                              call 00007FF2185F6C31h
                              xor ecx, ecx
                              mov dl, 01h
                              mov eax, dword ptr [004CAD84h]
                              call 00007FF218624DD3h
                              xor eax, eax
                              pop edx
                              pop ecx
                              pop ecx
                              mov dword ptr fs:[eax], edx
                              push 004CB8FBh
                              ret
                              jmp 00007FF2185F3910h
                              jmp 00007FF2186BB73Ah
                              call 00007FF2185F3F7Dh
                              NameVirtual AddressVirtual Size Is in Section
                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_IMPORT0xd00000x222a.idata
                              IMAGE_DIRECTORY_ENTRY_RESOURCE0xe30000x29200.rsrc
                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                              IMAGE_DIRECTORY_ENTRY_SECURITY0x1082000x15c8.rsrc
                              IMAGE_DIRECTORY_ENTRY_BASERELOC0xd30000xf4ec.reloc
                              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                              NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                              CODE0x10000xca91c0xcaa00False0.4416303593460827data6.5649128445152IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                              DATA0xcc0000x264c0x2800False0.41455078125data4.565771214115526IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                              BSS0xcf0000xf690x0False0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                              .idata0xd00000x222a0x2400False0.3534071180555556data4.874417112519602IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                              .reloc0xd30000xf4ec0xf600False0.5579427083333334data6.683497498888386IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ
                              .rsrc0xe30000x292000x29200False0.7685339095744681data7.27811291294995IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ
                              NameRVASizeTypeLanguageCountry
                              SDFGSFASDF0xe3ca40x21c72dataFrenchCote dIvoire
                              RT_CURSOR0x1059180x134data
                              RT_CURSOR0x105a4c0x134data
                              RT_CURSOR0x105b800x134data
                              RT_CURSOR0x105cb40x134data
                              RT_CURSOR0x105de80x134data
                              RT_CURSOR0x105f1c0x134data
                              RT_CURSOR0x1060500x134data
                              RT_BITMAP0x1061840x1d0data
                              RT_BITMAP0x1063540x1e4data
                              RT_BITMAP0x1065380x1d0data
                              RT_BITMAP0x1067080x1d0data
                              RT_BITMAP0x1068d80x1d0data
                              RT_BITMAP0x106aa80x1d0data
                              RT_BITMAP0x106c780x1d0data
                              RT_BITMAP0x106e480x1d0data
                              RT_BITMAP0x1070180x1d0data
                              RT_BITMAP0x1071e80x1d0data
                              RT_BITMAP0x1073b80xe8GLS_BINARY_LSB_FIRST
                              RT_ICON0x1074a00x2e8dBase IV DBT of @.DBF, block length 512, next free block index 40, next free block 49, next used block 48059EnglishUnited States
                              RT_DIALOG0x1077880x52data
                              RT_STRING0x1077dc0x1ecdata
                              RT_STRING0x1079c80x370data
                              RT_STRING0x107d380x3d4data
                              RT_STRING0x10810c0x36cdata
                              RT_STRING0x1084780x3ecdata
                              RT_STRING0x1088640x30cdata
                              RT_STRING0x108b700x394data
                              RT_STRING0x108f040x1e4data
                              RT_STRING0x1090e80x1a4data
                              RT_STRING0x10928c0x11cdata
                              RT_STRING0x1093a80x2b8data
                              RT_STRING0x1096600xe0data
                              RT_STRING0x1097400x10cdata
                              RT_STRING0x10984c0x370data
                              RT_STRING0x109bbc0x3c4data
                              RT_STRING0x109f800x3b8data
                              RT_STRING0x10a3380x3b0data
                              RT_STRING0x10a6e80xf0data
                              RT_STRING0x10a7d80xc0data
                              RT_STRING0x10a8980x2d8data
                              RT_STRING0x10ab700x49cdata
                              RT_STRING0x10b00c0x388data
                              RT_STRING0x10b3940x2f0data
                              RT_RCDATA0x10b6840x10data
                              RT_RCDATA0x10b6940x5f0data
                              RT_RCDATA0x10bc840x134Delphi compiled form 'Tp0'
                              RT_GROUP_CURSOR0x10bdb80x14Lotus unknown worksheet or configuration, revision 0x1
                              RT_GROUP_CURSOR0x10bdcc0x14Lotus unknown worksheet or configuration, revision 0x1
                              RT_GROUP_CURSOR0x10bde00x14Lotus unknown worksheet or configuration, revision 0x1
                              RT_GROUP_CURSOR0x10bdf40x14Lotus unknown worksheet or configuration, revision 0x1
                              RT_GROUP_CURSOR0x10be080x14Lotus unknown worksheet or configuration, revision 0x1
                              RT_GROUP_CURSOR0x10be1c0x14Lotus unknown worksheet or configuration, revision 0x1
                              RT_GROUP_CURSOR0x10be300x14Lotus unknown worksheet or configuration, revision 0x1
                              RT_GROUP_ICON0x10be440x14dataEnglishUnited States
                              RT_VERSION0x10be580x204dataChineseChina
                              DLLImport
                              kernel32.dllDeleteCriticalSection, LeaveCriticalSection, EnterCriticalSection, InitializeCriticalSection, VirtualFree, VirtualAlloc, LocalFree, LocalAlloc, GetVersion, GetCurrentThreadId, InterlockedDecrement, InterlockedIncrement, VirtualQuery, WideCharToMultiByte, MultiByteToWideChar, lstrlenA, lstrcpynA, LoadLibraryExA, GetThreadLocale, GetStartupInfoA, GetProcAddress, GetModuleHandleA, GetModuleFileNameA, GetLocaleInfoA, GetCommandLineA, FreeLibrary, FindFirstFileA, FindClose, ExitProcess, WriteFile, UnhandledExceptionFilter, RtlUnwind, RaiseException, GetStdHandle
                              user32.dllGetKeyboardType, LoadStringA, MessageBoxA, CharNextA
                              advapi32.dllRegQueryValueExA, RegOpenKeyExA, RegCloseKey
                              oleaut32.dllSysFreeString, SysReAllocStringLen, SysAllocStringLen
                              kernel32.dllTlsSetValue, TlsGetValue, TlsFree, TlsAlloc, LocalFree, LocalAlloc
                              advapi32.dllRegQueryValueExA, RegOpenKeyExA, RegCloseKey, GetUserNameW
                              kernel32.dlllstrcpyA, WriteFile, WaitForSingleObject, VirtualQuery, VirtualAlloc, Sleep, SizeofResource, SetThreadLocale, SetFilePointer, SetEvent, SetErrorMode, SetEndOfFile, ResetEvent, ReadFile, MultiByteToWideChar, MulDiv, LockResource, LoadResource, LoadLibraryA, LeaveCriticalSection, InitializeCriticalSection, GlobalUnlock, GlobalReAlloc, GlobalHandle, GlobalLock, GlobalFree, GlobalFindAtomA, GlobalDeleteAtom, GlobalAlloc, GlobalAddAtomA, GetVersionExA, GetVersion, GetTickCount, GetThreadLocale, GetTempPathA, GetSystemInfo, GetStringTypeExA, GetStdHandle, GetProcAddress, GetModuleHandleA, GetModuleFileNameA, GetLocaleInfoA, GetLocalTime, GetLastError, GetFullPathNameA, GetFileSize, GetDiskFreeSpaceA, GetDateFormatA, GetCurrentThreadId, GetCurrentProcessId, GetCPInfo, GetACP, FreeResource, InterlockedExchange, FreeLibrary, FormatMessageA, FindResourceA, FindFirstFileA, FindClose, FileTimeToLocalFileTime, FileTimeToDosDateTime, EnumCalendarInfoA, EnterCriticalSection, DeleteFileA, DeleteCriticalSection, CreateThread, CreateFileA, CreateEventA, CompareStringA, CloseHandle
                              version.dllVerQueryValueA, GetFileVersionInfoSizeA, GetFileVersionInfoA
                              gdi32.dllUnrealizeObject, StretchBlt, SetWindowOrgEx, SetViewportOrgEx, SetTextColor, SetStretchBltMode, SetROP2, SetPixel, SetDIBColorTable, SetBrushOrgEx, SetBkMode, SetBkColor, SelectPalette, SelectObject, SaveDC, RestoreDC, RectVisible, RealizePalette, PatBlt, MoveToEx, MaskBlt, LineTo, IntersectClipRect, GetWindowOrgEx, GetTextMetricsA, GetTextExtentPoint32A, GetTextCharset, GetSystemPaletteEntries, GetStockObject, GetPixel, GetPaletteEntries, GetObjectA, GetDeviceCaps, GetDIBits, GetDIBColorTable, GetDCOrgEx, GetCurrentPositionEx, GetClipBox, GetBrushOrgEx, GetBitmapBits, ExcludeClipRect, DeleteObject, DeleteDC, CreateSolidBrush, CreatePenIndirect, CreatePalette, CreateHalftonePalette, CreateFontIndirectA, CreateDIBitmap, CreateDIBSection, CreateCompatibleDC, CreateCompatibleBitmap, CreateBrushIndirect, CreateBitmap, BitBlt
                              user32.dllCreateWindowExA, WindowFromPoint, WinHelpA, WaitMessage, UpdateWindow, UnregisterClassA, UnhookWindowsHookEx, TranslateMessage, TranslateMDISysAccel, TrackPopupMenu, SystemParametersInfoA, ShowWindow, ShowScrollBar, ShowOwnedPopups, ShowCursor, SetWindowsHookExA, SetWindowPos, SetWindowPlacement, SetWindowLongA, SetTimer, SetScrollRange, SetScrollPos, SetScrollInfo, SetRect, SetPropA, SetParent, SetMenuItemInfoA, SetMenu, SetForegroundWindow, SetFocus, SetCursor, SetClassLongA, SetCapture, SetActiveWindow, SendMessageA, ScrollWindow, ScreenToClient, RemovePropA, RemoveMenu, ReleaseDC, ReleaseCapture, RegisterWindowMessageA, RegisterClipboardFormatA, RegisterClassA, RedrawWindow, PtInRect, PostQuitMessage, PostMessageA, PeekMessageA, OffsetRect, OemToCharA, MessageBoxA, MapWindowPoints, MapVirtualKeyA, LoadStringA, LoadKeyboardLayoutA, LoadIconA, LoadCursorA, LoadBitmapA, KillTimer, IsZoomed, IsWindowVisible, IsWindowEnabled, IsWindow, IsRectEmpty, IsIconic, IsDialogMessageA, IsChild, InvalidateRect, IntersectRect, InsertMenuItemA, InsertMenuA, InflateRect, GetWindowThreadProcessId, GetWindowTextA, GetWindowRect, GetWindowPlacement, GetWindowLongA, GetWindowDC, GetTopWindow, GetSystemMetrics, GetSystemMenu, GetSysColorBrush, GetSysColor, GetSubMenu, GetScrollRange, GetScrollPos, GetScrollInfo, GetPropA, GetParent, GetWindow, GetMenuStringA, GetMenuState, GetMenuItemInfoA, GetMenuItemID, GetMenuItemCount, GetMenu, GetLastActivePopup, GetKeyboardState, GetKeyboardLayoutList, GetKeyboardLayout, GetKeyState, GetKeyNameTextA, GetIconInfo, GetForegroundWindow, GetFocus, GetDesktopWindow, GetDCEx, GetDC, GetCursorPos, GetCursor, GetClientRect, GetClassNameA, GetClassInfoA, GetCapture, GetActiveWindow, FrameRect, FindWindowA, FillRect, EqualRect, EnumWindows, EnumThreadWindows, EndPaint, EnableWindow, EnableScrollBar, EnableMenuItem, DrawTextA, DrawMenuBar, DrawIconEx, DrawIcon, DrawFrameControl, DrawEdge, DispatchMessageA, DestroyWindow, DestroyMenu, DestroyIcon, DestroyCursor, DeleteMenu, DefWindowProcA, DefMDIChildProcA, DefFrameProcA, CreatePopupMenu, CreateMenu, CreateIcon, CopyIcon, ClientToScreen, CheckMenuItem, CallWindowProcA, CallNextHookEx, BeginPaint, CharNextA, CharLowerA, CharUpperBuffA, CharToOemA, AdjustWindowRectEx, ActivateKeyboardLayout
                              ole32.dllIsEqualGUID, CoTaskMemFree, StringFromCLSID, CoCreateGuid
                              kernel32.dllSleep
                              oleaut32.dllSafeArrayPtrOfIndex, SafeArrayPutElement, SafeArrayGetElement, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayGetUBound, SafeArrayGetLBound, SafeArrayCreate, VariantChangeType, VariantCopyInd, VariantCopy, VariantClear, VariantInit
                              ole32.dllCoCreateInstance, CoUninitialize, CoInitialize
                              oleaut32.dllCreateErrorInfo, GetErrorInfo, SetErrorInfo, SysFreeString
                              comctl32.dllImageList_SetIconSize, ImageList_GetIconSize, ImageList_Write, ImageList_Read, ImageList_GetDragImage, ImageList_DragShowNolock, ImageList_SetDragCursorImage, ImageList_DragMove, ImageList_DragLeave, ImageList_DragEnter, ImageList_EndDrag, ImageList_BeginDrag, ImageList_Remove, ImageList_DrawEx, ImageList_Draw, ImageList_GetBkColor, ImageList_SetBkColor, ImageList_ReplaceIcon, ImageList_Add, ImageList_GetImageCount, ImageList_Destroy, ImageList_Create, InitCommonControls
                              Language of compilation systemCountry where language is spokenMap
                              FrenchCote dIvoire
                              EnglishUnited States
                              ChineseChina
                              No network behavior found

                              Click to jump to process

                              Target ID:0
                              Start time:17:55:13
                              Start date:23/06/2022
                              Path:C:\Windows\System32\loaddll32.exe
                              Wow64 process (32bit):true
                              Commandline:loaddll32.exe "C:\Users\user\Desktop\C.dll"
                              Imagebase:0x140000
                              File size:116736 bytes
                              MD5 hash:7DEB5DB86C0AC789123DEC286286B938
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:Borland Delphi
                              Yara matches:
                              • Rule: JoeSecurity_Crypt, Description: Yara detected CryptOne packer, Source: 00000000.00000002.290253396.0000000002750000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_Qbot_1, Description: Yara detected Qbot, Source: 00000000.00000002.290253396.0000000002750000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_Qbot_1, Description: Yara detected Qbot, Source: 00000000.00000002.290425745.00000000027A0000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_Qbot_1, Description: Yara detected Qbot, Source: 00000000.00000002.290335602.0000000002780000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                              Reputation:high

                              Target ID:1
                              Start time:17:55:13
                              Start date:23/06/2022
                              Path:C:\Windows\SysWOW64\cmd.exe
                              Wow64 process (32bit):true
                              Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\C.dll",#1
                              Imagebase:0x1190000
                              File size:232960 bytes
                              MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high

                              Target ID:2
                              Start time:17:55:14
                              Start date:23/06/2022
                              Path:C:\Windows\SysWOW64\rundll32.exe
                              Wow64 process (32bit):true
                              Commandline:rundll32.exe "C:\Users\user\Desktop\C.dll",#1
                              Imagebase:0x1120000
                              File size:61952 bytes
                              MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:Borland Delphi
                              Yara matches:
                              • Rule: JoeSecurity_Qbot_1, Description: Yara detected Qbot, Source: 00000002.00000002.323381928.00000000010A0000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_Crypt, Description: Yara detected CryptOne packer, Source: 00000002.00000000.281557672.0000000001070000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_Qbot_1, Description: Yara detected Qbot, Source: 00000002.00000000.281557672.0000000001070000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_Crypt, Description: Yara detected CryptOne packer, Source: 00000002.00000000.283835804.0000000001070000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_Qbot_1, Description: Yara detected Qbot, Source: 00000002.00000000.283835804.0000000001070000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_Qbot_1, Description: Yara detected Qbot, Source: 00000002.00000002.323413560.00000000010C0000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_Qbot_1, Description: Yara detected Qbot, Source: 00000002.00000000.283947623.00000000010C0000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_Qbot_1, Description: Yara detected Qbot, Source: 00000002.00000000.281698290.00000000010C0000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_Qbot_1, Description: Yara detected Qbot, Source: 00000002.00000000.281670705.00000000010A0000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_Crypt, Description: Yara detected CryptOne packer, Source: 00000002.00000002.323357187.0000000001070000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_Qbot_1, Description: Yara detected Qbot, Source: 00000002.00000002.323357187.0000000001070000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_Qbot_1, Description: Yara detected Qbot, Source: 00000002.00000000.283887210.00000000010A0000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                              Reputation:high

                              Target ID:4
                              Start time:17:55:33
                              Start date:23/06/2022
                              Path:C:\Windows\SysWOW64\explorer.exe
                              Wow64 process (32bit):true
                              Commandline:C:\Windows\SysWOW64\explorer.exe
                              Imagebase:0x2d0000
                              File size:3611360 bytes
                              MD5 hash:166AB1B9462E5C1D6D18EC5EC0B6A5F7
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Yara matches:
                              • Rule: JoeSecurity_Qbot_1, Description: Yara detected Qbot, Source: 00000004.00000002.765540679.0000000003230000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_Qbot_1, Description: Yara detected Qbot, Source: 00000004.00000000.288483062.0000000003230000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                              Reputation:high

                              Target ID:5
                              Start time:17:55:33
                              Start date:23/06/2022
                              Path:C:\Windows\SysWOW64\explorer.exe
                              Wow64 process (32bit):
                              Commandline:C:\Windows\SysWOW64\explorer.exe
                              Imagebase:
                              File size:3611360 bytes
                              MD5 hash:166AB1B9462E5C1D6D18EC5EC0B6A5F7
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high

                              Target ID:6
                              Start time:17:55:33
                              Start date:23/06/2022
                              Path:C:\Windows\SysWOW64\WerFault.exe
                              Wow64 process (32bit):true
                              Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 5620 -s 752
                              Imagebase:0x940000
                              File size:434592 bytes
                              MD5 hash:9E2B8ACAD48ECCA55C0230D63623661B
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high

                              Target ID:19
                              Start time:17:55:52
                              Start date:23/06/2022
                              Path:C:\Windows\SysWOW64\schtasks.exe
                              Wow64 process (32bit):true
                              Commandline:"C:\Windows\system32\schtasks.exe" /Create /RU "NT AUTHORITY\SYSTEM" /Z /ST 17:57 /tn qsrshyj /ET 18:08 /tr "powershell.exe -encodedCommand cgBlAGcAcwB2AHIAMwAyAC4AZQB4AGUAIAAiAEMAOgBcAFUAcwBlAHIAcwBcAGoAbwBuAGUAcwBcAEQAZQBzAGsAdABvAHAAXABDAC4AZABsAGwAIgA=" /SC ONCE
                              Imagebase:0xa70000
                              File size:185856 bytes
                              MD5 hash:15FF7D8324231381BAD48A052F85DF04
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high

                              Target ID:20
                              Start time:17:55:53
                              Start date:23/06/2022
                              Path:C:\Windows\System32\conhost.exe
                              Wow64 process (32bit):false
                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                              Imagebase:0x7ff647620000
                              File size:625664 bytes
                              MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high

                              Target ID:21
                              Start time:17:55:54
                              Start date:23/06/2022
                              Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              Wow64 process (32bit):false
                              Commandline:powershell.exe -encodedCommand cgBlAGcAcwB2AHIAMwAyAC4AZQB4AGUAIAAiAEMAOgBcAFUAcwBlAHIAcwBcAGoAbwBuAGUAcwBcAEQAZQBzAGsAdABvAHAAXABDAC4AZABsAGwAIgA=
                              Imagebase:0x7ff6ba650000
                              File size:447488 bytes
                              MD5 hash:95000560239032BC68B4C2FDFCDEF913
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:.Net C# or VB.NET
                              Reputation:high

                              Target ID:22
                              Start time:17:55:54
                              Start date:23/06/2022
                              Path:C:\Windows\System32\conhost.exe
                              Wow64 process (32bit):false
                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                              Imagebase:0x7ff647620000
                              File size:625664 bytes
                              MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high

                              Target ID:23
                              Start time:17:55:59
                              Start date:23/06/2022
                              Path:C:\Windows\System32\regsvr32.exe
                              Wow64 process (32bit):false
                              Commandline:"C:\Windows\system32\regsvr32.exe" C:\Users\user\Desktop\C.dll
                              Imagebase:0x7ff68a4e0000
                              File size:24064 bytes
                              MD5 hash:D78B75FC68247E8A63ACBA846182740E
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language

                              Target ID:24
                              Start time:17:56:00
                              Start date:23/06/2022
                              Path:C:\Windows\SysWOW64\regsvr32.exe
                              Wow64 process (32bit):true
                              Commandline: C:\Users\user\Desktop\C.dll
                              Imagebase:0xcc0000
                              File size:20992 bytes
                              MD5 hash:426E7499F6A7346F0410DEAD0805586B
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:Borland Delphi
                              Yara matches:
                              • Rule: JoeSecurity_Qbot_1, Description: Yara detected Qbot, Source: 00000018.00000002.393963522.0000000003B10000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_Qbot_1, Description: Yara detected Qbot, Source: 00000018.00000002.393925531.0000000003AF0000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_Crypt, Description: Yara detected CryptOne packer, Source: 00000018.00000002.393905257.0000000003AC0000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_Qbot_1, Description: Yara detected Qbot, Source: 00000018.00000002.393905257.0000000003AC0000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security

                              Target ID:25
                              Start time:17:56:19
                              Start date:23/06/2022
                              Path:C:\Windows\SysWOW64\explorer.exe
                              Wow64 process (32bit):true
                              Commandline:C:\Windows\SysWOW64\explorer.exe
                              Imagebase:0x2d0000
                              File size:3611360 bytes
                              MD5 hash:166AB1B9462E5C1D6D18EC5EC0B6A5F7
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Yara matches:
                              • Rule: JoeSecurity_Qbot_1, Description: Yara detected Qbot, Source: 00000019.00000002.765579370.0000000002FB0000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_Qbot_1, Description: Yara detected Qbot, Source: 00000019.00000000.390120530.0000000002FB0000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security

                              Target ID:27
                              Start time:17:56:25
                              Start date:23/06/2022
                              Path:C:\Windows\System32\conhost.exe
                              Wow64 process (32bit):false
                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                              Imagebase:0x7ff647620000
                              File size:625664 bytes
                              MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language

                              Target ID:35
                              Start time:17:57:00
                              Start date:23/06/2022
                              Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              Wow64 process (32bit):false
                              Commandline:powershell.exe -encodedCommand cgBlAGcAcwB2AHIAMwAyAC4AZQB4AGUAIAAiAEMAOgBcAFUAcwBlAHIAcwBcAGoAbwBuAGUAcwBcAEQAZQBzAGsAdABvAHAAXABDAC4AZABsAGwAIgA=
                              Imagebase:0x7ff6ba650000
                              File size:447488 bytes
                              MD5 hash:95000560239032BC68B4C2FDFCDEF913
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:.Net C# or VB.NET

                              Target ID:36
                              Start time:17:57:00
                              Start date:23/06/2022
                              Path:C:\Windows\System32\conhost.exe
                              Wow64 process (32bit):false
                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                              Imagebase:0x7ff647620000
                              File size:625664 bytes
                              MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language

                              Target ID:37
                              Start time:17:57:02
                              Start date:23/06/2022
                              Path:C:\Windows\System32\regsvr32.exe
                              Wow64 process (32bit):false
                              Commandline:"C:\Windows\system32\regsvr32.exe" C:\Users\user\Desktop\C.dll
                              Imagebase:0x7ff68a4e0000
                              File size:24064 bytes
                              MD5 hash:D78B75FC68247E8A63ACBA846182740E
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language

                              Target ID:38
                              Start time:17:57:03
                              Start date:23/06/2022
                              Path:C:\Windows\SysWOW64\regsvr32.exe
                              Wow64 process (32bit):true
                              Commandline: C:\Users\user\Desktop\C.dll
                              Imagebase:0xcc0000
                              File size:20992 bytes
                              MD5 hash:426E7499F6A7346F0410DEAD0805586B
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language

                              No disassembly